CA2986828C - Data recording method, device and system, and computer storage medium - Google Patents

Data recording method, device and system, and computer storage medium Download PDF

Info

Publication number
CA2986828C
CA2986828C CA2986828A CA2986828A CA2986828C CA 2986828 C CA2986828 C CA 2986828C CA 2986828 A CA2986828 A CA 2986828A CA 2986828 A CA2986828 A CA 2986828A CA 2986828 C CA2986828 C CA 2986828C
Authority
CA
Canada
Prior art keywords
data
image
key
state
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA2986828A
Other languages
French (fr)
Other versions
CA2986828A1 (en
Inventor
Yi Zhang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
10353744 Canada Ltd
Original Assignee
10353744 Canada Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 10353744 Canada Ltd filed Critical 10353744 Canada Ltd
Publication of CA2986828A1 publication Critical patent/CA2986828A1/en
Application granted granted Critical
Publication of CA2986828C publication Critical patent/CA2986828C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Abstract

A data recording method, device and system, and a computer storage medium. The method comprises: collecting data of each state of each party in an e-commerce transaction (202); generating an image according to the collected data (204); obtaining a key of the data (206); correspondingly storing the collected data and the key of the data (208); embedding the key within the image (210); storing the image having the embedded key (212); performing digital signing on the image having the embedded key to generate a data image electronic certificate (214); generating check data with regard to the image having the embedded key (216); storing the check data (218). In the data recording method, device and system, and the computer storage medium, digital signing is performed on the image having the embedded key to generate the data image electronic certificate, it is not easy to tamper with the generated image and the data image electronic certificate, the data and the key are correspondingly stored, and the image having the embedded key and the check data are stored separately, not easily obtained at the same time, subject to multiple instances of security protection, and highly secure.

Description

2 PCT/CN2015/078141 Title: DATA RECORDING METHOD, DEVICE AND SYSTEM, AND COMPUTER
STORAGE MEDIUM
Technical Field The present invention relates to data process field, especially to data process method, device and system, and computer storage medium.
Background Technology With the development of network technology, the continuous development of e-commerce, the traditional use of various kinds of objects, tickets, receipts, etc. are replaced by electronic, its manifestations are mainly three kinds: character data, image data and streaming media data. The kind of e-commerce activity is replaced by the image data, the image represents the actual attribute of the item, and the security is important in the e-commerce activity.
Traditional e-commerce activities used in the electronic certificate image goods can be copied freely, or even tamper with low security.
Summary of the invention Based on this, it is necessary to improve the security of data in the e-commerce activities by providing data recording method, device and system, and computer storage medium for solving the problem that the data in the traditional e-commerce activity is easily copied and tampered.
The data recording method comprises:
Collecting the data of the state of each e-commerce transaction party;
Generating the image based on the collected data;
Obtaining the key of the said data;
Storing the collected data and the key of the said data;
Embedding the key in the image;
Storing the image that is embedded into the key;
Generating the data image electronic certificate by digitally signing the embedded image;
Generating check data for the embedded image of the key;
Storing the said check data.
The data recording device comprises:
The collection module for collecting the data of each state of each party in e-commerce transactions;
The image generation module for generating an image based on the collected data;

The key generation module for acquiring the key of the said data;
The storage module for storing the collected data and the key of the said data;
The embedding module for embedding the key in the said image;
The memory module is further configured to store the image that is embedded into the key;
The digital signature module for digitally signing the image that is embedded into the key to generate a data image electronic certificate;
The check generation module for generating check data for the image that is embedded into the key;
The memory module is further configured to store the check data.
The data recording system comprises an image generation processing server, a verification server, a signature server and a cloud database server connected to each other through a network;
The image generation processing server is used for collecting the data of each state of each party in the e-commerce transaction and generating the image based on the collected data and acquiring the key of the data, embedding the key in the image;
The verification server for generating check data for the image that is embedded into the key;
The signature server for digitally signing the image that is embedded into the key to generate a data image electronic certificate;
The said cloud database server for storing the data and the key correspondingly and storing the embedded image and the check data.
One or more computer storage media contains computer-executable instructions, the said computer executable instruction is used for executing a kind of data recording method, and the method comprises the following steps:
Collecting the data of the state of each e-commerce transaction party;
Generating an image based on the collected data;
Obtaining the key of the said data;
Storing the collected data and the key of the said data;
Embedding the key in the image;
Store the image that is embedded into the key;
The image that is embedded into the key is digitally signed to generate a data image electronic certificate;
Generating check data for the embedded image of the key;
Storing the said check data.
The aforesaid data recording method, device and system, and the computer storage medium, convert the data into the image and embeds the key of the data into the image, digital signing is performed on the image having the embedded key to generate the data image electronic certificate, it is not easy to tamper with the generated image and the data image electronic certificate, the data and the key are correspondingly stored, and the image having the embedded key and the check data are stored separately, not easily obtained at the same time, subject to multiple instances of security protection, and highly secure. The data of each state of each party in the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixed, which ensure the continuity and integrity of the data. The generated data image electronic certificate can be circulated in various electronic devices, through the background authentication system to identify its authenticity; after identifying the authenticity, and then extracted the important transaction state data from the image.
Brief Description Figure 1 is an architectural block diagram of the data recording system in one example;
Figure 2 is a flow chart of the data recording method in one example;
Figure 3 is a block diagram of the structure of the data recording device in one example;
Figure 4 is an internal schematic diagram of the server in one example.
Description of the Preferred Examples The present invention will be described in further detail with reference to the accompanying drawings and the accompanying examples, so as to describe the invention purposes, technical solutions and advantages more clearly. It is to be understood that the specific examples described herein are merely illustrative of the invention and are not intended to limit the invention.
Figure 1 is an architectural block diagram of the data recording system in one example. As shown in Figure 1, the data recording system includes an image generation processing server 110, a verification server 120, a digital certificate management server 130, a signature server 140, and a cloud database server 150. The image generation processing server 110, the verification server 120, the digital certificate management server 130, the signature server 140, and the cloud database server 150 are connected via a local area network and connected to the Internet 170 through the firewall 160.
The image generation processing server 110 collects the data of the respective states in the e-commerce transaction and generates an image based on the collected data and acquires the key of the data to embed the key in the image.
Specifically, the data of each state of each party in the e-commerce transaction may include the warehouse information, the generated order information, the delivery information, and the goods receipt information. The end of the transaction and the ownership of the goods and other information. Among them, the warehouse information can include the items belong to the warehouse, such as No. 1 Warehouse, ABC Building, Futian District, Shenzhen.
The order information can include order generation time, item information in order, order number, and
3 consignee information. The consignee information may include the consignee's name, the consignee's address, and the consignee's contact details. The shipping information may include the name of the logistics company, the invoice number, the delivery time, and the consignee information. The consignor information may include the name of the consignor, the address of the consignor, and the contact information of the consignor. The receipt information may include receipt information, and receipt time. The signer information can sign the recipient name, picture, ID information and so on.
The data of each state of each party in the e-commerce transaction may be generated in various aspects and stored on the cloud database server 150.
The image generation processing server 110 may obtain data of each state in the e-commerce transaction from the cloud database server 150.
In one example, the image generation processing server 110 is further configured to generate a key for the data using an order number, or a key for generating the data using an order number and a system clock.
Specifically, the key of the data is generated by the order number, and the key of the data may be the same as the order number. Using the order number and the system clock to generate the data key, you can obtain the MD5 value after calculating the order number and the system clock to generate the corresponding key. The key can also be a UUID (Universally Unique Identifier) algorithm. The UUID refers to the number generated on a machine, which guarantees that all machines in the same space and time are unique. The key can be represented by 8-bit, 16-bit, 32-bit, 64-bit, and so on. Using the order number or order number and the system to generate data key, simple and convenient, and high security.
In one example, the image generation processing server 110 is also used to add the key to the binary code of the image.
Specifically, the key is a character that embeds the key in the binary code of the image, and the specific typing location may be at the head of the image binary code, either in the middle or in the tail, as long as the original image file is not destroyed.
The verification server 120 is configured to generate the check data for the image that is embedded into the key.
Specifically, the verification server 120 may generate a check data by performing a function operation on an image that is embedded into the key by other algorithms such as a hash algorithm.
The digital certificate management server 130 is used to provide a digital certificate. The data certificate management server 130 is used to issue and manage digital certificates. The digital certificates can be used to encrypt, sign and so on.
The signature server 140 is used to digitally sign an image that is embedded into the key to
4 generate a data image electronic certificate.
In particular, the signature server 140 is further configured to digitally generate an electronic image of the data image by digitally signing the embedded image with the supplied digital certificate.
The digital signature is a generic physical signature similar to that written on paper, but uses a technique of public key encryption to identify digital information. A set of digital signatures usually defines two complementary operations, one for signing and the other for authentication. The digital signature is to encrypt the digest information with the sender's private key and send it to the recipient along with the original text. The recipient can decrypt the encrypted digest information only with the public key of the sender, and then use the hash function to generate a summary information on the original text received, compared with the deciphered summary information, if the same, then the received information is complete, but has not been modified in the transmission process, otherwise the information has been modified, so the digital signature can verify the integrity of the information. There are many digital signature algorithms, which can be RSA (public key encryption algorithm), ECC, and so on. RSA public key encryption algorithm was introduced in 1977 by Ron Rivest, Adi Sliamir and Leonard Adleman. ECC is an elliptic encryption algorithm, which is a public key cryptography system, originally proposed by Kobiitz and Miller in 1985, whose mathematical basis is to use the rational points on the elliptic curve to compose the calculation of elliptic discrete logarithms on Abel additive group.
The cloud database server 150 stores the data and the key corresponding to the image and the check data that is embedded into the key.
The digital certificate management server 130 may not be included in other data recording systems.
In the data recording system converts the data into the image and embeds the key of the data into the image, digital signing is performed on the image having the embedded key to generate the data image electronic certificate, it is not easy to tamper with the generated image and the data image electronic certificate, the data and the key are correspondingly stored, and the image having the embedded key and the check data are stored separately, not easily obtained at the same time, subject to multiple instances of security protection, and highly secure. The data of each state of each party in the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixed to ensure the continuity and integrity of the data. The generated data image can be circulated in various electronic devices, the background authentication system is used to identify its true #, and then identify the authenticity, and then extracted from the image of the transaction state of important data.
Figure 2 is a flow chart of the number of examples: a recording method. As shown in Figure 2, the data recording method includes:
Step 202, and collects the data of each state of the parties.
Specifically, the data of each state in the e-commerce transaction may include information such as the warehouse information, the generation order information, the delivery information, the end of the goods receipt transaction, and the ownership of the goods. Among them, the warehouse information can include the items belong to the warehouse, such as No. 1 Warehouse, ABC
Building, Futian District, Shenzhen. The order information can include order generation time, item information in order, order number, and consignee information. The consignee information may include the name of the consignee, and the consignee address of the consignee.
The shipping information may include the name of the logistics company, the delivery time, and the consignor information. The consignor information may include the name of the consignor, the address of the consignor, and the contact information of the consignor. The receipt information may include receipt information, and receipt time. The signer information can sign the recipient name, picture, ID information and so on.
The data of each state of the each party in the transaction can be generated in all aspects and stored on the cloud database server.
Step 204 generates an image based on the collected data.
Step 206 obtains the key of the data.
In one example, the step of obtaining the key of the data comprises:
generating the key of the data using the order number; or generating the key of the data using the order number and the system clock.
Specifically, the key of the data is generated using the order number, and the key of the data can be the same as the order number. Using the order number and the system clock to generate the data key, you can obtain the MD5 value after calculating the order number and the system clock to generate the corresponding key. The key can also be generated using the UUID
algorithm, which is a number generated on a machine that guarantees that all machines in the same space are unique.
The key can be represented by 8-bit, 16-bit, 32-bit, 64-bit, and so on. Using the order number or order number and the system to generate data key, simple and convenient, and high security.
In Step 208, the collected data is stored corresponding to the key of the data.
Specifically, the collected data and the data key are stored in the cloud database server together.
Step 210, embedding the key in the image.
In one example, the step of embedding the key in the image comprises adding the key to the binary code of the image.
Specifically, the key is a string in which the key can be embedded in the binary code of the image, and the specific typing position may be at the head of the image binary code, either in the middle or in the tail, as long as the original image file is not destroyed.
In Step 212, an image that is embedded into the key is stored.
In Step 214, the data of the embedded key is digitally signed to generate a data image electronic certificate.
Specifically, a data signature electronic certificate is generated by digitally signing the embedded image with a digital certificate provided in advance.
Digital signatures are many ways, through RSA, ECC and other algorithms to achieve.
In Step 216, the check data is generated for the image that is embedded into the key.
The algorithm is used to generate the calibration data for the image embedded with the key by using other algorithms such as hash algorithm.
Step 218 stores the check data.
The data recording method, converts the data into the image and embeds the key of the data into the image, digital signing is performed on the image having the embedded key to generate the data image electronic certificate, it is not easy to tamper with the generated image and the data image electronic certificate, the data and the key are correspondingly stored, and the image having the embedded key and the check data are stored separately, not easily obtained at the same time, subject to multiple instances of security protection, and highly secure. The data of each state of each party in the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixed, which ensure the continuity and integrity of the data. The generated data image electronic certificate can be circulated in various electronic devices, through the background authentication system to identify its authenticity; after identifying the authenticity, and then extracted the important transaction state data from the image.
Figure 3 is a block diagram showing the structure of the data recording device in one example.
As show in Figure 3, the data recording device includes an acquisition module 310, an image generation module 320, a key generation module 330, an embedding module 340, a digital signature module 350, a check generation module 360, and a storage module 370. Among them:
The collection module 310 is used to collect the data of the respective states of each party.
Specifically, the data of each state in the e-commerce transaction may include warehouse information, information such as order information, shipping information, receipt information, end of transaction, and ownership of the goods. Among them, the warehouse information can include the items belong to the warehouse, such as No. 1 Warehouse, ABC Building, Futian District, Shenzhen. The order information can include order generation time, item information in order, order number, and consignee information. The consignee information may include the consignee's name, the consignee's address, and the consignee's contact details. The shipping information may include the name of the logistics company, the invoice number, the delivery time, and the consignee information. The consignor information may include the name of the consignor, the address of the consignor, the contact information of the consignor, etc.) The goods receipt information may include the receipt information, and the receipt time. The signer information can sign the recipient name, picture, ID information and so on.
The image generation module 320 is configured to generate the image based on the collected data.
The key acquisition module 330 is used to acquire the key of the data.
In one example, the key acquisition module 330 is also used to generate the key for the data using the order number, or to generate the key of the data using the order number and the system clock.
Specifically, the key of the data is generated using the order number, and the key of the data can be the same as the order number. Using the order number and the system clock to generate the data key, you can obtain the MD5 value after calculating the order number and the system clock to generate the corresponding key. The key can also be generated using the UUID
algorithm, which is a number generated on a machine that guarantees that all machines in the same space are unique.
The key can be represented by 8-bit, 16-bit, 32-bit, 64-bit, and so on. Using the order number or order number and the system to generate data key, simple and convenient, and high security.
The storage module 370 is used to store the collected data and the key of the data.
The embedding module 340 is used to embed the key in the image.
In one example, the embedding module 340 is also used to add the key to the binary code of the image. Specifically, the key is a string in which the key can be embedded in the binary code of the image, and the specific typing position may be at the head of the image binary code, either in the middle or in the tail, as long as the original image file is not destroyed.
The storage module 370 is also used to store an image of the embedded key.
The digital signature module 350 is used for digitally signing the embedded image to generate the data image electronic certificate. Specifically, a data signature electronic certificate is generated by digitally signing the embedded image with a digital certificate provided in advance. There are many digital signature algorithms, such as RSA, ECC and other algorithms.
The verification generation module 360 is used to generate the check data for the image that is embedded into the key. The algorithm is used to generate the calibration data for the image embedded with the key by using other algorithms such as hash algorithm.
The storage module 370 is used to store the check data.
The aforesaid data recording method converts the data into the image and embeds the key of the data into the image, digital signing is performed on the image having the embedded key to generate the data image electronic certificate, it is not easy to tamper with the generated image and the data image electronic certificate, the data and the key are correspondingly stored, and the image having the embedded key and the check data are stored separately, not easily obtained at the same time, subject to multiple instances of security protection, and highly secure.
The data of each state of each party in the e-commerce transaction generates an image, and the transaction data of each stage is relatively fixed, which ensure the continuity and integrity of the data. The generated data image electronic certificate can be circulated in various electronic devices, through the background authentication system to identify its authenticity; after identifying the authenticity, and then extracted the important transaction state data from the image.
Figure 4 is an internal schematic diagram of the server in one example. As shown in Figure 4, it is the internal structure of a server in one of the examples including a processor, a storage medium, a memory, and a network interface connected via a system bus. Wherein the storage medium of the server stores operating system, database and data recording device for storing data, keys, images and check data in the quotient transaction, and the data recording device for realizing a data applicable to a server Data record method. The processor of the server is used to provide calculation and control capabilities to support the operation of the entire server. The memory of the server provides an environment for the operation of the network transaction information processing device in the storage medium. The display screen of the server may be a liquid crystal display screen or an electronic ink display screen. The input device may be a touch layer covered on the display screen or a button, a trackball or a touch panel provided on the terminal housing, or an external keyboard, touch pad or mouse. The network interface of the server is used to communicate with an external terminal over a network connection, such as a request sent by the receiving terminal and to return data to the terminal. The server can be implemented as a separate server or a server cluster of multiple servers.
The ordinary technicians in the field that can understand and implement all or part of the processes in the above mentioned method of the examples which can be accomplished by means of a computer program that can be stored in a computer-readable storage medium.
The program may, when executed, include flows of all examples as described above. Among them, the storage medium can be a magnetic disk, an optical disk, a read-only memory (ROM) or a random access memory (RAM), etc.
The above-described examples show only a few methods of execution of the present invention, and its descriptions are comparatively specific and detailed, however, it can not to be construed as a limitation of the scope of the invention patent. It should be noted that various modifications and improvements can be made by those skilled in the field without departing froth the inventive concept, which belong to the protection scope of the present invention.
Accordingly, the protection scope of patent of the present invention should be measured by the appended claims.

Claims (47)

Claims:
1. A data recording system in an ecommerce transaction, the system comprising:
an image generation processing server configured to:
collect data of each state of each transaction party in the ecommerce transaction;
generate an image based on the collected data; and embed a key of the collected data into the image when acquiring the key of the collected data to improve security for image data;
a verification server configured to generate a verification data for the image that is embedded into the key;
a signature server configured to generate a digital certificate of a data image by digitally signing into the image with an embedded key to avoid copying or tampering of the electronic certificate image of goods in the ecommerce transaction;
a cloud database server configured to store separately the data and the key correspondingly and store separately the image with the embedded key and the verification data for the image with the embedded key to set multiple electronic security barriers for data acquisition;
wherein the image generation processing server, the verification server, the signature server and the cloud database server are connected to each other through a network; and wherein a background authentication system determines the authenticity of the generated data image electronic certificate.
2. The system of claim 1, wherein the image generation processing server is further configured to:
generate the key of the collected data by using an order number; or generating the key of the collected data by using both the order number and system clock.
3. The system of claim 1, wherein the image generation processing server is further configured to add the key into a binary code of the image.
4. The system of claim 1, wherein the image generation processing server is further configured to generate the verification data by using a hash algorithm.
5. The system of claim 1 further includes a digital certificate management server.
6. The system of claim 5, wherein the digital certificate management server is configured to issue and manage the digital certificate.
7. The system of claim 1, wherein data of each state of each transaction party includes warehouse information.
8. The system of any one of claims 1 and 7, wherein data of each state of each transaction party includes order information.
9. The system of any one of claims 1 and 7 to 8, wherein data of each state of each transaction party includes delivery information.
10. The system of any one of claims 1 and 7 to 9, wherein data of each state of each transaction party includes receipt information of goods.
11. The system of any one of claims 1 and 7 to 10, wherein data of each state of each transaction party is generated in various aspects during the ecommerce transaction.
12. The system of any one of claims 1 and 7 to 11, wherein data of each state of each transaction party is stored on the cloud database server.
13. The system of any one of claims 1 to 12, wherein the key is generated by an Universally Unique Identifier (UUID) algorithm.
14. A data recording method in an ecommerce transaction, the method including:
collecting data of each state of each transaction party in the ecommerce transaction to generate an image based on the collected data;
storing separately the collected data and a key of the collected data correspondingly when obtaining the key of the collected data to set multiple security barriers for data acquisition;
storing the image with an embedded key when embedding the key of the collected data into the image to improve security for image data;
generating a digital certificate of a data image by digitally signing into the image with an embedded key to avoid copying or tampering of the electronic certificate image of goods in the ecommerce transaction;
generating and storing a verification data for the image that is embedded into the key; and wherein a background authentication system determines the authenticity of the generated data image electronic certificate.
15. The method of claim 14 further includes:

generating the key of the collected data by using an order number; or generating the key of the collected data by using both the order number and system clock.
16. The method of claim 14 further includes adding the key into a binary code of the image.
17. The method of claim 14 further includes generating the verification data by using a hash algorithm.
18. The method of claim 14, wherein data of each state of each transaction party includes warehouse information.
19. The method of any one of claims 14 and 18, wherein data of each state of each transaction party includes order information.
20. The method of any one of claims 14 and 18 to 19, wherein data of each state of each transaction party includes delivery information.
21. The method of any one of claims 14 and 18 to 20, wherein data of each state of each transaction party includes receipt information of goods.
22. The method of any one of claims 14 and 18 to 21, wherein data of each state of each transaction party is generated in various aspects during the ecommerce transaction.
23. The method of any one of claims 14 and 18 to 22, wherein data of each state of each transaction party is stored on the cloud database server.
24. The method of any one of claims 14 to 23, wherein the key is generated by an Universally Unique Identifier (UUID) algorithm.
25. A data recording device in an ecommerce transaction, the device including:
a collection module configured to collect data of each state of each transaction party in the ecommerce transaction;
an image generation module configured to generate an image based on the collected data;
a key acquisition module configured to acquire a key of the collected data;
an embedding module configured to embed the key of the collected data into the image to improve security for image data;
a digital signature module configured to generate a digital certificate of a data image by digitally signing into the image with an embedded key to avoid copying or tampering of the electronic certificate image of goods in the ecommerce transaction;
a verification generation module configured to generate a verification data for the image that is embedded into the key; and a memory module configured to:
store separately the collected data and the key of the collected data correspondingly to set multiple security barriers for data acquisition;
store separately the image with the embedded key and the verification data for the image with the embedded key to set multiple security barriers for data acquisition; and wherein a background authentication system determines the authenticity of the generated data image electronic certificate.
26. The device of claim 25, wherein the key acquisition module is further configured to generate the key of the collected data by using an order number.
27. The device of claim 25, wherein the key acquisition module is further configured to generate the key of the collected data by using both the order number and system clock.
28. The device of claim 25, wherein the embedding module is further configured to add the key into a binary code of the image.
29. The device of claim 25, wherein the verification generation module is further configured to generate the verification data by using a hash algorithm.
30. The device of claim 25, wherein data of each state of each transaction party includes warehouse information.
31. The device of any one of claims 25 and 30, wherein data of each state of each transaction party includes order information.
32. The device of any one of claims 25 and 30 to 31, wherein data of each state of each transaction party includes delivery information.
33. The device of any one of claims 25 and 30 to 32, wherein data of each state of each transaction party includes receipt information of goods.
34. The device of any one of claims 25 and 30 to 33, wherein data of each state of each transaction party is generated in various aspects during the ecommerce transaction.
35. The device of any one of claims 25 and 30 to 34, wherein data of each state of each transaction party is stored on the cloud database server.
36. The device of any one of claims 25 to 35, wherein the key is generated by an Universally Unique Identifier (UUID) algorithm.
37. A computer storage medium for data recording device in an ecommerce transaction, the device including:
an execute program configured to:
collect data of each state of each transaction party in the ecommerce transaction to generate an image based on the collected data;
store separately the collected data and a key of the collected data correspondingly when obtaining the key of the collected data to set multiple security barriers for data acquisition;
store the image with an embedded key when embedding the key of the collected data into the image to improve security for image data;
generate a digital certificate of a data image by digitally signing into the image with an embedded key to avoid copying or tampering of the electronic certificate image of goods in the ecommerce transaction;
generate and storing a verification data for the image that is embedded into the key; and wherein a background authentication system determines the authenticity of the generated data image electronic certificate.
38. The computer storage medium of claim 37, wherein the execute program is further configured to:

generate the key of the collected data by using an order number; or generate the key of the collected data by using both the order number and system clock.
39. The computer storage medium of claim 37, wherein the execute program is further configured to add the key into a binary code of the image.
40. The computer storage medium of claim 37, wherein the execute program is further configured to generate the verification data by using a hash algorithm.
41. The computer storage medium of claim 37, wherein data of each state of each transaction party includes warehouse information.
42. The computer storage medium of any one of claims 37 and 41, wherein data of each state of each transaction party includes order information.
43. The computer storage medium of any one of claims 37 and 41 to 42, wherein data of each state of each transaction party includes delivery information.
44. The computer storage medium of any one of claims 37 and 41 to 43, wherein data of each state of each transaction party includes receipt information of goods.
45. The computer storage medium of any one of claims 37 and 41 to 44, wherein data of each state of each transaction party is generated in various aspects during the ecommerce transaction.
46. The computer storage medium of any one of claims 37 and 41 to 45, wherein data of each state of each transaction party is stored on the cloud database server.
47. The computer storage medium of any one of claims 37 to 46, wherein the key is generated by an Universally Unique Identifier (UUID) algorithm.
CA2986828A 2015-04-30 2015-04-30 Data recording method, device and system, and computer storage medium Active CA2986828C (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/078141 WO2016172982A1 (en) 2015-04-30 2015-04-30 Data recording method, device and system, and computer storage medium

Publications (2)

Publication Number Publication Date
CA2986828A1 CA2986828A1 (en) 2016-11-03
CA2986828C true CA2986828C (en) 2020-07-28

Family

ID=57198000

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2986828A Active CA2986828C (en) 2015-04-30 2015-04-30 Data recording method, device and system, and computer storage medium

Country Status (3)

Country Link
CN (1) CN106415588A (en)
CA (1) CA2986828C (en)
WO (1) WO2016172982A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109754356A (en) * 2018-12-26 2019-05-14 广州市中智软件开发有限公司 Checking method, system and the storage medium of electronics license based on layout files
CN110852239B (en) * 2019-11-06 2022-08-30 金陵科技学院 Face recognition system
CN111046400B (en) * 2019-11-19 2022-03-11 北京文石杰创信息技术有限公司 Gene type storage and analysis method and system based on physical image comprehensive information
CN113011945A (en) * 2021-03-16 2021-06-22 深圳市微创云启科技有限公司 Order number generation method and device, terminal equipment and storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5436970A (en) * 1993-02-18 1995-07-25 Eastman Kodak Company Method and apparatus for transaction card verification
JP4002068B2 (en) * 1999-05-17 2007-10-31 サムスン エレクトロニクス カンパニー リミテッド Digital video watermarking method
US8266437B2 (en) * 2001-06-25 2012-09-11 Jpmorgan Chase Bank, N.A. Electronic vouchers and a system and method for issuing the same
CN101409813A (en) * 2007-10-08 2009-04-15 陈诚 Image encoding method for preventing and identifying image tamper
CN101222334B (en) * 2008-01-11 2010-08-04 华中科技大学 Cipher token safety authentication method adopting picture interference
CN101847249A (en) * 2009-03-27 2010-09-29 上海德通能源环保科技有限公司 Method for implementing image digital watermark
CN101763613B (en) * 2009-10-23 2012-08-29 北京派瑞根科技开发有限公司 Method for signing on mixed electronic bill
US9355389B2 (en) * 2010-12-06 2016-05-31 Voltage Security, Inc. Purchase transaction system with encrypted payment card data
CN104077624A (en) * 2013-03-26 2014-10-01 中国银联股份有限公司 Methods and systems for generating and checking electronic note with anti-counterfeiting two-dimension code

Also Published As

Publication number Publication date
CN106415588A (en) 2017-02-15
CA2986828A1 (en) 2016-11-03
WO2016172982A1 (en) 2016-11-03

Similar Documents

Publication Publication Date Title
US11186111B1 (en) Digitally encoded seal for document verification
CN109740317A (en) A kind of digital finger-print based on block chain deposits card method and device
US20160292396A1 (en) System and method for authenticating digital content
US20070220260A1 (en) Protecting the integrity of electronically derivative works
US20140019761A1 (en) Self-contained electronic signature
US20120086971A1 (en) System and method for electronic transmission, storage, retrieval and remote signing of authenticated electronic original documents
CA2986828C (en) Data recording method, device and system, and computer storage medium
JP2008294596A (en) Authenticity assurance system for spreadsheet data
WO2017191472A1 (en) A verification system and method
US8631235B2 (en) System and method for storing data using a virtual worm file system
CN107508685A (en) The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment
CN103326856A (en) Cloud storage data responsibility confirmation structure and method based on two-way digital signature
CN113961956A (en) Method, device, equipment and medium for generating and applying tagged network information service
CN110889146B (en) Electronic signature method, device and storage medium
CN114172663A (en) Service right confirming method and device based on block chain, storage medium and electronic equipment
US20140181528A1 (en) File tamper detection
CA2986837C (en) Data authentication method, device and system, and computer storage medium
CN109756344B (en) Digital signature of document and verification method and device thereof
CN109586917B (en) Anti-quantum-computation signature method and system based on asymmetric key pool
JP2009535898A (en) Secure signature
JP2008035019A (en) Digital signature device
Chen et al. Privacy-aware image authentication from cryptographic primitives
CN114817890A (en) Electronic signature method and device of document, terminal equipment and storage medium
JP2013157777A (en) Information processing system and information processing method
Domingues et al. Digitally signed and permission restricted pdf files: A case study on digital forensics

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20200414