CN111901096A - Block chain-based electronic data credible evidence-storing evaluation method - Google Patents

Block chain-based electronic data credible evidence-storing evaluation method Download PDF

Info

Publication number
CN111901096A
CN111901096A CN202010734925.4A CN202010734925A CN111901096A CN 111901096 A CN111901096 A CN 111901096A CN 202010734925 A CN202010734925 A CN 202010734925A CN 111901096 A CN111901096 A CN 111901096A
Authority
CN
China
Prior art keywords
electronic data
block chain
point
user
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010734925.4A
Other languages
Chinese (zh)
Inventor
杨宁波
杨智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Gaoshan Technology Co ltd
Original Assignee
Anhui Gaoshan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Gaoshan Technology Co ltd filed Critical Anhui Gaoshan Technology Co ltd
Priority to CN202010734925.4A priority Critical patent/CN111901096A/en
Publication of CN111901096A publication Critical patent/CN111901096A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • G06V40/171Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Biomedical Technology (AREA)
  • Human Computer Interaction (AREA)
  • Power Engineering (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an electronic data credible evidence storage evaluation method based on a block chain, which comprises the following steps: the method comprises the following steps: processing single electronic data, processing the electronic data snapshot, obtaining an original hash value of the electronic data snapshot by using an SHA-256 algorithm, uploading a secret hash value of the electronic data snapshot, which is obtained by encrypting the original hash value, to a block chain, and obtaining a feedback txid from the block chain; step two: after the electronic data snapshot is processed and uploaded into the block chain, a public key generated in the encryption process is sent to the user intelligent mobile terminal; step three: when a user needs to call electronic data, the user needs to firstly carry out identity authentication through a comparison terminal. The invention has better safety, can effectively avoid data leakage and data tampering, meets various use requirements of users, and is more worthy of popularization and use.

Description

Block chain-based electronic data credible evidence-storing evaluation method
Technical Field
The invention relates to the field of block chains, in particular to an electronic data credible evidence storage evaluation method based on a block chain.
Background
Electronic data refers to objective data including characters, graphic symbols, numbers, letters and the like formed based on electronic technical means such as computer application, communication and modern management technology. Electronic data is stored, processed and transmitted in a digital form, can prove the fact of a case, and a credible evidence evaluation method is required to be used when credible evidence evaluation of the electronic data is carried out, and a block chain is a term in the technical field of information. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect.
The existing electronic data credible evidence evaluation method is poor in data security, easily causes data leakage, and cannot trace source violating persons after data leakage and tampering occur, so that the block chain-based electronic data credible evidence evaluation method is provided.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: how to solve the problems that the existing electronic data credible evidence-storing assessment method is poor in data security, data leakage is easy to cause, and tracing violating persons cannot be carried out after data leakage and tampering occur, and the block chain-based electronic data credible evidence-storing assessment method is provided.
The invention solves the technical problems through the following technical scheme, and the invention comprises the following steps:
the method comprises the following steps: processing single electronic data, processing the electronic data snapshot, obtaining an original hash value of the electronic data snapshot by using an SHA-256 algorithm, uploading a secret hash value of the electronic data snapshot, which is obtained by encrypting the original hash value, to a block chain, and obtaining a feedback txid from the block chain;
step two: after the electronic data snapshot is processed and uploaded into the block chain, a public key generated in the encryption process is sent to the user intelligent mobile terminal;
step three: when a user needs to call electronic data, the user needs to firstly carry out identity authentication through a comparison terminal;
step four: after the identity authentication is passed, the user uploads the electronic key received by the intelligent mobile terminal, so that an electronic data snapshot in the block link is called, and the electronic data is quickly sent to the intelligent mobile equipment of the user;
step five: scanning the electronic data snapshot displayed on the user intelligent mobile equipment by a camera of the comparison terminal, and comparing the electronic data snapshot displayed by the comparison terminal user with the source electronic data;
step six: the comparison shows that the electronic data is credible when passing, and the comparison shows that the electronic data is not credible when not passing.
Preferably, the specific process of performing identity authentication in step three is as follows:
the method comprises the following steps: the verification base number of the visitor is allowed to be prestored in an external cloud;
step two: a camera of a comparison terminal collects and extracts face photos of a data user, and simultaneously extracts three face photos;
step three: performing definition analysis on the three face photos, and extracting a face photo with the highest definition as a verification photo;
step four: marking two external eye corners of the human face in the verification photo as a point P1 and a point P2, marking two mouth corners of the human face in the verification photo as a point P3 and a point P4, wherein the point P1 and the point P3 are on the same side;
step five: connecting a point P1 with a point P2 to obtain a line segment l1, connecting a point P1 with a point P3 to obtain a line segment l2, connecting a point P3 with a point P4 to obtain a line segment l3, and connecting a point P4 with a point P2 to obtain a line segment l 4;
step six: a line segment l1, l2, l3 and l4 form a trapezoid, and a line segment l5 perpendicular to l3 is made by taking the midpoint of the line segment l1 as an endpoint;
step seven: the length of l1, l3 and l5 were measured and expressed by the formula (l1+ l3) × l5/2 ═ SLadder with adjustable heightTo obtain a trapezoidal area SLadder with adjustable height,SLadder with adjustable heightNamely the real-time verification coefficient;
step eight: when S isLadder with adjustable heightThe verification is passed when the verification base number of the allowed visitor is prestored in any block chain.
Preferably, the scanning contrast process in the step five is as follows:
the method comprises the following steps: extracting electronic data snapshots prestored in a block chain;
step two: the scanning verification area in the electronic data snapshot pre-stored in the block chain is a rectangle, the length and the width of the rectangle are measured to obtain K1 and K2, and the area K of the rectangle is obtained through K1 × K2Noodle
Step three: extracting the scanning verification area of the electronic snapshot in the user intelligent mobile terminal scanned in real time, measuring the length and the width of the scanning verification area to obtain P1 and P1, and obtaining the rectangular area P2 through P1 × P2Noodle
Step four: by the formula KNoodle/P2Noodle=KpRatio ofObtaining the area ratio when KpRatio ofWhen the preset ratio is the same, and the encryption number verification passes, the user can extract corresponding electronic data.
Compared with the prior art, the invention has the following advantages: this electronic data credible deposit card evaluation method based on block chain, can carry out authentication to it when the user calls electronic data and carries out credible deposit card evaluation, and the identity information when storing the verification, when taking place data leakage, made things convenient for the user to trace to the source and found, accurate location to data reveal the people and attempt to steal the people of data, thereby the effectual security that promotes this method, simultaneously through carrying out encryption processing to exclusive encryption serial number, further promoted the security of this method, the effectual unexpected emergence that leads to by the tamper that prevents data from being revealed.
Drawings
FIG. 1 is a block flow diagram of the present invention.
Detailed Description
The following examples are given for the detailed implementation and specific operation of the present invention, but the scope of the present invention is not limited to the following examples.
As shown in fig. 1, the present embodiment provides a technical solution: an electronic data credible evidence storage evaluation method based on a block chain comprises the following steps:
the method comprises the following steps: processing single electronic data, processing the electronic data snapshot, obtaining an original hash value of the electronic data snapshot by using an SHA-256 algorithm, uploading a secret hash value of the electronic data snapshot, which is obtained by encrypting the original hash value, to a block chain, and obtaining a feedback txid from the block chain;
step two: after the electronic data snapshot is processed and uploaded into the block chain, a public key generated in the encryption process is sent to the user intelligent mobile terminal;
step three: when a user needs to call electronic data, the user needs to firstly carry out identity authentication through a comparison terminal;
step four: after the identity authentication is passed, the user uploads the electronic key received by the intelligent mobile terminal, so that an electronic data snapshot in the block link is called, and the electronic data is quickly sent to the intelligent mobile equipment of the user;
step five: scanning the electronic data snapshot displayed on the user intelligent mobile equipment by a camera of the comparison terminal, and comparing the electronic data snapshot displayed by the comparison terminal user with the source electronic data;
step six: the comparison shows that the electronic data is credible when passing, and the comparison shows that the electronic data is not credible when not passing.
The specific process of identity authentication in the third step is as follows:
the method comprises the following steps: the verification base number of the visitor is allowed to be prestored in an external cloud;
step two: a camera of a comparison terminal collects and extracts face photos of a data user, and simultaneously extracts three face photos;
step three: performing definition analysis on the three face photos, and extracting a face photo with the highest definition as a verification photo;
step four: marking two external eye corners of the human face in the verification photo as a point P1 and a point P2, marking two mouth corners of the human face in the verification photo as a point P3 and a point P4, wherein the point P1 and the point P3 are on the same side;
step five: connecting a point P1 with a point P2 to obtain a line segment l1, connecting a point P1 with a point P3 to obtain a line segment l2, connecting a point P3 with a point P4 to obtain a line segment l3, and connecting a point P4 with a point P2 to obtain a line segment l 4;
step six: a line segment l1, l2, l3 and l4 form a trapezoid, and a line segment l5 perpendicular to l3 is made by taking the midpoint of the line segment l1 as an endpoint;
step seven: the length of l1, l3 and l5 were measured and expressed by the formula (l1+ l3) × l5/2 ═ SLadder with adjustable heightTo obtain a trapezoidal area SLadder with adjustable height,SLadder with adjustable heightNamely the real-time verification coefficient;
step eight: when S isLadder with adjustable heightThe verification is passed when the verification base number of the allowed visitor is prestored in any block chain.
The scanning contrast process in the step five is as follows:
the method comprises the following steps: extracting electronic data snapshots prestored in a block chain;
step two: the scanning verification area in the electronic data snapshot pre-stored in the block chain is a rectangle, the length and the width of the rectangle are measured to obtain K1 and K2, and the area K of the rectangle is obtained through K1 × K2Noodle
Step three: extracting the scanning verification area of the electronic snapshot in the user intelligent mobile terminal scanned in real time, measuring the length and the width of the scanning verification area to obtain P1 and P1, and obtaining the rectangular area P2 through P1 × P2Noodle
Step four: by the formula KNoodle/P2Noodle=KpRatio ofObtaining the area ratio when KpRatio ofWhen the preset ratio is the same, and the encryption number verification passes, the user can extract corresponding electronic data.
In summary, when the invention is used, a single electronic data is processed, the electronic data snapshot obtains an original hash value by using the SHA-256 algorithm, the secret hash value of the electronic data snapshot, which is obtained by encrypting the original hash value, is uploaded to the block chain, and the feedback txid is obtained from the block chain; after the electronic data snapshot is processed and uploaded into the block chain, a public key generated in the encryption process is sent to the user intelligent mobile terminal; when a user needs to call electronic data, the user needs to firstly carry out identity authentication through a comparison terminal; after the identity authentication is passed, the user uploads the electronic key received by the intelligent mobile terminal, so that an electronic data snapshot in the block link is called, and the electronic data is quickly sent to the intelligent mobile equipment of the user; scanning the electronic data snapshot displayed on the user intelligent mobile equipment by a camera of the comparison terminal, and comparing the electronic data snapshot displayed by the comparison terminal user with the source electronic data; the contrast is through showing that electronic data deposits the card credibility promptly, the contrast is not through showing that electronic data deposits the card incredible promptly, the user calls and can carry out authentication to it when electronic data carries out credible deposit card aassessment, and store the identity information when verifying, when taking place data leakage, it finds to have made things convenient for the user to trace to source, accurate location is to data leakage people and the people that attempts to steal data, thereby the effectual security that promotes the method, simultaneously through carrying out encryption processing to exclusive encryption serial number, further promote the security of this method, the effectual unexpected emergence that prevents that data from being revealed and falsify and lead to.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (4)

1. An electronic data credible evidence storage evaluation method based on a block chain is characterized by comprising the following steps:
the method comprises the following steps: processing single electronic data, processing the electronic data snapshot, obtaining an original hash value of the electronic data snapshot by using an SHA-256 algorithm, uploading a secret hash value of the electronic data snapshot, which is obtained by encrypting the original hash value, to a block chain, and obtaining a feedback txid from the block chain;
step two: after the electronic data snapshot is processed and uploaded into the block chain, a public key generated in the encryption process is sent to the user intelligent mobile terminal;
step three: when a user needs to call electronic data, the user needs to firstly carry out identity authentication through a comparison terminal;
step four: after the identity authentication is passed, the user uploads the electronic key received by the intelligent mobile terminal, so that an electronic data snapshot in the block link is called, and the electronic data is quickly sent to the intelligent mobile equipment of the user;
step five: scanning the electronic data snapshot displayed on the user intelligent mobile equipment by a camera of the comparison terminal, and comparing the electronic data snapshot displayed by the comparison terminal user with the source electronic data;
step six: the comparison shows that the electronic data is credible when passing, and the comparison shows that the electronic data is not credible when not passing.
2. The block chain-based electronic data credible evidence evaluation method of claim 1, wherein: and the electronic data snapshot sent to the intelligent mobile terminal of the user in the step two is reduced by a preset proportion.
3. The block chain-based electronic data credible evidence evaluation method of claim 1, wherein: the specific process of identity authentication in the third step is as follows:
the method comprises the following steps: the verification base number of the visitor is allowed to be prestored in an external cloud;
step two: a camera of a comparison terminal collects and extracts face photos of a data user, and simultaneously extracts three face photos;
step three: performing definition analysis on the three face photos, and extracting a face photo with the highest definition as a verification photo;
step four: marking two external eye corners of the human face in the verification photo as a point P1 and a point P2, marking two mouth corners of the human face in the verification photo as a point P3 and a point P4, wherein the point P1 and the point P3 are on the same side;
step five: connecting a point P1 with a point P2 to obtain a line segment l1, connecting a point P1 with a point P3 to obtain a line segment l2, connecting a point P3 with a point P4 to obtain a line segment l3, and connecting a point P4 with a point P2 to obtain a line segment l 4;
step six: a line segment l1, l2, l3 and l4 form a trapezoid, and a line segment l5 perpendicular to l3 is made by taking the midpoint of the line segment l1 as an endpoint;
step seven: the length of l1, l3 and l5 were measured and expressed by the formula (l1+ l3) × l5/2 ═ SLadder with adjustable heightTo obtain a trapezoidal area SLadder with adjustable height,SLadder with adjustable heightNamely the real-time verification coefficient;
step eight:when S isLadder with adjustable heightThe verification is passed when the verification base number of the allowed visitor is prestored in any block chain.
4. The block chain-based electronic data credible evidence evaluation method of claim 1, wherein: the scanning contrast process in the step five is as follows:
the method comprises the following steps: extracting electronic data snapshots prestored in a block chain;
step two: the scanning verification area in the electronic data snapshot pre-stored in the block chain is a rectangle, the length and the width of the rectangle are measured to obtain K1 and K2, and the area K of the rectangle is obtained through K1 × K2Noodle
Step three: extracting the scanning verification area of the electronic snapshot in the user intelligent mobile terminal scanned in real time, measuring the length and the width of the scanning verification area to obtain P1 and P1, and obtaining the rectangular area P2 through P1 × P2Noodle
Step four: by the formula KNoodle/P2Noodle=KpRatio ofObtaining the area ratio when KpRatio ofWhen the preset ratio is the same, and the encryption number verification passes, the user can extract corresponding electronic data.
CN202010734925.4A 2020-07-28 2020-07-28 Block chain-based electronic data credible evidence-storing evaluation method Withdrawn CN111901096A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010734925.4A CN111901096A (en) 2020-07-28 2020-07-28 Block chain-based electronic data credible evidence-storing evaluation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010734925.4A CN111901096A (en) 2020-07-28 2020-07-28 Block chain-based electronic data credible evidence-storing evaluation method

Publications (1)

Publication Number Publication Date
CN111901096A true CN111901096A (en) 2020-11-06

Family

ID=73189351

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010734925.4A Withdrawn CN111901096A (en) 2020-07-28 2020-07-28 Block chain-based electronic data credible evidence-storing evaluation method

Country Status (1)

Country Link
CN (1) CN111901096A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113095828A (en) * 2021-04-27 2021-07-09 支付宝(杭州)信息技术有限公司 Data evidence storage method and device based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113095828A (en) * 2021-04-27 2021-07-09 支付宝(杭州)信息技术有限公司 Data evidence storage method and device based on block chain
CN113095828B (en) * 2021-04-27 2023-09-01 支付宝(杭州)信息技术有限公司 Data storage method and device based on blockchain

Similar Documents

Publication Publication Date Title
US11625936B2 (en) High definition camera and image recognition system for criminal identification
DE112005003281B4 (en) Electronic signature security system
CN103999442B (en) Apparatus and method for generating digital images
CN1860724A (en) Method for identification
CN106250959A (en) Produce the method for dynamic two-dimension code, entrance guard authentication method and related system
Olaniyi et al. Design of secure electronic voting system using fingerprint biometrics and crypto-watermarking approach
CN1382332A (en) Method of data protection
CN113010860A (en) Data safety protection system based on industrial internet
CN110941810A (en) Password resetting method and device, terminal equipment, server and storage medium
CN114614974B (en) Privacy set intersection method, system and device for power grid data cross-industry sharing
CN111901096A (en) Block chain-based electronic data credible evidence-storing evaluation method
CN105577768A (en) Service examination and approval electronic realization method
CN115758398A (en) Access control data processing method and device, access control system and storage medium
US20200329039A1 (en) Securing digital data transmission in a communication network
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN109146522B (en) Block chain-based food safety tracing method and system
CN106296926A (en) A kind of based on the Intelligent entrance guard control system authorized in limited time and method
CN113271591B (en) Two-standard four-real data encryption interaction method and device based on 5G slice network
CN114372092A (en) Case collaborative search processing method, system, device and electronic equipment
CN113688187A (en) Digital block chain supervision platform for hazardous chemical safety production
CN112583991A (en) Chip cipher network seal inquiry and verification system
CN204695315U (en) A kind of network communication data secure device
JP2020027267A (en) Device for checking electronic signature, method and program therefor
CN113360931B (en) System and method for safeguarding judicial electronic delivery information based on block chain
CN112336316B (en) Multi-state non-inductive temperature measurement system and working method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20201106

WW01 Invention patent application withdrawn after publication