CN115296823B - Credible digital badge security authentication method and system - Google Patents

Credible digital badge security authentication method and system Download PDF

Info

Publication number
CN115296823B
CN115296823B CN202211196455.6A CN202211196455A CN115296823B CN 115296823 B CN115296823 B CN 115296823B CN 202211196455 A CN202211196455 A CN 202211196455A CN 115296823 B CN115296823 B CN 115296823B
Authority
CN
China
Prior art keywords
digital badge
metadata
component
badge
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211196455.6A
Other languages
Chinese (zh)
Other versions
CN115296823A (en
Inventor
敬铅
叶梦杰
补天明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Cancheng Technology Co ltd
Original Assignee
Foshan Cancheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Cancheng Technology Co ltd filed Critical Foshan Cancheng Technology Co ltd
Priority to CN202211196455.6A priority Critical patent/CN115296823B/en
Publication of CN115296823A publication Critical patent/CN115296823A/en
Application granted granted Critical
Publication of CN115296823B publication Critical patent/CN115296823B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for authenticating the safety of a trusted digital badge, wherein the method comprises the following steps: after the system is started, the micro-service component monitors a service request, and after the service request is received, the service request is identified by a service classifier; according to the different identified service request categories, the service classifier forwards the service request to the corresponding service component; the service request categories include: generating digital badge metadata, authenticating a trusted digital badge, and analyzing and verifying the trusted digital badge; the service component includes: the system comprises a digital badge metadata generation component, a trusted digital badge authentication component and a trusted digital badge analysis and verification component; and the corresponding service assembly processes the service according to the service request, submits the processed service data to the trusted digital badge data assembly, and performs cloud storage, big data analysis and data management on the service data. The invention can improve the safety of the digital badge information.

Description

Credible digital badge security authentication method and system
Technical Field
The invention relates to the field of information security, in particular to a method and a system for authenticating the security of a trusted digital badge.
Background
The information hiding technology appears as a branch of the information security technology for over ten years, and the creation of the information hiding technology mainly aims to solve the problems that the digital information transmission quantity is rapidly increased under the condition of high-speed development of computer network technology, the accompanying security guarantee of a large number of digital files transmitted through a network is easily tampered, and various illegal purposes are transmitted and used. With the research and expansion, the information hiding technology can hide the information of the actually existing information by 18, so that the information hiding technology can be used for commercial application such as copyright protection and the like, can also be used for identifying an author, an issuer, a proprietor, a user and the like, and can identify illegally copied and stolen digital information products (digital watermarks) because of carrying copyright protection information and identity authentication information. The information hiding mainly comprises two major branches of digital watermarking and steganography. Digital watermarking is mainly intended to protect intellectual property rights and it verifies ownership of the media by embedding information in the original media data. Steganography is a means of secret communication, and the security of secret communication is obtained by hiding the existence of secret information. The purpose of steganography is to protect covert information that is hidden in a carrier. The impact of such information on the host media is not sufficient to attract attention and with certain recovery methods, the information should be invisible and imperceptible to an illegitimate recipient. Therefore, the unique use of the information hiding technology can be exerted by combining the technical use and characteristics of digital watermarking and steganography.
Software-as-a-Service (SaaS) is a completely innovative Software application model that started to emerge in the 21 st century with the development of internet technology and the maturity of application Software. The software needs to meet the respective requirements of multiple tenants and needs to be customized by the SaaS. The traditional software customization service is completed in a software development stage, and SaaS needs to be updated and customized according to the change of requirements in the software using process, and the use of other users cannot be influenced during the customization.
Cloud computing (cloud computing) is one type of distributed computing, and means that a huge data computing processing program is decomposed into countless small programs through a network "cloud", and then the small programs are processed and analyzed through a system consisting of a plurality of servers to obtain results and are returned to a user. In the early stage of cloud computing, simple distributed computing is adopted, task distribution is solved, and computing results are merged. Thus, cloud computing is also known as grid computing. By this technique, tens of thousands of data can be processed in a short time (several seconds), thereby achieving a strong network service.
At present, the application of information hiding technology mainly includes two aspects, on one hand, the digital watermarking technology is adopted and mainly used for protecting digital images, texts, videos and the like, and the digital watermarking technology also directly acts on protected object files, so that the effect of realizing the 'explicit visibility' is realized, therefore, the protection strength plays a more role in 'declarative' protection, and the application is more concentrated in the fields of commercial copyright protection and the like; and the steganography technology is adopted and mainly used for protecting digital images, texts and the like, and the steganography technology directly or indirectly acts on the protected object file to achieve the effect of 'invisibility and invisibility', so that the protection strength plays more roles in 'verifiability' protection, and the application is more concentrated in the fields of judicial evidence, safety and the like.
Therefore, the technology and the application of the two aspects of the information hiding technology have obvious differences, and the technology fusion in the specific application is not sufficient, so that the application requirements of a wider range and more convenience are difficult to adapt; moreover, the SaaS platform and the cloud computing service technology are relatively mature, but the combination of the information hiding technology, the SaaS platform and the cloud computing service technology is rarely seen, so that the information hiding platform service is lacked at present; in addition, most of the existing information hiding technologies are single isolated applications for specific file objects, so that the platform diversification application based on the SaaS and cloud computing service is difficult to support.
Disclosure of Invention
In view of the above problems, it is an object of the present invention to provide a method for secure authentication of a trusted digital badge. The problem that the existing digital badge lacks information security guarantee measures is solved.
The method comprises the following steps:
monitoring a service request, and identifying the type of the service request after receiving the service request;
forwarding the service request according to the identified different service request types;
the service request categories include: generating digital badge metadata, authenticating a trusted digital badge, and analyzing and verifying the trusted digital badge;
and processing the service according to the service request, and performing cloud storage, big data analysis and data management on the processed service data.
Preferably, the trusted digital badge authentication comprises the steps of:
preprocessing a digital badge source file;
adopting an information hiding self-adaptive classification matching algorithm to identify and classify the digital badge metadata and matching the information hiding analysis algorithm;
carrying out classification validity judgment on the classified digital badge metadata, and if the classified digital badge metadata is invalid, finishing authentication; if the data is valid, the metadata is sorted and the security authentication data is prepared to be written;
and then, the self-adaptive matching information hiding algorithm is called to write the security authentication data into the digital badge file in a dual-mode fusion mode, so that the creation of the digital badge trusted digital badge is completed, and the security storage of the digital badge authentication data is carried out.
Preferably, the trusted digital badge analysis validation comprises the steps of:
preprocessing a digital badge source file;
adopting an information hiding self-adaptive classification matching algorithm to identify and classify the digital badge metadata and matching the information hiding analysis algorithm;
carrying out classification validity judgment on the classified digital badge metadata, and if the classified digital badge metadata is invalid, finishing authentication; if the identification information is valid, the metadata is sorted, and the digital badge credible data dual-mode analysis is prepared;
then, a self-adaptive matched information hiding analysis algorithm is called to perform dual-mode analysis on the digital badge file to be verified, security authentication verification is performed on the analyzed data, whether security authentication data exist in the digital badge file to be verified is identified, if no security authentication data exist, the digital badge to be verified is judged to be untrusted, and the security authentication data are fed back to a requesting party; if the security authentication data exists, the validity check of the digital badge file is continued, if the security authentication data exists, the trusted digital badge is judged, and if the security authentication data does not exist, the untrusted digital badge is judged; and after the analysis and verification are completed, storing the analysis and verification data and feeding back an analysis result to the requester.
Preferably, the preprocessing of the digital badge source file comprises badge file, format and metadata reading, data cleaning, encoding and packaging processing of the digital badge.
Preferably, the information hiding adaptive classification matching algorithm specifically includes:
firstly, classifying and identifying the metadata file format of the digital badge by adopting a matching sequence method and combining a prefix matching algorithm, a suffix matching algorithm and a factor matching algorithm;
secondly, classifying and identifying the file contents and the file magic numbers by adopting a matching form method and combining an accurate matching algorithm and an approximate matching algorithm;
and finally, combining with an information hiding algorithm to perform self-adaptive matching so as to realize file classification and information hiding processing on the files.
Preferably, the logical formula of the file format classification is:
Figure DEST_PATH_IMAGE002
Figure DEST_PATH_IMAGE004
Figure DEST_PATH_IMAGE006
in the formula, X G For a set of file-formatted data, S T The method comprises the following steps of A, Q and C, wherein the A is a format characteristic code matching set, and A is a format characteristic code character set; n \ r \ s,/g are canonical parametric symbols.
Preferably, the logic formula of the file content classification is as follows:
Figure DEST_PATH_IMAGE008
wherein:
Figure DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE006A
in the formula, X M Set of magic numbers for file headers, S F The file magic number matching set is A, the file magic number set is A, and the header magic number matching set is C; n \ r \ s,/g are canonical parametric symbols.
Preferably, the logic formula of the file magic number classification is as follows:
Figure DEST_PATH_IMAGE012
in the formula, B is a file header magic number set, C is a header magic number matching set, and P is a file classification set.
Preferably, the logic formula of the adaptive matching is:
Figure DEST_PATH_IMAGE014
in the formula, P is a file classification set, Q is an information hiding algorithm set, and G is an information hiding algorithm matching set.
The invention provides a credible digital badge security authentication system, which comprises a micro-service component, a business service classifier, a digital badge metadata generation component, a credible digital badge authentication component, a credible digital badge analysis and verification component, a credible digital badge data component, a digital badge metadata preprocessing component, a digital badge metadata self-adaptive matching classifier component, a metadata effective classification judgment component, an information hiding algorithm assembly component, an information hiding analysis algorithm assembly component and a dual-mode fusion processing component;
the micro service component is used for monitoring a service request, and after receiving the service request, sending a signal to start a service classifier;
the business service classifier is used for identifying the business request category;
the digital badge metadata generation component is used for generating digital badge metadata;
the trusted digital badge authentication component to authenticate a trusted digital badge;
the trusted digital badge analysis verification component is used for analyzing and verifying the trusted digital badge;
the credible digital badge data component is used for carrying out cloud storage, big data analysis and data governance on business data
The digital badge metadata preprocessing component is used for preprocessing a digital badge source file;
the digital badge metadata self-adaptive matching classifier component is used for identifying and classifying digital badge metadata and matching information hiding analysis algorithms;
the metadata effective classification judgment component is used for judging the classification effectiveness of the classified digital badge metadata;
the information hiding algorithm assembly converges metadata which is classified and matched by a digital badge metadata self-adaptive matching classifier by using an information hiding algorithm;
and the information hiding analysis algorithm assembly utilizes an information hiding analysis algorithm to converge metadata which is classified and matched by a digital badge metadata self-adaptive matching classifier.
The dual-mode fusion processing component writes the security authentication data into the digital badge file in a dual-mode fusion mode; and performing digital badge credible data dual-mode analysis on the metadata.
Preferably, the system further comprises a system security and guarantee component and a security authentication content management component;
the system safety guarantee component is used for guaranteeing the safe operation of the system;
the security certification content management component is used for providing security certification data for the digital badge metadata generation component, the credible digital badge certification component and the credible digital badge analysis and verification component.
Compared with the prior art, the technical scheme of the invention has the beneficial effects that: the invention applies the information hiding technology to the creation, analysis and verification of the credible digital badge, can upgrade the common digital badge into the credible digital badge and provides the credible digital badge security authentication platform service. The digital badge source files to be upgraded are subjected to necessary classification to match the optimal information hiding algorithm, and the digital badge source files are encrypted through the matched information hiding algorithm, so that a credible digital badge is created, and the problem that the existing digital badge lacks information security guarantee measures can be effectively solved. The invention provides a trusted digital badge authentication and verification system and a third party access service, and meets the service requirements of various users on the processes of creating, authenticating and verifying trusted digital badges.
Drawings
Fig. 1 is a flowchart of a method for authenticating the security of a trusted digital badge in embodiment 1.
FIG. 2 is a flow diagram of trusted digital badge authentication.
FIG. 3 is a flow chart of trusted digital badge verification
FIG. 4 is a block diagram of a trusted digital badge security authentication system according to embodiment 3
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Example 1
As shown in fig. 1, the present embodiment discloses a method for authenticating the security of a trusted digital badge, which includes the following steps:
after the system is started, the micro-service component monitors the service request, and after the service request is received, the service request type is identified by the service classifier;
according to the different identified service request types, the service classifier forwards the service request to the corresponding service component;
the service request categories include: generating digital badge metadata, authenticating a trusted digital badge, and analyzing and verifying the trusted digital badge;
the service component includes: the system comprises a digital badge metadata generation component, a trusted digital badge authentication component and a trusted digital badge analysis and verification component;
and the corresponding service assembly processes the service according to the service request, submits the processed service data to the trusted digital badge data assembly, and the trusted digital badge data assembly performs cloud storage, big data analysis and data management on the service data.
Example 2
The embodiment discloses a security authentication method for a trusted digital badge, which is characterized by comprising the following steps:
after the system is started, the micro-service component monitors a service request, and after the service request is received, the service request is identified by a service classifier;
according to the different identified service request types, the service classifier forwards the service request to the corresponding service component;
the service request categories include: generating digital badge metadata, authenticating a trusted digital badge, and analyzing and verifying the trusted digital badge;
the service component includes: the system comprises a digital badge metadata generation component, a trusted digital badge authentication component and a trusted digital badge analysis and verification component;
and the corresponding service assembly processes the service according to the service request, submits the processed service data to the trusted digital badge data assembly, and the trusted digital badge data assembly performs cloud storage, big data analysis and data management on the service data.
According to the embodiment of the present invention, the trusted digital badge authentication comprises the steps of:
preprocessing a digital badge source file by a digital badge metadata preprocessing component;
calling a digital badge metadata self-adaptive matching classifier component, and identifying and classifying the digital badge metadata by adopting an information hiding self-adaptive classification matching algorithm and matching an information hiding analysis algorithm;
the metadata valid classification judgment component judges the classified digital badge metadata according to the classification validity, and if the classified digital badge metadata are invalid, the authentication is ended; if the data is valid, the metadata is sorted and the security authentication data is prepared to be written;
and then the trusted digital badge creation authentication component calls a self-adaptive matching information hiding algorithm, and enables a dual-mode fusion processing component to write the security authentication data into the digital badge file in a dual-mode fusion mode, so that creation of the trusted digital badge of the digital badge is completed, the creation process data is sent to the trusted digital badge authentication data component, and the security storage of the digital badge authentication data is realized.
When the information hiding algorithm is used for writing the security authentication data into the digital badge file, a dual-mode fusion design is specifically adopted, namely watermark information of the digital badge is embedded into metadata of the digital badge, and meanwhile, the information hiding algorithm is used for writing the hidden information into the metadata of the digital badge, so that the credible digital badge file with the security authentication data is obtained.
The trusted digital badge authentication is a basis for constructing the trusted digital badge, and through implementation of a security authentication service process, digital badge metadata generation, trusted digital badge creation and issuance, digital badge content auditing, qualification confirmation and the like are provided for a user. The specific flow is shown in fig. 2.
According to the embodiment of the invention, the trusted digital badge analysis and verification comprises the following steps:
preprocessing a digital badge source file by a digital badge metadata preprocessing component;
calling a digital badge metadata self-adaptive matching classifier component, and identifying and classifying the digital badge metadata by adopting an information hiding self-adaptive classification matching algorithm and matching an information hiding analysis algorithm;
the metadata valid classification judgment component judges the classification validity of the classified digital badge metadata, and if the classified digital badge metadata is invalid, the authentication is ended; if the digital badge credible data are valid, the metadata are sorted, and a dual-mode fusion processing component is started to prepare for dual-mode analysis of the digital badge credible data;
then, the credible digital badge verification component calls a self-adaptive matched information hiding analysis algorithm to perform dual-mode analysis on the digital badge file to be verified, performs security authentication verification on the analyzed data, identifies whether security authentication data exist in the digital badge file to be verified, and if no security authentication data exist, determines that the digital badge to be verified is not credible and feeds back a result to a requester; if the safety authentication data exists, the validity check of the digital badge file is continued, if the safety authentication data exists, the credible digital badge is judged to be a credible digital badge, and if the safety authentication data does not exist, the credible digital badge is judged to be an incredible digital badge; and after the analysis and verification are completed, the analysis and verification data are sent to the trusted digital badge verification data component, the safe storage of the analysis and verification data is completed, and the analysis result is fed back to the requester.
The analysis and verification of the trusted digital badge is a key process for analyzing and verifying the credibility, the safety and the effectiveness of the digital badge. Through the implementation of the analysis and verification service flow, the safety authentication data analysis, the safety and effectiveness verification and the full-chain tracing for the digital badge are provided for the user, and the verification of the credible digital badge and the use of the badge and the like are realized. The specific flow is shown in fig. 3.
According to the embodiment of the invention, the preprocessing of the digital badge source file comprises badge file, format and metadata reading, data cleaning, encoding and packaging processing of the digital badge.
According to the embodiment of the present invention, the information hiding adaptive classification matching algorithm specifically includes:
firstly, classifying and identifying the metadata file format of the digital badge by adopting a matching sequence method and combining a prefix matching algorithm, a suffix matching algorithm and a factor matching algorithm;
secondly, classifying and identifying the file contents and the file magic numbers by adopting a matching form method and combining an accurate matching algorithm and an approximate matching algorithm;
and finally, combining with an information hiding algorithm to perform self-adaptive matching so as to realize file classification and information hiding processing on the files.
According to the embodiment of the present invention, the logical expression of the file format classification is:
Figure DEST_PATH_IMAGE002A
wherein:
Figure DEST_PATH_IMAGE004A
Figure DEST_PATH_IMAGE006AA
in the formula, X G For a file-formatted data set, S T The method comprises the following steps of A, Q and C, wherein the A is a format characteristic code matching set, and A is a format characteristic code character set; n \ r \ s,/g is a canonical parametric symbol.
According to the embodiment of the present invention, the logical formula of the file content classification is:
Figure DEST_PATH_IMAGE008A
wherein:
Figure DEST_PATH_IMAGE010A
Figure DEST_PATH_IMAGE006AAA
in the formula, X M Set of magic numbers for file headers, S F The method comprises the following steps of A, C and C, wherein the files are a file magic number matching set, A is a file magic number set, and C is a header magic number matching set; n \ r \ s,/g is a canonical parametric symbol.
According to the embodiment of the present invention, the logic formula of the magic number classification of the file is as follows:
Figure DEST_PATH_IMAGE012A
in the formula, B is a file header magic number set, C is a header magic number matching set, and P is a file classification set.
According to the embodiment of the present invention, the logic formula of the adaptive matching is:
Figure DEST_PATH_IMAGE014A
in the formula, P is a file classification set, Q is an information hiding algorithm set, and G is an information hiding algorithm matching set.
The embodiment uses the information hiding technology for creating, authenticating, verifying, tracing and the like of the credible digital badge and the credible digital badge provided by the information hiding technology.
Example 3
As shown in fig. 4, the present embodiment discloses a trusted digital badge security authentication system, which includes a micro-service component, a service classifier, a digital badge metadata generation component, a trusted digital badge authentication component, a trusted digital badge analysis and verification component, a trusted digital badge data component, a digital badge metadata preprocessing component, a digital badge metadata adaptive matching classifier component, a metadata valid classification judgment component, an information hiding algorithm assembly component, an information hiding analysis algorithm assembly component, and a dual-mode fusion processing component;
the micro-service component is used for monitoring a service request, and sending a signal to start a service classifier after receiving the service request;
the business service classifier is used for identifying the business request category;
the digital badge metadata generation component is used to generate digital badge metadata;
the trusted digital badge authentication component to authenticate a trusted digital badge;
the trusted digital badge analysis verification component is used for analyzing and verifying the trusted digital badge;
the credible digital badge data component is used for carrying out cloud storage, big data analysis and data governance on business data
The digital badge metadata preprocessing component is used for preprocessing a digital badge source file;
the digital badge metadata self-adaptive matching classifier component is used for identifying and classifying digital badge metadata and matching information hiding analysis algorithms;
the metadata effective classification judgment component is used for performing classification effective judgment on the classified digital badge metadata;
the information hiding algorithm assembly converges metadata which is classified and matched by a digital badge metadata self-adaptive matching classifier by using an information hiding algorithm;
and the information hiding analysis algorithm assembly utilizes an information hiding algorithm to converge metadata which is classified and matched by a digital badge metadata self-adaptive matching classifier.
According to the embodiment of the invention, the system also comprises a system security guarantee component and a security authentication content management component;
the system safety guarantee component is used for guaranteeing the safe operation of the system;
the security certification content management component is used for providing security certification data for the digital badge metadata generation component, the credible digital badge certification component and the credible digital badge analysis and verification component.
The dual-mode fusion processing component writes the security authentication data into the digital badge file in a dual-mode fusion mode; and performing digital badge credible data dual-mode analysis on the metadata.
It should be noted that, after the system is started to operate, the system safety guarantee component operates first, and the operation cycle of the component is synchronous with that of the system, so that the operation safety of the whole system is guaranteed all the time; meanwhile, a security authentication content management component is started to provide support for a digital badge metadata generation component, a trusted digital badge authentication component and a trusted digital badge creation authentication component; after the digital badge preprocessing component is finished, the preprocessing data and information hiding algorithm assembly component provides input for the digital badge metadata self-adaptive matching classifier component so as to help the classifier finish the classification of the digital badge files and the matching with the information hiding algorithm; meanwhile, the security authentication content management component provides security authentication data to help the trusted digital badge creation authentication component to complete the establishment of the trusted digital badge; the information hiding algorithm assembly and the information hiding (analyzing) algorithm assembly belong to twin algorithms, the information hiding algorithm assembly and the information hiding (analyzing) algorithm assembly are associated and connected with each other to form an information hiding algorithm whole of the system, and the difference between the information hiding algorithm assembly and the information hiding (analyzing) algorithm assembly meets the requirements of security authentication and analysis verification of the credible digital badge respectively; similarly, the trusted digital badge creation authentication component and the trusted digital badge analysis verification component also have a twin attribute, and have mutual operation interaction, and jointly form the integrity of the trusted digital badge. In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only one logical function division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps of implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer-readable storage medium, and when executed, executes the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media capable of storing program code.

Claims (5)

1. A method of secure authentication of a trusted digital badge, the method comprising the steps of:
monitoring a service request, and identifying the type of the service request after receiving the service request;
forwarding the service request according to the identified different service request types;
the service request categories include: generating digital badge metadata, authenticating a trusted digital badge, and analyzing and verifying the trusted digital badge;
processing the service according to the service request, and performing cloud storage, big data analysis and data management on the processed service data;
the trusted digital badge authentication comprises the steps of:
preprocessing a digital badge source file;
adopting an information hiding self-adaptive classification matching algorithm to identify and classify the digital badge metadata and matching the information hiding algorithm;
carrying out classification validity judgment on the classified digital badge metadata, and if the classified digital badge metadata is invalid, ending the authentication; if the data is valid, the metadata is sorted and the security authentication data is prepared to be written;
and then, the self-adaptive matching information hiding algorithm is called to write the security authentication data into the digital badge file in a dual-mode fusion mode, so that the creation of the digital badge trusted digital badge is completed, and the security storage of the digital badge authentication data is carried out.
2. A method of securely authenticating a trusted digital badge according to claim 1 and wherein said trusted digital badge analysis verification includes the steps of:
preprocessing the digital badge metadata;
adopting an information hiding self-adaptive classification matching algorithm to identify and classify the digital badge metadata and matching the information hiding analysis algorithm;
carrying out classification validity judgment on the classified digital badge metadata, and if the classified digital badge metadata is invalid, finishing authentication; if the digital badge credible data are valid, the metadata are sorted, and the digital badge credible data are prepared for dual-mode analysis;
then, a self-adaptive matched information hiding analysis algorithm is called to perform dual-mode analysis on the digital badge file to be verified, security authentication verification is performed on the analyzed data, whether security authentication data exist in the digital badge file to be verified or not is identified, if no security authentication data exist, the digital badge to be verified is judged to be unreliable, and a result is fed back to a requester; if the safety authentication data exists, the validity check of the digital badge file is continued, if the safety authentication data exists, the credible digital badge is judged to be a credible digital badge, and if the safety authentication data does not exist, the credible digital badge is judged to be an incredible digital badge; and after the analysis and verification are completed, storing the analysis and verification data and feeding back an analysis result to the requester.
3. A method for authenticating the security of a trusted digital badge as claimed in claim 2, wherein said preprocessing of the digital badge includes processing of badge file, format, metadata reading, data cleaning, encoding and packaging of the digital badge.
4. The method for authenticating the security of a trusted digital badge according to claim 3, wherein the information hiding adaptive classification matching algorithm is specifically as follows:
firstly, classifying and identifying the metadata file format of the digital badge by adopting a matching sequence method and combining a prefix matching algorithm, a suffix matching algorithm and a factor matching algorithm;
secondly, classifying and identifying the file contents and the file magic numbers by adopting a matching form method and combining an accurate matching algorithm and an approximate matching algorithm;
and finally, combining with an information hiding algorithm to perform self-adaptive matching so as to realize file classification and information hiding processing on the files.
5. A credible digital badge security authentication system is characterized by comprising a micro-service component, a business service classifier, a digital badge metadata generation component, a credible digital badge authentication component, a credible digital badge analysis and verification component, a credible digital badge data component, a digital badge metadata preprocessing component, a digital badge metadata self-adaptive matching classifier component, a metadata effective classification judgment component, an information hiding algorithm assembly component, an information hiding analysis algorithm assembly component and a dual-mode fusion processing component;
the micro service component is used for monitoring a service request, and after receiving the service request, sending a signal to start a service classifier;
the business service classifier is used for identifying the business request category;
the digital badge metadata generation component is used to generate digital badge metadata;
the trusted digital badge authentication component to authenticate a trusted digital badge;
the trusted digital badge analysis verification component is used for analyzing and verifying the trusted digital badge;
the trusted digital badge data component is used for carrying out cloud storage, big data analysis and data governance on service data;
the digital badge metadata preprocessing component is used for preprocessing a digital badge source file;
the digital badge metadata self-adaptive matching classifier component is used for identifying and classifying digital badge metadata and matching information hiding algorithms;
the metadata effective classification judgment component is used for judging the classification effectiveness of the classified digital badge metadata;
the information hiding algorithm assembly converges metadata which is classified and matched by a digital badge metadata self-adaptive matching classifier by using an information hiding algorithm;
the information hiding analysis algorithm assembly utilizes an information hiding analysis algorithm to converge metadata which is classified and matched by a digital badge metadata self-adaptive matching classifier;
the dual-mode fusion processing component writes the security authentication data into the digital badge file in a dual-mode fusion mode; and performing digital badge credible data dual-mode analysis on the metadata;
the system also comprises a system safety guarantee component and a safety certification content management component;
the system safety guarantee component is used for guaranteeing the safe operation of the system;
the safety certification content management component is used for providing content verification and safety certification data for the digital badge metadata generation component, the credible digital badge certification component and the credible digital badge analysis and verification component.
CN202211196455.6A 2022-09-29 2022-09-29 Credible digital badge security authentication method and system Active CN115296823B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211196455.6A CN115296823B (en) 2022-09-29 2022-09-29 Credible digital badge security authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211196455.6A CN115296823B (en) 2022-09-29 2022-09-29 Credible digital badge security authentication method and system

Publications (2)

Publication Number Publication Date
CN115296823A CN115296823A (en) 2022-11-04
CN115296823B true CN115296823B (en) 2023-02-03

Family

ID=83834619

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211196455.6A Active CN115296823B (en) 2022-09-29 2022-09-29 Credible digital badge security authentication method and system

Country Status (1)

Country Link
CN (1) CN115296823B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1422671A1 (en) * 2002-11-20 2004-05-26 Eastman Kodak Company Method and apparatus for transaction card security utilizing embedded image data
JP2012043285A (en) * 2010-08-20 2012-03-01 Kddi Corp Document classification program, server and method based on sentence features and physical features of document information
CN104899606A (en) * 2015-06-17 2015-09-09 中国科学院自动化研究所 Steganalysis method based on local learning
CN105229682A (en) * 2013-04-05 2016-01-06 微软技术许可有限责任公司 Badge certification
CN105512570A (en) * 2015-11-27 2016-04-20 南威软件股份有限公司 E-government internal network electronic certificate authentication method and system
WO2016164214A1 (en) * 2015-04-08 2016-10-13 Novatime Technology Inc. Electronic barcode badge for employee access
CN108805786A (en) * 2017-05-05 2018-11-13 北京大学 Steganalysis method and device are matched based on least significant bit
CN110634096A (en) * 2019-08-07 2019-12-31 华中师范大学 Self-adaptive multi-mode information hiding method and device
CN111083307A (en) * 2019-11-25 2020-04-28 北京安信荣达科技有限公司 File detection and cracking method based on steganography
CN111931198A (en) * 2020-06-17 2020-11-13 山东浪潮质量链科技有限公司 Block chain-based online education digital badge authentication method, equipment and medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203492A (en) * 2016-06-30 2016-12-07 中国科学院计算技术研究所 The system and method that a kind of image latent writing is analyzed
CN108509775B (en) * 2018-02-08 2020-11-13 暨南大学 Malicious PNG image identification method based on machine learning

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1422671A1 (en) * 2002-11-20 2004-05-26 Eastman Kodak Company Method and apparatus for transaction card security utilizing embedded image data
JP2012043285A (en) * 2010-08-20 2012-03-01 Kddi Corp Document classification program, server and method based on sentence features and physical features of document information
CN105229682A (en) * 2013-04-05 2016-01-06 微软技术许可有限责任公司 Badge certification
WO2016164214A1 (en) * 2015-04-08 2016-10-13 Novatime Technology Inc. Electronic barcode badge for employee access
CN104899606A (en) * 2015-06-17 2015-09-09 中国科学院自动化研究所 Steganalysis method based on local learning
CN105512570A (en) * 2015-11-27 2016-04-20 南威软件股份有限公司 E-government internal network electronic certificate authentication method and system
CN108805786A (en) * 2017-05-05 2018-11-13 北京大学 Steganalysis method and device are matched based on least significant bit
CN110634096A (en) * 2019-08-07 2019-12-31 华中师范大学 Self-adaptive multi-mode information hiding method and device
CN111083307A (en) * 2019-11-25 2020-04-28 北京安信荣达科技有限公司 File detection and cracking method based on steganography
CN111931198A (en) * 2020-06-17 2020-11-13 山东浪潮质量链科技有限公司 Block chain-based online education digital badge authentication method, equipment and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
同类型信息自适应隐藏模型;张帅等;《北京邮电大学学报》;20160815(第04期);第35-39页 *

Also Published As

Publication number Publication date
CN115296823A (en) 2022-11-04

Similar Documents

Publication Publication Date Title
CN110674523B (en) Method for confirming electronic contract signer by combining digital signature with handwritten signature
AU716912B2 (en) Electronic copy protection mechanism
CN101593324B (en) Method and system for network multi-level approval based on dependable computing application technique
CN110598376A (en) Copyright authentication method, device and equipment based on block chain and storage medium
CN103678960B (en) Method and device for adding digital copyright information to data file
JP2007524938A (en) Optimal payload space allocation method
US20100067691A1 (en) Document certification and authentication system
US20060177094A1 (en) A system for embedding, extracting, and executing self-governing behavior and use controls within digital medium content
WO2014154109A1 (en) Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same
WO2001015382A1 (en) Legitimacy protection of electronic document and a printed copy thereof
CN111612963B (en) Bill voucher anti-counterfeiting detection method and device based on intelligent equipment
Motwani et al. A proposed digital rights management system for 3d graphics using biometric watermarks
CN109740316A (en) A kind of insertion of dynamic watermark, verification method and system and dynamic watermark processing system
CN115296823B (en) Credible digital badge security authentication method and system
KR102154897B1 (en) Method for supervising digital contents using block chain and fingerprinting, device and computer readable medium for performing the method
CA2898587C (en) Digitised handwritten signature authentication
Mambo et al. Fingerprints for copyright software protection
CN115396117A (en) Block chain based tamper-proof electronic document signing and verifying method and system
He et al. Digital right management model based on cryptography and digital watermarking
CN114331730A (en) Information processing method, device and storage medium
Dalla Preda et al. Exploring NFT Validation through Digital Watermarking
JP2000287065A (en) Image processing system
CA2986837A1 (en) Data authentication method, device and system, and computer storage medium
Trung et al. Secure eeg-based user authentication system integrated with robust watermarking
Patil et al. Blockchain Based Approach for Tackling Deepfake Videos

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant