CN116015790A - Authorization authentication method and system for scientific and technological service - Google Patents

Authorization authentication method and system for scientific and technological service Download PDF

Info

Publication number
CN116015790A
CN116015790A CN202211609356.6A CN202211609356A CN116015790A CN 116015790 A CN116015790 A CN 116015790A CN 202211609356 A CN202211609356 A CN 202211609356A CN 116015790 A CN116015790 A CN 116015790A
Authority
CN
China
Prior art keywords
server
random value
scientific
machine code
credit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211609356.6A
Other languages
Chinese (zh)
Inventor
董任洵
张芳芳
柏佩清
张敏
徐卫军
邹磊
李杉杉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen ZNV Technology Co Ltd
Nanjing ZNV Software Co Ltd
Original Assignee
Shenzhen ZNV Technology Co Ltd
Nanjing ZNV Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen ZNV Technology Co Ltd, Nanjing ZNV Software Co Ltd filed Critical Shenzhen ZNV Technology Co Ltd
Priority to CN202211609356.6A priority Critical patent/CN116015790A/en
Publication of CN116015790A publication Critical patent/CN116015790A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

An authorization authentication method and system for science and technology services relates to the field of science and technology service transaction. Comprising the following steps: sending a credit inquiry request to a second server, and acquiring a public key sent by the second server, a root certificate of the second server, a machine code acquisition tool and a personal certificate making tool; generating a first server machine code containing a root certificate of a second server according to the machine code acquisition tool and the personal certificate making tool; generating a random value according to the first server machine code, encrypting the random value by utilizing the public key to generate encrypted data, and transmitting the encrypted data to a third server; and obtaining a decrypted random value decrypted by the third server, comparing the decrypted random value with the random value, and completing authorization authentication when at least two of the decrypted random value and the random value are the same.

Description

Authorization authentication method and system for scientific and technological service
Technical Field
The invention relates to the technical service transaction field, in particular to an authorization authentication method and system for technical service.
Background
Some existing websites do not limit login MAC addresses, so that the identity of a user of a login terminal cannot be used by new people, and when a large number of anonymous surge requests occur, the performance of the website can be greatly affected, and further online service resources can be occupied. In addition, in the interaction of related science and technology services, there is little concern about privacy information confidentiality of personal importance, so it is highly desirable to find an authentication method for performing decentralization interaction and personal importance privacy protection on the premise of sufficient authorization of credit participation institutions.
Disclosure of Invention
The invention mainly solves the technical problems that: existing scientific and technological services are prone to exposing personal privacy information.
According to a first aspect, in one embodiment, an authorization authentication method for a scientific and technological service is provided, including:
sending a credit inquiry request to a second server, and acquiring a public key sent by the second server, a root certificate of the second server, a machine code acquisition tool and a personal certificate making tool;
generating a first server machine code containing a root certificate of a second server according to the machine code acquisition tool and the personal certificate making tool;
generating a random value according to the first server machine code, encrypting the random value by utilizing the public key to generate encrypted data, and transmitting the encrypted data to a third server;
and obtaining a decrypted random value decrypted by the third server, comparing the decrypted random value with the random value, and completing authorization authentication when at least two of the decrypted random value and the random value are the same.
In one embodiment, the random value comprises: at least one of a time stamp, a requested loan period, a requested loan amount, a contract number, a user concurrency number, and liability information.
According to a second aspect, in one embodiment, there is provided an authorization authentication method for a scientific and technological service, including:
generating a root certificate of the second server according to the MAC address of the second server, and randomly generating a public key;
acquiring a credit inquiry request sent by a first server, and inquiring a credit record of the first server according to the credit inquiry request;
and when the credit record of the first server is qualified, sending the public key, the root certificate of the second server, the machine code acquisition tool and the personal certificate making tool to the first server.
In one embodiment, the credit record includes at least one of liability information and overdue information.
In one embodiment, when the credit record of the first server is qualified, the method includes:
and when the first server has no overdue information and the liability information of the first server is in the set threshold range, the credit record of the first server is qualified.
According to a third aspect, in one embodiment, there is provided an authorization authentication method for a scientific and technological service, including:
and obtaining the encrypted data sent by the first server, decrypting the encrypted data by using a private key of the third server to generate a decrypted random value, and sending the decrypted random value to the first server.
According to a fourth aspect, in one embodiment, an authorization and authentication system for providing a scientific and technological service includes a first server, a second server, and a third server;
the first server sends a credit inquiry request to a second server;
the second server generates a root certificate of the second server according to the MAC address of the second server, and randomly generates a public key; the second server inquires the credit record of the first server according to the credit inquiry request, and when the credit record of the first server is qualified, the second server sends the public key, the root certificate of the second server, the machine code acquisition tool and the personal certificate making tool to the first server;
the first server generates a first server machine code containing a root certificate of the second server according to the machine code acquisition tool and the personal certificate making tool, and generates a random value according to the first server machine code; the first server encrypts the random value by using the public key to generate encrypted data and sends the encrypted data to a third server;
the third server decrypts the encrypted data by using a private key of the third server to generate a decrypted random value, and sends the decrypted random value to the first server;
the first server acquires the decryption random value, compares the decryption random value with the random value, and completes authorization authentication when at least two of the decryption random value and the random value are the same.
In one embodiment, the random value comprises: at least one of a time stamp, a requested loan period, a requested loan amount, a contract number, a user concurrency number, and liability information.
In one embodiment, when the credit record of the first server is qualified, the method includes:
the credit record includes at least one of liability information and overdue information; and when the first server has no overdue information and the liability information of the first server is in the set threshold range, the credit record of the first server is qualified.
According to a fifth aspect, an embodiment provides a computer readable storage medium having stored thereon a program executable by a processor to implement a method as described above.
The authorization authentication method and system for the scientific and technological service and the computer readable storage medium according to the embodiment. The first server sends a credit inquiry request to the second server, and acquires a public key sent by the second server, a root certificate of the second server, a machine code acquisition tool and a personal certificate making tool; generating a first server machine code containing a root certificate of a second server according to the machine code acquisition tool and the personal certificate making tool; generating a random value according to the first server machine code, encrypting the random value by utilizing a public key to generate encrypted data, and transmitting the encrypted data to a third server; and finally, obtaining a decrypted random value decrypted by the third server, comparing the decrypted random value with the random value, and completing authorization authentication when at least two items of the decrypted random value and the random value are the same. According to the method and the device, the first server machine code containing the root certificate of the second server is generated through the acquired root certificate of the second server, the machine code acquisition tool and the personal certificate manufacturing tool, legal and important personal privacy protection between transactions can be guaranteed, meanwhile, the fact that pirated software cannot be normally used can be guaranteed, and the performance and stability of a credit investigation system are guaranteed.
Drawings
FIG. 1 is a flowchart of a method for authorizing an authentication of a scientific and technological service according to one embodiment;
FIG. 2 is a flowchart of a second method for authorizing a scientific and technological service according to one embodiment;
FIG. 3 is a third path diagram of an authorization authentication method for a scientific and technological service according to an embodiment;
FIG. 4 is a schematic diagram of an authorization and authentication system for a scientific and technological service according to an embodiment.
Detailed Description
The invention will be described in further detail below with reference to the drawings by means of specific embodiments. Wherein like elements in different embodiments are numbered alike in association. In the following embodiments, numerous specific details are set forth in order to provide a better understanding of the present application. However, one skilled in the art will readily recognize that some of the features may be omitted, or replaced by other elements, materials, or methods in different situations. In some instances, some operations associated with the present application have not been shown or described in the specification to avoid obscuring the core portions of the present application, and may not be necessary for a person skilled in the art to describe in detail the relevant operations based on the description herein and the general knowledge of one skilled in the art.
Furthermore, the described features, operations, or characteristics of the description may be combined in any suitable manner in various embodiments. Also, various steps or acts in the method descriptions may be interchanged or modified in a manner apparent to those of ordinary skill in the art. Thus, the various orders in the description and drawings are for clarity of description of only certain embodiments, and are not meant to be required orders unless otherwise indicated.
The numbering of the components itself, e.g. "first", "second", etc., is used herein merely to distinguish between the described objects and does not have any sequential or technical meaning. The terms "coupled" and "connected," as used herein, are intended to encompass both direct and indirect coupling (coupling), unless otherwise indicated.
Referring to fig. 1, the authorization authentication method for a scientific and technological service provided in the present application includes the following steps when a first server is used as an execution subject:
step S110: and sending a credit inquiry request to the second server, and acquiring the public key sent by the second server, the root certificate of the second server, a machine code acquisition tool and a personal certificate making tool.
In some embodiments, the server of the scientific and technological service demander a sends a credit inquiry request to the shared personal information platform which is mainly developed by the credit participation organization B, that is, the first server sends a credit inquiry request to the second server. The first server is a server of a scientific and technological service demander A, and the second server is a server of a shared personal information platform which is mainly developed by a credit participation organization B.
In some embodiments, the shared personal information platform queries the credit record of the scientific and technological service demander A in response to the credit inquiry request of the scientific and technological service demander A. When the credit record of the scientific and technological service requiring party A is qualified, the shared personal information platform sends the public key, the root certificate containing the MAC address of the shared personal information platform, the machine code acquisition tool and the personal certificate making tool to the scientific and technological service requiring party A. In some embodiments, the credit record of the scientific and technological service demander A is mainly at least one of liability information and overdue information of the scientific and technological service demander A. And the shared personal information platform stores the searched credit record result of the scientific and technological service demander A in a database of the shared personal information platform for half a year, and the data is invalid after the half a year.
Step S120: a first server machine code including a root certificate of a second server is generated from a machine code acquisition tool and a personal certificate generation tool.
In some embodiments, when the credit record of the scientific and technological service demander a is qualified, the scientific and technological service demander a generates a machine code of the scientific and technological service demander a through a machine code acquisition tool and a personal certificate making tool acquired by the shared personal information platform, where the machine code of the scientific and technological service demander a includes a root certificate of a MAC address of the shared personal information platform. In some embodiments, the scientific and technological service requiring party a may use a mobile terminal such as a mobile phone, a tablet or a computer, and generate a machine code corresponding to the mobile terminal such as the mobile phone, the tablet or the computer, that is, the first server machine code according to the acquired machine code acquiring tool and the personal certificate making tool. Because mobile terminals such as mobile phones, tablets or computers adopted by the scientific and technological service demander A only correspond to one machine code, the generated first server machine code binds the mobile terminals used by the scientific and technological service demander A by credit.
Step S130: and generating a random value according to the first server machine code, encrypting the random value by utilizing the public key to generate encrypted data, and transmitting the encrypted data to a third server.
In some embodiments, the random values include: at least one of a time stamp, a requested loan period, a requested loan amount, a contract number, a user concurrency number, and liability information.
In some embodiments, the scientific and technological service demander a generates a random value according to the first server machine code, where the random value includes at least one of a time stamp, a requested loan deadline, a requested loan amount, a contract number, a user concurrency number, and liability information. And encrypting the random value by using the public key sent by the shared personal information platform to generate encrypted data. The technology service demander A sends the generated encrypted data to the technology service provider C, and a server of the technology service provider C is a third server.
Step S140: and obtaining a decrypted random value decrypted by the third server, comparing the decrypted random value with the random values, and completing authorization authentication when at least two of the decrypted random values are identical to the random values.
In some embodiments, the science and technology service provider C decrypts the encrypted data with its own private key, generates a decrypted random value, and sends the decrypted random value to the science and technology service requester a. If at least two of the decrypted random value and the random value of the scientific and technological service demand party A are the same, the scientific and technological service demand party A is proved to be the scientific and technological service demand party A, the scientific and technological service provider C is the scientific and technological service provider C, and the authentication of the participating mechanism B passing credit in the middle is finished, namely the authorization authentication is finished.
Referring to fig. 2, the authorization authentication method for a scientific and technological service provided in the present application includes the following steps when a second server is used as an execution subject:
step S210: and generating a root certificate of the second server according to the MAC address of the second server, and randomly generating a public key.
In some embodiments, the participating institution B of the credit hosts a root certificate developed for sharing the MAC address (Media Access Control Address, local area network address) of the personal information platform, where the MAC address is the MAC address of the personal information platform, i.e. the MAC address of the second server, where the MAC address of the personal information platform is unique and unique. Meanwhile, the shared personal information platform also randomly generates a public key and stores the public key in a database of the shared personal information platform.
Step S220: and acquiring a credit inquiry request sent by the first server, and inquiring the credit record of the first server according to the credit inquiry request.
In some embodiments, the credit investigation request sent by the scientific and technological service demander a is obtained by the credit investigation participation mechanism B leading the developed shared personal information platform, and the credit record of the scientific and technological service demander a is queried according to the credit investigation request. In some embodiments, querying the credit record of the scientific and technological service requester a mainly queries at least one of liability information and overdue information of the scientific and technological service requester a.
Step S230: and when the credit record of the first server is qualified, sending the public key, the root certificate of the second server, the machine code acquisition tool and the personal certificate making tool to the first server.
In some embodiments, when the first server has no overdue information and the liability information of the first server is within a set threshold, the credit record of the first server is qualified. And the shared personal information platform inquires the credit record of the scientific and technological service demand party A according to the credit inquiry request of the scientific and technological service demand party A, and if the scientific and technological service demand party A has no overdue information or has no liability or liability information within a set threshold range, the shared personal information platform downloads the root certificate of the aged second server and sends the root certificate of the second server, a machine code acquisition tool and a personal making tool to the scientific and technological service demand party A together.
Referring to fig. 3, the authorization authentication method for a scientific and technological service provided in the present application includes the following steps when a third server is used as an execution subject:
step S310: the encrypted data sent by the first server is obtained, the encrypted data is decrypted by utilizing the private key of the third server to generate a decrypted random value, and the decrypted random value is sent to the first server.
In some embodiments, the third server is a server of the science and technology service provider C, where the science and technology service provider C obtains the encrypted data sent by the science and technology service demander a, decrypts the encrypted data by using the private key of the science and technology service provider C, and generates the decrypted random value after decrypting. The technical service provider C displays the decrypted random value to the technical service demand side A, if at least 2 random values in the random value and the decrypted random value in the technical service demand side A are the same, the technical service demand side A is proved to be the technical service demand side A, the technical service provider C is the technical service provider C, and the authentication of the participating mechanism B passing credit in the middle is finished, namely the authorization authentication is finished.
Referring to fig. 4, in some embodiments of the present application, an authorization and authentication system 400 for a scientific and technological service is further provided, including a first server 410, a second server 420, and a third server 430, which are described in detail below.
In some embodiments, the first server 410 is a server of the scientific and technological service demander a, the second server 420 is a server of the shared personal information platform that the credit participating institution B dominates the development, and the third server 430 is a server of the scientific and technological service provider C.
In some embodiments, the first server 410 sends a credit inquiry request to the second server 420. That is, the scientific and technological service requiring party A sends a credit inquiry request to the shared personal information platform.
In some embodiments, the second server 420 generates a root certificate for the second server 420 from the MAC address of the second server 420 and randomly generates the public key. The participating mechanism B of credit takes the initiative to develop a shared personal information platform randomly to generate a public key, and stores the public key in a database of the shared personal information platform, and the shared personal information platform generates a root certificate containing the MAC address of the second server 420. The root certificate of the second server 420 is the root certificate containing the MAC address of the second server 420
In some embodiments, the second server 420 queries the credit record of the first server 410 according to the credit query request, and when the credit record of the first server 410 is qualified, the second server 420 sends the public key, the root certificate of the second server 420, the machine code acquisition tool, and the personal certificate creation tool to the first server. And the shared personal information platform inquires the credit record of the scientific and technological service requiring party A when acquiring the credit inquiry request of the scientific and technological service requiring party A. In some embodiments, the credit record includes at least one of liability information and overdue information, and the credit record of the scientific and technological service demander a is qualified when the scientific and technological service demander a has no overdue information and the liability information of the scientific and technological service demander a is within a set threshold. In some embodiments, the shared personal information platform stores the credit record query results of the scientific and technological service demander a in a database of the shared personal information platform for half a year. When the credit record of the scientific and technological service requiring party a is qualified, the shared personal information platform automatically transmits the public key, the root certificate containing the MAC address of the second server 420, the machine code acquisition tool and the personal certificate making tool to the scientific and technological service requiring party a.
In some embodiments, the first server 410 generates a first server 410 machine code that includes the root certificate of the second server 420 from the machine code acquisition tool and the personal certificate generation tool, and generates a random value from the first server 410 machine code. The technical service requiring party A generates a machine code of the technical service requiring party A by using the acquired machine code acquiring tool and the personal certificate making tool, wherein the machine code of the technical service requiring party A comprises a root certificate of a MAC address of a shared personal information platform. In some embodiments, the scientific and technological service requiring party a may use a mobile terminal such as a mobile phone, a tablet or a computer, and generate a machine code corresponding to the mobile terminal such as the mobile phone, the tablet or the computer, that is, the first server machine code according to the acquired machine code acquiring tool and the personal certificate making tool. Because mobile terminals such as mobile phones, tablets or computers adopted by the scientific and technological service demander A only correspond to one machine code, the generated first server machine code binds the mobile terminals used by the scientific and technological service demander A by credit. In some embodiments, the credit binding of the mobile terminal used by the science and technology service demander a can also be bound with the machine code of the mobile terminal through the password (face or fingerprint, etc.) of the mobile terminal. The scientific and technological service demander A generates a random value according to the machine code of the first server 410. In some embodiments, the random values include: at least one of a time stamp, a requested loan period, a requested loan amount, a contract number, a user concurrency number, and liability information.
In some embodiments, the first server 410 encrypts the random value with the public key to generate encrypted data and sends the encrypted data to the third server 430. The scientific and technological service demander A encrypts the random value by using the public key acquired from the shared personal information platform to generate encrypted data. The scientific and technological service demander a transmits the encrypted data to the scientific and technological service provider C.
In some embodiments, the third server 430 decrypts the encrypted data using the third server 430 private key to generate a decrypted random value and sends the decrypted random value to the first server 410. After the scientific and technological service demand side C acquires the encrypted data, the private key of the scientific and technological service demand side C is utilized to decrypt the encrypted data, and a decryption random value is generated. And, the science and technology service demander C transmits the decrypted random value to the science and technology service demander a.
In some embodiments, the first server 410 obtains a decrypted random value, compares the decrypted random value to the random values, and completes authorization authentication when at least two of the decrypted random value and the random value are the same. And when the decrypted random value is acquired by the scientific and technological service demand party A, comparing the decrypted random value with the random value, and completing authorization authentication when at least two of the decrypted random value and the random value are the same, namely proving that the scientific and technological service demand party A is the scientific and technological service demand party A, the scientific and technological service provider C is the scientific and technological service provider C, and the authentication of the participating mechanism B through credit investigation in the middle is finished.
In some embodiments, the science and technology service provider C uploads the loan record and the expiration record of the science and technology service requester A to the shared personal information platform. In some embodiments, when the science and technology service demand side a repays the loan in time, the science and technology service provider C can be applied for eliminating overdue records, and when the credit records of the science and technology service demand side a are repaired to be qualified, the science and technology service demand side a can be applied for the loan again.
The authorization authentication method and the authorization authentication system for the scientific and technological service can also be applied to security software authorization deployment and login. In the security software login, firstly, a root certificate containing a server MAC address of a platform side for developing the security software is obtained, and a machine code is correspondingly determined according to the root certificate; encrypting the machine code by utilizing an RSA asymmetric encryption and decryption algorithm to generate an encryption root certificate; sending the encryption root certificate to a hardware machine to be deployed and installed with the security software; acquiring a machine code of the hardware machine, encrypting the machine code according to the encryption root certificate and the authorization information, and generating an encrypted ciphertext; then the authorization software decrypts the encrypted ciphertext through the decryption module, the user can access the security software through the login module, and the user registration number and the concurrent access number are controlled by the encryption root certificate.
The authorization authentication method and the authorization authentication system for the science and technology service are suitable for financial scenes such as science and technology service transaction, decentralization authorization and decentralization transaction can be achieved, and a shared personal information platform is built by credit-solicited participation institutions. Meanwhile, multi-field verification (including 17-bit time stamp generated by acquiring system time when running the shared personal information platform as a verification field) and collection of necessary information (including liability information) of transaction (interaction) are completed at one time, so that leakage of unnecessary information is prevented. The method also combines the C/S architecture (local area network architecture) and the B/S architecture (wide area network architecture), writes the limitations of the user registration number, the concurrent registration number and the like into a database through software decryption integers, and cooperates with interfaces such as authority management and the like to limit the user registration number, the concurrent registration number and the like, thereby controlling the concurrent access number of websites and ensuring the stability and the performance of system operation.
Those skilled in the art will appreciate that all or part of the functions of the various methods in the above embodiments may be implemented by hardware, or may be implemented by a computer program. When all or part of the functions in the above embodiments are implemented by means of a computer program, the program may be stored in a computer readable storage medium, and the storage medium may include: read-only memory, random access memory, magnetic disk, optical disk, hard disk, etc., and the program is executed by a computer to realize the above-mentioned functions. For example, the program is stored in the memory of the device, and when the program in the memory is executed by the processor, all or part of the functions described above can be realized. In addition, when all or part of the functions in the above embodiments are implemented by means of a computer program, the program may be stored in a storage medium such as a server, another computer, a magnetic disk, an optical disk, a flash disk, or a removable hard disk, and the program in the above embodiments may be implemented by downloading or copying the program into a memory of a local device or updating a version of a system of the local device, and when the program in the memory is executed by a processor.
The foregoing description of the invention has been presented for purposes of illustration and description, and is not intended to be limiting. Several simple deductions, modifications or substitutions may also be made by a person skilled in the art to which the invention pertains, based on the idea of the invention.

Claims (10)

1. An authorization authentication method for a scientific and technological service, comprising:
sending a credit inquiry request to a second server, and acquiring a public key sent by the second server, a root certificate of the second server, a machine code acquisition tool and a personal certificate making tool;
generating a first server machine code containing a root certificate of a second server according to the machine code acquisition tool and the personal certificate making tool;
generating a random value according to the first server machine code, encrypting the random value by utilizing the public key to generate encrypted data, and transmitting the encrypted data to a third server;
and obtaining a decrypted random value decrypted by the third server, comparing the decrypted random value with the random value, and completing authorization authentication when at least two of the decrypted random value and the random value are the same.
2. The method for authenticating authorization of a scientific service according to claim 1, wherein the random value includes: at least one of a time stamp, a requested loan period, a requested loan amount, a contract number, a user concurrency number, and liability information.
3. An authorization authentication method for a scientific and technological service, comprising the following steps:
generating a root certificate of the second server according to the MAC address of the second server, and randomly generating a public key;
acquiring a credit inquiry request sent by a first server, and inquiring a credit record of the first server according to the credit inquiry request;
and when the credit record of the first server is qualified, sending the public key, the root certificate of the second server, the machine code acquisition tool and the personal certificate making tool to the first server.
4. A method of authorising authentication of a scientific service according to claim 3, characterised in that the credit record includes at least one of liability information and overdue information.
5. The method for authenticating an authorization of a scientific service according to claim 4, wherein when the credit record of the first server is qualified, the method comprises:
and when the first server has no overdue information and the liability information of the first server is in the set threshold range, the credit record of the first server is qualified.
6. An authorization authentication method for a scientific and technological service, comprising the following steps:
and obtaining the encrypted data sent by the first server, decrypting the encrypted data by using a private key of the third server to generate a decrypted random value, and sending the decrypted random value to the first server.
7. An authorization authentication system for scientific and technological service is characterized by comprising a first server, a second server and a third server;
the first server sends a credit inquiry request to a second server;
the second server generates a root certificate of the second server according to the MAC address of the second server, and randomly generates a public key; the second server inquires the credit record of the first server according to the credit inquiry request, and when the credit record of the first server is qualified, the second server sends the public key, the root certificate of the second server, the machine code acquisition tool and the personal certificate making tool to the first server;
the first server generates a first server machine code containing a root certificate of the second server according to the machine code acquisition tool and the personal certificate making tool, and generates a random value according to the first server machine code; the first server encrypts the random value by using the public key to generate encrypted data and sends the encrypted data to a third server;
the third server decrypts the encrypted data by using a private key of the third server to generate a decrypted random value, and sends the decrypted random value to the first server;
the first server acquires the decryption random value, compares the decryption random value with the random value, and completes authorization authentication when at least two of the decryption random value and the random value are the same.
8. The system for authorized authentication of a scientific service of claim 7, wherein said random value includes: at least one of a time stamp, a requested loan period, a requested loan amount, a contract number, a user concurrency number, and liability information.
9. The system for authorized authentication of a scientific service according to claim 7, wherein when the credit record of the first server is qualified, comprising:
the credit record includes at least one of liability information and overdue information; and when the first server has no overdue information and the liability information of the first server is in the set threshold range, the credit record of the first server is qualified.
10. A computer readable storage medium, characterized in that the medium has stored thereon a program, which is executable by a processor to implement the method of any of claims 1-6.
CN202211609356.6A 2022-12-14 2022-12-14 Authorization authentication method and system for scientific and technological service Pending CN116015790A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211609356.6A CN116015790A (en) 2022-12-14 2022-12-14 Authorization authentication method and system for scientific and technological service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211609356.6A CN116015790A (en) 2022-12-14 2022-12-14 Authorization authentication method and system for scientific and technological service

Publications (1)

Publication Number Publication Date
CN116015790A true CN116015790A (en) 2023-04-25

Family

ID=86027437

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211609356.6A Pending CN116015790A (en) 2022-12-14 2022-12-14 Authorization authentication method and system for scientific and technological service

Country Status (1)

Country Link
CN (1) CN116015790A (en)

Similar Documents

Publication Publication Date Title
JP6873270B2 (en) Handling of transaction activities based on smart contracts in the blockchain Caution Methods and devices for protecting data
US11196569B2 (en) Systems and methods for accuracy and attestation of validity of data shared in a secure distributed environment
US10671733B2 (en) Policy enforcement via peer devices using a blockchain
CN110417750B (en) Block chain technology-based file reading and storing method, terminal device and storage medium
US8261073B2 (en) Digital rights management method and apparatus
US6898707B1 (en) Integrating a digital signature service into a database
WO2021169107A1 (en) Internet identity protection method and apparatus, electronic device, and storage medium
US20190354606A1 (en) Private Cryptocoinage in Blockchain Environments
KR20200002985A (en) Data sharing methods, clients, servers, computing devices, and storage media
JP2008501176A (en) Information distribution system that protects privacy
JP2008501177A (en) License management in an information distribution system that protects privacy
US20070005989A1 (en) User identity privacy in authorization certificates
CN112215609B (en) House property user identity authentication method and device based on super account book and electronic equipment
CN113169866A (en) Techniques to prevent collusion using simultaneous key distribution
JPWO2019082442A1 (en) Data registration methods, data decryption methods, data structures, computers, and programs
JP7462903B2 (en) User terminal, authenticator terminal, registrant terminal, management system and program
CN114666168A (en) Decentralized identity certificate verification method and device, and electronic equipment
EP4348915A1 (en) Endorsement claim in a verifiable credential
CN110914826B (en) System and method for distributed data mapping
US11870898B2 (en) Split keys for wallet recovery
WO2021160981A1 (en) Methods and apparatus for controlling access to personal data
CN116015790A (en) Authorization authentication method and system for scientific and technological service
CN111080274B (en) Payment method and system based on Corda database
TWI737139B (en) Personal data protection application system and personal data protection application method
US20230418979A1 (en) Data resolution using user domain names

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination