Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Acquired information sharing method and system based on dual authentication and multiple protection measures

A technology of double authentication and protective measures, applied in the transmission system, electrical components, etc., can solve the problems of potential safety hazards, bottlenecks of big data information interaction and sharing, and failure to take data signatures, etc., to achieve the effect of solving potential safety hazards

Inactive Publication Date: 2019-12-24
STATE GRID ZHEJIANG ELECTRIC POWER CO MARKETING SERVICE CENT +4
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In terms of security authentication, traditional Web Service interface interactions mostly use header information (SoapHeader) to transmit user authentication information. This authentication method is easy to intercept user information and has certain security risks; the size of transmitted data is limited, and the There is a bottleneck in the interaction and sharing of big data information
In addition, in terms of data sharing, most of the source data is directly provided on demand, and technical means such as data signature or watermarking are not adopted. If the data is tampered with during transmission, post-verification cannot be performed, and the source of the data cannot be traced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Acquired information sharing method and system based on dual authentication and multiple protection measures
  • Acquired information sharing method and system based on dual authentication and multiple protection measures
  • Acquired information sharing method and system based on dual authentication and multiple protection measures

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0036] Such as figure 1 , 3 As shown, this technical solution adopts the "two-three-two" information interaction innovation mode, which mainly includes the security authentication of the "double authentication method", the interaction mode of the "three-way handshake protocol", and the data protection of the "two protection measures". Among them, the security authentication of the "two-factor authentication method" refers to account authentication and token authentication. The principle of the method is as follows: figure 1 Shown; the interaction mode of the three-way handshake protocol is as follows figure 2 Shown; the data protection of the two protection measures is as follows image 3 shown.

[0037] Such as figure 1 Shown, the present invention comprises the following steps:

[0038] 1) The client initiates an account aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an acquired information sharing method and a system based on dual authentication multiple protection measures, and relates to an acquired information sharing method. In the prior art, head information is used for transmitting user identity verification information, and user information is easy to intercept in the method. The method comprises the following steps: a client initiates an account authentication request; if the authentication is passed, randomly generating a temporary token, and returning the temporary token to the receiver; initiating the data request againafter obtaining the temporary token by the receiver, and decrypting the token by the sender after receiving the request and judging the validity of the token and the timeliness of the token; if the verification is passed, entering links of extracting data and assembling the data; the server extracts the acquired data and performs data desensitization; signing the data and encrypting the data; andsending the original text and the encrypted abstract to a receiver together. According to the method, an authentication method combining account authentication and token authentication is used, identity authentication service and data providing service are separated, and the security of interface interaction is greatly improved.

Description

technical field [0001] The invention relates to a collection information sharing method, in particular to a collection information sharing method and system based on double authentication and multiple protection measures. Background technique [0002] With the rapid advancement of the construction of the electricity consumption information collection system, the electricity consumption information collection system has fully entered the stage of deepening the application, and the information interaction and sharing between the electricity consumption information collection system and other business application systems is becoming more and more frequent, and the collected data is relatively sensitive. This also puts forward higher requirements for the security of collecting data, publishing and sharing. [0003] At present, the methods of data interaction and sharing between heterogeneous systems mainly include Web Service technology, message middleware, FTP / file sharing serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/0807H04L63/083
Inventor 叶方彬赵羚陈昊李熊王伟峰沈曙明李媛严华江韩霄汉姜驰胡瑛俊徐世予田家乐蒋群韩鑫泽石贇超
Owner STATE GRID ZHEJIANG ELECTRIC POWER CO MARKETING SERVICE CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products