CN106953877A - One kind saves data authentication approach, system and device from damage - Google Patents

One kind saves data authentication approach, system and device from damage Download PDF

Info

Publication number
CN106953877A
CN106953877A CN201710293292.6A CN201710293292A CN106953877A CN 106953877 A CN106953877 A CN 106953877A CN 201710293292 A CN201710293292 A CN 201710293292A CN 106953877 A CN106953877 A CN 106953877A
Authority
CN
China
Prior art keywords
data
damage
user
server
saved
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710293292.6A
Other languages
Chinese (zh)
Other versions
CN106953877B (en
Inventor
徐茂兰
甄诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guoxin Kaning Data Technology Co Ltd
Original Assignee
Guoxin Kaning Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guoxin Kaning Data Technology Co Ltd filed Critical Guoxin Kaning Data Technology Co Ltd
Priority to CN201710293292.6A priority Critical patent/CN106953877B/en
Publication of CN106953877A publication Critical patent/CN106953877A/en
Application granted granted Critical
Publication of CN106953877B publication Critical patent/CN106953877B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

Save data authentication approach, system and device from damage the invention discloses one kind.Methods described includes:Receive user be directed to saved data from damage discern request;Discern request according to described and discern that request is targeted to have saved data generation sample data from damage;By the sample data and the corresponding card packet of depositing of data is saved from damage and is sent to and discerns server;Receive and discern server according to the sample data and deposit the probation report that card packet is successfully generated and returned;The probation report is supplied to user.Can the electronic evidence saved from damage of user discerned, improve the reliabilty and availability of electronic evidence, facilitate the preservation of electronic evidence and use.

Description

One kind saves data authentication approach, system and device from damage
Technical field
The present invention relates to field of navigation technology, more particularly to one kind saves data authentication approach, system and device from damage.
Background technology
Electronic evidence exists very with jural traditional evidence type in terms of the form of expression, preserving type and security Big difference.Summarize each side viewpoint, the characteristic of electronic evidence can be attributed to substantially it is following some:
(1) electronic evidence has technical.The high-technology of electronic evidence is a double-edged sword, on the one hand it is technical so that Electronic evidence, which has, collects rapid, it is easy to preserve, space-consuming is few, transmission and convenient transportation, the excellent spy such as can reappear repeatedly Point, but it is necessarily dependent upon certain technical equipment and technological means and existed simultaneously, and it is the product of electronic technology, be have left These storing technologies, computer technology, network technology, electronic evidence can not just be present, and can not also reproduce, and extract evidence and are also required to Corresponding electronic equipment and professional, more complexity.
(2) electronic evidence has plyability.Many times electronic evidence is not only presented as textual form, has also gathered shadow The variforms such as picture, picture, sound, picture, the diversity with stronger plyability and the form of expression.Because it is by calculating Machine and its network system are propagated, and are differed widely with the function mode of traditional evidence, thus there is also one on using and assert A little difference.
(3) electronic evidence has invisible nature, and electronic evidence is substantially " 0 " and " 1 " that a pile is processed into by coding rule, These coded datas are present on media in forms such as sound, light, electricity, magnetic, be can not direct viewing incorporeity, see Lose, can not touch, macroscopic tangible content only can be just shown as by specific equipment and technology.
(4) electronic evidence has fragility, just because of the particularity of technical and its preserving type of electronic evidence, During its storage, transmission and use, easily by external destruction, such as attacked by virus, hacker, monitor, eavesdrop, Intercept, distort, deleting etc., make its changed beyond recognition or even disappear.The fragility of electronic evidence, result in examining for electronic evidence Look into, assert difficulty, also as the big reason of some scholars and legislative bodies as circumstantial evidence.
It is a nascent that electronic data, which is saved from damage, today of high speed development in internet, the hysteresis quality of law, electron number Cause the legitimacy of electronic evidence to receive law according to the characteristic of evidence to query.Relative interconnections net is in quickly development, electronics instantly Data, which are saved from damage, seems very backward, during having become internet development there is presently no legal electronic data safety system One big problem.
Save blank from damage for contemporary electronic evidence, it is impossible to produce easily and fast the law of legal electronic evidence according to According to when the situation of cause legal dispute occurs, party needs to carry out electronic data the judicial expertise of electronic evidence, and carries out Cost is prohibitively expensive during judicial expertise, wastes time and energy, and the stand-by period is very long, causes the various problems such as the delay of case.
Therefore, how to save internet data from damage well, become available electronic evidence as skill urgently to be resolved hurrily Art problem.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on The one kind for stating problem saves data authentication approach, system and device from damage.
In a first aspect, the embodiment of the present invention, which provides one kind, saves data authentication approach from damage, including:
Receive user be directed to saved data from damage discern request;
Discern request according to described and discern that request is targeted to have saved data generation sample data from damage;
By the sample data and the corresponding card packet of depositing of data is saved from damage and is sent to and discerns server;
Receive and discern server according to the sample data and deposit the probation report that card packet is successfully generated and returned;
The probation report is supplied to user.
In some optional embodiments, it is described receive user be directed to saved data from damage discern request, specifically include:
Receive the document of agreement after the signature that user sends;Or
The agreement signature request of user is received, document of agreement is provided a user and is signed for user, obtain user's on-line signing Or the document of agreement after the signature uploaded after being signed under line.
In some optional embodiments, the generation sample data, and by the sample data and saved data from damage Corresponding card packet of depositing is sent to and discerns server, specifically includes:
Confirm whether the document of agreement received is effective document of agreement, when confirming the validity, according to what is confirmed the validity Document of agreement and discern described in being obtained from database request it is targeted saved data from damage, generate sample data;
Obtained from database saved from damage data it is corresponding save from damage digital certificates, subscriber identity information and deposit card coding, group Card packet is deposited into described;
By the sample data and deposit card packet and be sent to and discern server.
In some optional embodiments, the reception is discerned server and is bundled into according to the sample data with card data are deposited The probation report that work(is generated and returned, is specifically included:
Receive and discern server and save verification from damage according to what the sample data that receive and depositing demonstrate,proved that data detection saved data from damage Information and verification by when the probation report that generates and return.
In some optional embodiments, the above method also includes:
Receive and discern the mirror that server is returned according to the sample data and when depositing the successful identification report failure of card packet Failure notification is demonstrate,proved, user is provided by the failure notification of discerning.
Second aspect, the embodiment of the present invention, which provides one kind, saves data from damage and discerns device, including:
Request receiving module, for receive user be directed to saved data from damage discern request;
Sample generation module, sample is generated for discerning request according to and discerning the targeted data of having saved from damage of request Data;
Data transmission blocks, for by the sample data and having saved the corresponding card packet of depositing of data from damage and being sent to and discern Server;
Receiver module is reported, discern server for reception is successfully generated simultaneously according to the sample data with card packet is deposited The probation report of return;
Report provides module, for the probation report to be supplied into user.
In some optional embodiments, the request receiving module, specifically for:
Receive the document of agreement after the signature that user sends;Or
The agreement signature request of user is received, document of agreement is provided a user and is signed for user, obtain user's on-line signing Or the document of agreement after the signature uploaded after being signed under line.
In some optional embodiments, the sample generation module, specifically for:Confirming the document of agreement received is It is no be effective document of agreement, when confirming the validity, obtained according to the document of agreement confirmed the validity and from database described in Discern and ask targeted data of having saved from damage, generate sample data;Accordingly,
The data transmission blocks, specifically for:Obtained from database saved from damage data it is corresponding save from damage digital certificates, Subscriber identity information is encoded with card is deposited, and card packet is deposited described in composition;The sample data are sent to mirror with card packet is deposited Demonstrate,prove server.
In some optional embodiments, the report receiver module is additionally operable to:Reception discerns server according to the inspection Material data report that what is returned when unsuccessfully discerns failure notification with card packet successful identification is deposited;Accordingly,
The report provides module, specifically for:User is provided by the failure notification of discerning.
The embodiment of the present invention also provides one kind and saves data authentication system from damage, including:Client, deposit server, discern clothes Business device;
The client, is asked to the deposit server, and receive for sending for having saved discerning for data from damage The probation report that the deposit server is provided;
The deposit server discerns device including above-mentioned data of saving from damage;
It is described to discern server, for receiving the sample data for discerning server transmission and to have saved data from damage corresponding Card packet is deposited, according to the sample data and card packet is deposited and is successfully generated after probation report and return to the card of depositing and service Device.
The beneficial effect of above-mentioned technical proposal provided in an embodiment of the present invention at least includes:
The data of having saved from damage submitted for user are discerned, and generation proof electronic evidence is available, legal, effective identification Report, by way of check post electronic data saves checking information from damage, it is ensured that be the original electricity do not changed when electronic data is used Subdata, improves the reliability of electronic evidence, by depositing card digital certificates and saving digital certificates from damage, further improves the electricity saved from damage The real effectiveness of subdata, facility is provided for the acquisition of electronic evidence, reduces the time that evidence is obtained, and improves the electronics obtained The legitimacy and availability of evidence.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages can be by the explanations write Specifically noted structure is realized and obtained in book, claims and accompanying drawing.
Below by drawings and Examples, technical scheme is described in further detail.
Brief description of the drawings
Accompanying drawing is used for providing a further understanding of the present invention, and constitutes a part for specification, the reality with the present invention Applying example is used to explain the present invention together, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the flow chart of internet data security method in the embodiment of the present invention one;
Fig. 2 be deposit that card data save process from damage in the embodiment of the present invention one realize flow chart;
Fig. 3 be in the embodiment of the present invention one right-safeguarding data save process from damage realize flow chart;
Fig. 4 is to save the flow chart of data authentication approach from damage in the embodiment of the present invention two;
Fig. 5 is to implement flow example figure to save that data are discerned from damage in the embodiment of the present invention two;
Fig. 6 is the structural representation of internet data safety system in the embodiment of the present invention three;
Fig. 7 is the structural representation of internet data secure device in the embodiment of the present invention three;
Fig. 8 is to save the structural representation of data authentication system from damage in the embodiment of the present invention four;
Fig. 9 be the embodiment of the present invention four in save the structural representation that data discern device from damage.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
It is difficult to preserve to solve electronic evidence present in prior art, takes the evidence relatively difficult, cost is extremely held high It is expensive, waste time and energy, the stand-by period is very long the problem of wait, and the embodiment of the present invention provides a kind of internet data and saves implementation method from damage, Can save electronic evidence from damage in time, improve the availability and legitimacy taken the evidence, and realize it is convenient, fast, improve electronics The convenience and availability of the preservation of evidence.
It is difficult to preserve acquisition to solve electronic evidence present in prior art, evidence of identification is relatively difficult, it is necessary to obtain When taking authentic and valid electronic evidence, the cost of its judicial expertise is prohibitively expensive, wastes time and energy, and stand-by period very long grade is asked Topic, the embodiment of the present invention provides one kind and saves data capture method from damage, can the electronic evidence saved from damage of quick obtaining, obtain truly may be used Electronic evidence, the operating time for reducing process of discerning improves the availability and legitimacy taken the evidence, obtains electronic evidence Take that more convenient, quick, to discern process more convenient.
Embodiment one
The embodiment of the present invention one provides a kind of internet data security method, its flow as shown in figure 1, including following step Suddenly:
Step S101:Obtain the data to be saved from damage that user submits.
When user needs to be saved from damage data, deposit server can be supplied to deposit card and save from damage, user can to oneself Electronic data with security requirements uploads to deposit server and deposit card and save from damage, can also to present on internet some Data are issued, such as may invade the abuse data of the intellectual property of oneself, deposit server is uploaded to after being intercepted Progress right-safeguarding purpose is deposited card and saved from damage.
Accordingly, deposit server obtain user submit when data are saved from damage, can obtain user submission oneself hair At least one file to be saved from damage of cloth or storage;Or, the other users intercepted from network of user's submission can also be obtained At least one file to be saved from damage of issue, including at least one in the following files:The picture that is intercepted from network, browse network The screenshotss file of information, the documentary evidence for accessing network.
Step S102:Generate data to be saved from damage saves check information from damage.
Deposit server is got after data are saved from damage, and generation can uniquely confirm that this saves data integrity, legitimacy from damage Save check information from damage, the electronic data saved from damage by saving from damage check information can confirm that be initial data, when electronic data hair During raw change, its corresponding check information of saving from damage can also change therewith, therefore, electron number be can confirm that by saving check information from damage According to being original electronic data.
When check information is saved in generation from damage, it can treat and save data progress logical operation from damage, obtain data to be saved from damage corresponding Cryptographic Hash.Because the cryptographic Hash that different data are calculated is different, therefore whether former just it can confirm that by cryptographic Hash The electronic data come.
Step S103:Card digital certificates information combination is deposited according to data to be saved from damage and user profile generation.
The user profile that data to be saved from damage and request save the data from damage is combined by deposit server, obtains depositing card electronics Certificate information is combined.
Optionally, when wait save from damage data for oneself issue or storage at least one when file is saved from damage, generation include carry User profile and depositing for fileinfo to be saved from damage is handed over to demonstrate,prove digital certificates information combination.
Optionally, when at least one file to be saved from damage that data to be saved from damage are the other users issue intercepted from network When, generation includes intercepting user profile, submits user profile and depositing for fileinfo to be saved from damage to demonstrate,prove digital certificates information combination.Its In, electronic data is intercepted from network can be intercepted directly on line and upload, can also manual mode realization under line, then carry out Pass.
Step S104:It will be compiled comprising saving check information from damage, depositing card digital certificates information combination, user identity information and deposit card The record information combination of code, which is sent to, discerns server.
Deposit server obtains user identity information according to user profile, and is assigned for data to be saved from damage beneficial to lookup Deposit card coding, then by generation save check information from damage and deposit card digital certificates information combination, obtained user identity information and Card coded combination is deposited to be sent to and discern server.
Step S105:Deposit server is obtained to be generated simultaneously to saving from damage after check information is put on record successfully according to record information combination What is returned saves digital certificates from damage.
Discern server to receive after record information combination, according to rule set in advance of putting on record, verify record information group What conjunction included save from damage check information, card digital certificates information combination, the matching of user identity information and legitimacy are deposited, when testing Card is put on record saving check information from damage when passing through;After putting on record successfully, sent to deposit server and save digital certificates from damage.Deposit card clothes Business device obtains the digital certificates of saving from damage discerned and returned after server is put on record successfully, terminates flow.
Optionally, when discern server put on record failure when, return is put on record failure notification, and deposit server receives the service of discerning Device is put on record the failure notification of putting on record returned after failure, and end is put on record flow or sends record information group to discerning server again Close.
Step S106:Will data be saved from damage, deposit card digital certificates and save from damage digital certificates carry out deposit card.
Deposit server, which is received, to be saved from damage after digital certificates, saves digital certificates and data to be saved from damage, life from damage by what is received Into card digital certificates of depositing carry out depositing card together and save from damage, so that subsequent user needs to obtain during electronic evidence.
The electricity that the above-mentioned electronic data security method that the embodiment of the present invention one is provided can be issued or stored to user oneself Subdata is saved from damage, i.e., user carries out depositing card to electronic data.Can also be to the other users issue obtained on internet Electronic data is saved from damage, i.e., user saves from damage to right-safeguarding electronic data.Its is respective, and to implement process description as follows:
The one kind for being illustrated in figure 2 above-mentioned electronic data security method implements flow, for user to electronic data The implementation process for deposit card is described, and specifically includes following steps:
Step S201:User, which submits, to be needed to deposit the data of card.
During the data that user oneself is in need to deposit card, deposit server is submitted to.Deposit server obtains what user submitted Card data are deposited, data to be saved from damage are used as.
Such as, user can be by the file with intellectual property of oneself, some personal documents with legal effect Pass to deposit server.
Step S202:Deposit server obtains the user profile submitted and deposit card data.
User, which submits, to deposit after card data, and deposit server obtains user profile.User's mark can be included in user profile Information, such as:General unique identifier (Universally Unique Identifier, UUID) of the user in database. Can also be including subscriber identity information etc. in user profile.
Step S203:The corresponding cryptographic Hash of card data is deposited in generation.
The step obtains generating the cryptographic Hash for depositing card data by way of logical operation, saves school from damage as deposit card data Test information.
When user submits single file, logical calculated directly is carried out to single file, cryptographic Hash is obtained.User submits multiple Multiple files can be compressed with combination during file, and logical calculated is carried out for the file after compression combination, Hash is obtained Value.
Step S204:Card digital certificates information combination is deposited in generation.
When user submits single file, user profile and fileinfo are included according to single file and user profile generation Information combination, be used as deposit card digital certificates in information combination.
When user submits multiple files, combination can be compressed to multiple files, according to the file after compression combination The information combination comprising user profile and fileinfo is generated with user profile, the information combination deposited in card digital certificates is used as.
Here user profile refers generally to submit the information for the user for depositing card data.
Step S205:UUID of the user in database is determined according to user profile.
User stores in deposit server when saving electronic data from damage, can have in the database of storage electronic data with Each unique corresponding UUID of user, can be obtained from user profile.
Step S206:Card coding is deposited in acquisition.
User stores in deposit server when saving electronic data from damage, can be to every in the database of storage electronic data Part is saved data from damage and encoded, and is easy to search.
Above-mentioned steps S203, step S204, step S205, step S206 execution sequence in no particular order, can hold simultaneously OK.
Step S207:By cryptographic Hash, deposit card digital certificates information combination, UUID and deposit card coded combination and be sent to and discern clothes Business device.
Deposit server gets cryptographic Hash, deposits card digital certificates information combination, UUID and deposit after the information such as card coding, will It is combined into record information combination, sends jointly to discern server and carries out processing of putting on record.
Step S208:Server is discerned to put to cryptographic Hash on record.
If putting success on record, step S209 is performed, if failure of putting on record, which is returned, continues executing with step S207.
Optionally, put on record failure when, can also notify that user puts on record and failure and terminate to deposit card process, user if necessary to after Card is renewed, can restart and deposit card flow.
Step S209:Discern server and generate and return and save digital certificates from damage to deposit server.
Discern generation after server is put on record cryptographic Hash successfully and save digital certificates from damage, and the digital certificates of generation are sent to Deposit server.
Step S210:Deposit server will deposit card data, and deposit card digital certificates, save digital certificates from damage and stored.
Step S211:Deposit it is QED into.
It is illustrated in figure 3 above-mentioned the another of electronic data security method and implements flow, for user to right-safeguarding electricity The implementation process that subdata is saved from damage is described, and specifically includes following steps:
Step S301:Picture is intercepted in users from networks.
During user's browsing network information, the picture that can want to save from damage by oneself is intercepted.
Step S302:Screenshotss file is obtained during user's browse network.
During user's browsing network information, if it is desired to save the content shown by webpage from damage, it can be obtained and cut with the mode of screenshotss Shield file.
Step S303:Obtain the documentary evidence of customer access network.
During customer access network, can obtain accessing united resource positioning symbol (Uniform Resource Locator, URL valid certificates), are used as the documentary evidence for accessing network.
Above-mentioned steps S301, step S302, step S303 execution sequence in no particular order.
, can when finding to exist on internet the behavior to the Intellectual property pirates of oneself during user's browsing network information So that by intercepting picture, screen printing display content, obtaining the modes such as access evidence dimension will be used as under the contents interception of access The evidence of power.
Step S304:User submits right-safeguarding data.
When user gets the right-safeguarding data that may be used, deposit server is submitted to.Deposit server obtains user and carried The right-safeguarding data of friendship, are used as data to be saved from damage.
Such as, can be by network when user has found that present on internet the behavior of the intellectual property of oneself may be invaded In relevant information collected evidence and upload to deposit server, be used as the evidence of the later right-safeguarding lawsuit that may occur.
Step S305:Deposit server obtains the user profile for submitting right-safeguarding data.
User is submitted after right-safeguarding data, and deposit server obtains user profile.User's mark can be included in user profile Information, such as:General unique identifier (Universally Unique Identifier, UUID) of the user in database. Can also be including subscriber identity information etc. in user profile.
Optionally, in addition to deposit server submits the user profile of user except obtaining, the use of interception user can also be obtained Family information, and recorded.Similarly, the user profile of interception user can include user identity information, such as UUID may be used also With including subscriber identity information etc..
Step S306:Generate the corresponding cryptographic Hash of right-safeguarding data.
The step obtains generating the cryptographic Hash of right-safeguarding data by way of logical operation, saves school from damage as right-safeguarding data Test information.
When user submits single file, logical calculated directly is carried out to single file, cryptographic Hash is obtained.User submits multiple Multiple files can be compressed with combination during file, and logical calculated is carried out for the file after compression combination, Hash is obtained Value.
Step S307:Card digital certificates information combination is deposited in generation.
When user submits single file, user profile and fileinfo are included according to single file and user profile generation Information combination, be used as deposit card digital certificates in information combination.
When user submits multiple files, combination can be compressed to multiple files, according to the file after compression combination The information combination comprising user profile and fileinfo is generated with user profile, the information combination deposited in card digital certificates is used as.
Here user profile can include the information for submitting the user for depositing card data, can also include the use of interception user Family information, or both has.
Step S308:UUID of the user in database is determined according to user profile.
User stores in deposit server when saving electronic data from damage, can have in the database of storage electronic data with Each unique corresponding UUID of user, can be obtained from user profile.
Step S309:Card coding is deposited in acquisition.
User stores in deposit server when saving electronic data from damage, can be to every in the database of storage electronic data Part is saved data from damage and encoded, and is easy to search.
Above-mentioned steps S306, step S307, step S308, step S309 execution sequence in no particular order, can hold simultaneously OK.
Step S310:By cryptographic Hash, deposit card digital certificates information combination, UUID and deposit card coded combination and be sent to and discern clothes Business device.
Deposit server gets cryptographic Hash, deposits card digital certificates information combination, UUID and deposit after the information such as card coding, will It is combined into record information combination, sends jointly to discern server and carries out processing of putting on record.
Step S311:Server is discerned to put to cryptographic Hash on record.
If putting success on record, step S312 is performed, if failure of putting on record, which is returned, continues executing with step S310.
Optionally, put on record failure when, can also notify that user puts on record and failure and terminate to deposit card process, user if necessary to after Card is renewed, can restart and deposit card flow.
Step S312:Discern server and generate and return and save digital certificates from damage to deposit server.
Discern generation after server is put on record cryptographic Hash successfully and save digital certificates from damage, and the digital certificates of generation are sent to Deposit server.
Step S313:Deposit server will deposit card data, and deposit card digital certificates, save digital certificates from damage and stored.
Step S314:Deposit it is QED into.
In the above method of the present embodiment one, user can be wanted to deposit the right-safeguarding that the data of card and user may use Data carry out data and saved from damage, in order to subsequently be used as electronic evidence.When as electronic evidence in use, can be carried for user For probation report, it was demonstrated that the validity and legitimacy of electronic evidence, to saving the discerning in process embodiment two below of data from damage It is described in detail.
Embodiment two
The embodiment of the present invention two provides one kind and saves data authentication approach from damage, is reflected for the electronic evidence that user saves from damage Card, providing the user evidence legitimacy proves, improve electronic evidence availability and validity, its flow as shown in figure 4, including Following steps:
Step S401:Receive user be directed to saved data from damage discern request.
Deposit server receives the document of agreement after the signature that user sends;Or deposit server receives the agreement label of user Administration's request, provides a user document of agreement and is signed for user, obtained after the signature uploaded after being signed under user's on-line signing or line Document of agreement.
In the step, when user wants to discern to having saved data from damage, sent to deposit server and discern request.With After family directly can sign document of agreement, deposit server is sent to, that is, be considered as have sent and discern request;It can also use After family sends a file acquisition to deposit server in advance and asked, download related protocol file, and signature is good, sending to Deposit server, realizes that request is discerned in transmission;Or user sends a file acquisition to deposit server in advance and asked, and Line subscribes to the agreement file, realizes that request is discerned in transmission.
The document of agreement of signature can include at least one in commission letter, agency agreement, consignment agreement.
Step S402:Sample data are generated according to discerning request and discerning the targeted data of having saved from damage of request.
Deposit server, which is received, to be discerned after request, and whether first confirm that the document of agreement received is effective agreement text Part.
When confirming the validity, discerning for being obtained according to the document of agreement confirmed the validity and from database asks targeted Save data from damage, generate sample data.
Optionally, when confirming invalid, user can be pointed out, and allow user to resend the document of agreement signed.
Step S403:By sample data and the corresponding card packet of depositing of data is saved from damage and is sent to and discerns server.
Deposit server is obtained from database has saved that data are corresponding to save digital certificates, subscriber identity information from damage and deposit from damage Card coding, composition deposits card packet;By sample data and deposit card packet and be sent to and discern server.
Step S404:Receive and discern server according to sample data and deposit the identification report that card packet is successfully generated and returned Accuse.
Deposit server is by sample data and deposits card packet and is sent to and discerns after server, and discerning server can examine Save whether data change from damage, do not changed such as, then it is assumed that be possible electronic evidence, generated probation report;If Changed, then will not generate probation report.Discern server to be successfully generated after probation report, probation report is sent to and deposited Demonstrate,prove server.
When being successfully generated probation report, deposit server, which is received, to be discerned server according to the sample data received and deposits Card data detection saved from damage data save check information from damage and verification by when the probation report that generates and return.
Optionally, when generation probation report not successfully, discern server and discern failure notification to deposit server return Message, deposit server receives this and discerns failure notification message.
Step S405:Probation report is supplied to user.
The probation report received is supplied to user by deposit server, it was demonstrated that the legitimacy for saving data from damage of user, and It is used as the availability of electronic evidence.
The above method is optional, and deposit server, which can also be received, to be discerned server according to the sample data and deposit card number Failure notification is discerned according to what is returned when being bundled into the failure of work(probation report, failure notification will be discerned user is provided.
Above-mentioned one kind for saving data authentication approach from damage implements flow as shown in figure 5, respectively illustrating user terminal, depositing card Server and discern server and each need operation to be performed, mainly including following process:
(1) the short file that subscribes to the agreement of user, is discerned to having saved request of data from damage.
During being somebody's turn to do, user needs to subscribe to the agreement.It can also can be signed by line upper type by line under type.
Such as, it is as shown in Figure 5, download commission letter and sign and obtained on commission letter, line agency agreement and sign agency association View, downloads consignment agreement and signs consignment agreement.
The commission letter signed, agency agreement, consignment agreement are sent to deposit server, can be whole by computer The client installed on end or mobile terminal is realized.
(2) sample data are generated and card packet is deposited, and ask probation report.
The process realized by deposit server, is discerned server and is got and effectively entrusts letter, agency agreement, commission association Legislature, and data have been saved in acquisition from damage, generate sample data.Discerning server generation includes depositing card digital certificates, user identity letter Breath (such as user's real name information), deposit card coding deposit card packet, depositing card packet operation can also generate and upload under line To deposit server.
Deposit server is by sample data and deposits card packet and is sent to and discerns server request probation report.
(3) generation and transmission of probation report.
The step is completed by discerning server, and the original for having saved data from damage that sample data include can be verified by discerning server Beginning property, and checking deposit card packet include deposit card digital certificates, subscriber identity information, deposit card coding legitimacy and have Effect property.When having saved data from damage and not made an amendment for initial data, it was demonstrated that the data can use, and is effective electronic evidence, then produces Probation report, does not otherwise generate probation report.
After probation report is generated, deposit server is returned to, when generating probation report failure, probation report life is sent Into failure notification message to deposit server.
When discerning server authentication data primitiveness, it can be verified by saving checking information from damage, such as by having protected The cryptographic Hash of total evidence is verified.
(4) deposit server receives probation report or probation report failed regeneration notification message, and is supplied to user.
When deposit server receives the probation report for discerning server transmission, record background update is carried out, and send mirror Report generation success notification message is determined to user, and probation report is generated under doubling there is provided to user, such as can post paper, Electronic edition scanned copy can also be provided.
Deposit server receives the probation report failed regeneration notification message for discerning server transmission, is transmitted to user, And subsequent treatment is carried out, it can for example be linked up by contact staff with user.
(5) user receives probation report or probation report failed regeneration notification message, and carries out subsequent treatment.
The step, user can use client to realize operation, and user receives the probation report of deposit server transmission When generating success notification message, probation report to be received is waited;The probation report generation that user receives deposit server transmission is lost Notification message is lost, subsequent treatment is carried out, for example, can apply discerning again, can also link up and be handled with customer service.
In reality use, the above-mentioned process discerned, actually user deposit card digital certificates according to existing in system, Initiate to ask to judicial expertise center, earnestly ask other side and a more administration of justice with legal effect of file generated is saved from damage to oneself Probation report.
Embodiment three
Based on same inventive concept, the embodiment of the present invention three provides a kind of internet electronic data security system, its structure As shown in fig. 6, including:Client 601, deposit server 602 and discern server 603.
Client 601, the data to be saved from damage for submission are to deposit server 602.
Deposit server 602, which includes internet data, to be saved from damage and realizes device, the number to be saved from damage for obtaining user's submission According to generate data to be saved from damage saves check information from damage;Card digital certificates information is deposited according to data to be saved from damage and user profile generation Combination;By comprising saving check information from damage, deposit card digital certificates information combination, user identity information and the record information for depositing card coding Combination, which is sent to, discerns server 603;Acquisition is discerned server 603 and put on record into according to record information combination saving check information from damage What is generated and return after work(saves digital certificates from damage;Will data be saved from damage, deposit card digital certificates and save from damage digital certificates carry out deposit card.
Server 603 is discerned, the record information combination for receiving the transmission of deposit server 602, and according to letter of putting on record Breath combination is put on record saving check information from damage, generates and returns after putting on record successfully and saves digital certificates from damage.
The structure of internet electronic data secure device as shown in fig. 7, comprises:Data acquisition module 701, first generates mould Block 702, the second generation module 703, combination sending module 704, certificate acquisition module 705 and data deposit card module 706.
Data acquisition module 701, the data to be saved from damage for obtaining user's submission.
First generation module 702, saves check information from damage for generate data to be saved from damage.
Second generation module 703, for depositing card digital certificates information combination according to data to be saved from damage and user profile generation.
Sending module 704 is combined, for that will be identified comprising saving check information from damage, depositing card digital certificates information combination, user Information is sent to the record information combination for depositing card coding and discerns server.
Certificate acquisition module 705, puts on record saving check information from damage for obtaining to discern server and combined according to record information What is generated and return after success saves digital certificates from damage.
Data deposit card module 706, for will data be saved from damage, deposit card digital certificates and save from damage digital certificates carry out deposit card.
It is preferred that, above-mentioned data acquisition module 701, specifically for obtaining oneself issue of user's submission or storing at least One file to be saved from damage;Or obtain at least one text to be saved from damage for the other users intercepted from network the issue that user submits At least one in part, including the following files:The picture that is intercepted from network, the screenshotss file of browsing network information, access net The documentary evidence of network.
It is preferred that, above-mentioned second generation module 703, specifically for when data to be saved from damage is oneself issues or store at least One when file is saved from damage, generation includes submitting depositing for user profile and fileinfo to be saved from damage to demonstrate,prove digital certificates information combination; When wait save from damage data be intercepted from network other users issue at least one when file is saved from damage, generation include interception use Family information, submits user profile and depositing for fileinfo to be saved from damage to demonstrate,prove digital certificates information combination.
It is preferred that, above-mentioned certificate acquisition module, specifically for obtain discern returned after server is put on record successfully save electricity from damage Sub- certificate;And receive and discern server and put on record the failure notification of putting on record returned after failure;Wherein, discern server receive it is standby After case information combination, according to rule set in advance of putting on record, what checking record information combination included saves check information from damage, deposits card Digital certificates information combination, the matching of user identity information and legitimacy, are carried out when being verified to saving check information from damage Put on record;Accordingly,
Sending module is combined, the failure notification of putting on record received according to certificate acquisition module is additionally operable to, terminates flow of putting on record Or again to discern server send record information combination.
Example IV
Based on same inventive concept, the embodiment of the present invention four provides one kind and saves data authentication system from damage, its structure such as Fig. 8 institutes Show, including:Client 801, deposit server 802, discern server 803.
Client 801, the request of discerning for sending for having saved data from damage is deposited to deposit server 802, and reception Demonstrate,prove the probation report that server 802 is provided.
Deposit server 802 discerns device including saving data from damage, please for having saved discerning for data from damage for receiving user Ask;Sample data are generated according to discerning request and discerning the targeted data of having saved from damage of request;By sample data and number is saved from damage It is sent to according to corresponding card packet of depositing and discerns server 803;Reception discerns server 803 according to sample data and deposits card data Wrap the probation report for being successfully generated and returning;Probation report is supplied to user.
Server 803 is discerned, the sample data of the transmission of server 802 are discerned for receiving and have saved that data are corresponding to deposit from damage Packet is demonstrate,proved, according to sample data and card packet is deposited and is successfully generated after probation report and returns to deposit server 802.
Based on same inventive concept, the embodiment of the present invention four, which also provides one kind, saves data from damage and discerns device, its structure such as Fig. 9 It is shown, including:Request receiving module 901, sample generation module 902, data transmission blocks 903, report receiver module 904 and report Accuse and module 905 is provided.
Request receiving module 901, for receive user be directed to saved data from damage discern request.
Sample generation module 902, discerns request and discerns and ask targeted data of having saved from damage to generate sample for basis Data.
Data transmission blocks 903, for by sample data and having saved the corresponding card packet of depositing of data from damage and being sent to and discern Server.
Receiver module 904 is reported, server is discerned for reception and is successfully given birth to according to the sample data with card packet is deposited Into and return probation report.
Report provides module 905, for probation report to be supplied into user.
It is preferred that, above-mentioned request receiving module 901, specifically for receiving the document of agreement after the signature that user sends;Or The agreement signature request of user is received, document of agreement is provided a user and is signed for user, obtain and signed under user's on-line signing or line Document of agreement after the signature uploaded after administration.
It is preferred that, whether above-mentioned sample generation module 902 is effective association specifically for the document of agreement for confirming to receive Discuss file, when confirming the validity, obtained according to the document of agreement confirmed the validity and from database described in discern request institute pin To saved data from damage, generate sample data;Accordingly,
Data transmission blocks 903, specifically for obtained from database saved from damage data it is corresponding save from damage digital certificates, use Family identity information deposits card packet with card coding, composition is deposited;By sample data and deposit card packet and be sent to and discern server.
It is preferred that, above-mentioned report receiver module 904 is additionally operable to reception and discerns server according to sample data and deposit card data Be bundled into work(probation report failure when return discern failure notification;Accordingly,
Report provides module 905, and user is provided specifically for that will discern failure notification.
On the system and device in above-described embodiment, wherein modules perform the concrete mode of operation relevant It is described in detail in the embodiment of this method, explanation will be not set forth in detail herein.
The above method, system and the device of the embodiment of the present invention, are saved from damage for electronic data, for the electronics saved from damage Data are identified as the legitimacy of electronic evidence, are come to testify, and more easily providing electronic data for domestic consumer saves from damage, when with The legal intellectual property at family, or when being related to electronic data in legal dispute as evidence, can easily provide card According to legitimacy assay certificate.
Electronic data is saved from damage by using the safety system, user meet with encroach right, cause legal dispute when Wait, judicial expertise can be rapidly performed by the data saved from damage.Waited without very long, user only needs Shen on simple formality and line Please, it is possible to obtain the judicial expertise certificate of electronic evidence, it is to avoid user is individually carried out under expensive line for electronic evidence Electronics judicial expertise.So as to give user, law court, party etc. provides facility.
Such as, the deposit server of the system can be used for the online guarantor for helping intellectual property main body to realize its intellectual property Shield, maintenance function!Intellectual property main body includes individual herein, also the collective such as including enterprises and institutions.Deposit server is linked Server is discerned at electronic data judicial expertise center, is acted on behalf of judicial expertise center and is provided the electronic edition card with legal effect Book;Link judicial expertise center and intellectual property main body are initiated to make a report on business on the line of judicial expertise report.
There is the electronic data of intellectual property for intellectual property main body some, the system will be by depositing card operation online It is registered, protected and while the electronic edition certificate with legal effect is provided;For some infringement knowledge on internet Main part of property right rights and interests behavior, the system will be by abuse under operation note of collecting evidence online, and provides simultaneously with law effect The electronic edition certificate of power ensures abuse the fact property and validity.For the electronic data of the electronic edition certificate existed With infringement record, the system will be acted on behalf of intellectual property main body and initiate judicial mirror to judicial expertise center by discerning operation online Determine report request.Intellectual property and right-safeguarding process for user provide more authoritative second protection!
The system is that a kind of new data save flow from damage, and user is stored data into deposit server, intellectual property system System, which will be provided the user, deposits card, right-safeguarding, and discerning function, there is provided the judicial expertise service of user's electronic evidence.The system is started The New Times that electronic evidence is saved from damage, major advantage has following several respects:A variety of services are provided the user, card is deposited, right-safeguarding is discerned; Card function is deposited to user, deposit server is arrived into the electronic data storage of user, and by the information of the data in judicial expertise The heart is put on record, by record information, can carry out legitimacy verifies to the data of user, realize the anti-of user data and usurp Change;User carries out judicial expertise by system to data, is operated compared to the judicial expertise under pure line more simple and quick.
The systems and methods of the present invention provide the daily of electronic data and saved from damage for personal or enterprise, it is ensured that the conjunction of data Method, it is ensured that personal or enterprise use electronic evidence as legal effect during evidence, and user is provided carries out discerning operation, give birth to Grasped into user's evidence obtaining right-safeguarding with legal effect electronic evidence judicial expertise certificate, can be provided when user has found abuse Make.
This method saves the electronic data of user from damage special deposit server, rather than independent in user or enterprise Individual Installed System Memory storage;Saving from damage for electronic data is carried out, electronic data is independently present in deposit server, data file school Information etc. is tested to put on record to judicial expertise center;The more easily application of electronics judicial expertise report during cause legal dispute, more Fast comes to testify the time, smaller cost of coming to testify.
Unless otherwise specific statement, term such as handle, calculate, computing, determination, display etc. can refer to it is one or more Individual processing or action and/or the process of computing system or similar devices, the action and/or process will be indicated as processing system The data manipulation of physics (such as electronics) amount in the register or memory of system and it is converted into and is similarly represented as processing system Memory, other data of register or the storage of other this type of informations, transmitting or physical quantity in display device.Information With signal any one of a variety of different technologies and method can be used to represent.For example, in above description Data, instruction, order, information, signal, bit, symbol and the chip referred to can use voltage, electric current, electromagnetic wave, magnetic field or grain Son, light field or particle or its any combination are represented.
It should be understood that the particular order or level the step of during disclosed are the examples of illustrative methods.Based on setting Count preference, it should be appreciated that during the step of particular order or level can the protection domain for not departing from the disclosure feelings Rearranged under condition.Appended claim to a method gives the key element of various steps with exemplary order, and not It is to be limited to described particular order or level.
In above-mentioned detailed description, various features are combined in single embodiment together, to simplify the disclosure.No This open method should be construed to reflect such intention, i.e. the embodiment of theme claimed needs clear The more features of feature stated in each claim to Chu.On the contrary, that reflected such as appending claims Sample, the present invention is in the state fewer than whole features of disclosed single embodiment.Therefore, appending claims is special This is expressly incorporated into detailed description, and wherein each claim is alone as the single preferred embodiment of the present invention.
It should also be appreciated by one skilled in the art that the various illustrative boxes described with reference to the embodiments herein, mould Block, circuit and algorithm steps can be implemented as electronic hardware, computer software or its combination.In order to clearly demonstrate hardware and Interchangeability between software, is carried out to various illustrative parts, frame, module, circuit and step around its function above It is generally described.Hardware is implemented as this function and is also implemented as software, depending on specific application and to whole The design constraint that system is applied.Those skilled in the art can be directed to each application-specific, be realized in the way of flexible Described function, it is still, this to realize that decision-making should not be construed as the protection domain away from the disclosure.
The step of method with reference to described by the embodiments herein or algorithm, can be embodied directly in hardware, be held by processor Capable software module or its combination.Software module can be located at RAM memory, flash memory, ROM memory, eprom memory, Eeprom memory, register, hard disk, mobile disk, the storage of CD-ROM or any other form well known in the art are situated between In matter.A kind of exemplary storage medium is connected to processor, so that enable a processor to from the read information, and Information can be write to the storage medium.Certainly, storage medium can also be the part of processor.Processor and storage medium It can be located in ASIC.The ASIC can be located in user terminal.Certainly, processor and storage medium can also be used as discrete sets Part is present in user terminal.
Realized for software, technology described in this application can be with the module of the herein described function of execution (for example, mistake Journey, function etc.) realize.These software codes can be stored in memory cell and by computing device.Memory cell can To realize in processor, can also realize outside processor, in the latter case, it via various means by correspondence Processor is coupled to, these are all well known in the art.
Described above includes the citing of one or more embodiments.Certainly, in order to above-described embodiment is described and description portion The all possible combination of part or method is impossible, but it will be appreciated by one of ordinary skill in the art that each is implemented Example can do further combinations and permutations.Therefore, embodiment described herein is intended to fall into appended claims Protection domain in all such changes, modifications and variations.In addition, with regard to the term used in specification or claims "comprising", the mode that covers of the word is similar to term " comprising ", just as " including, " solved in the claims as link word As releasing.In addition, the use of any one term "or" in the specification of claims being to represent " non-exclusionism Or ".

Claims (10)

1. one kind saves data authentication approach from damage, it is characterised in that including:
Receive user be directed to saved data from damage discern request;
Discern request according to described and discern that request is targeted to have saved data generation sample data from damage;
By the sample data and the corresponding card packet of depositing of data is saved from damage and is sent to and discerns server;
Receive and discern server according to the sample data and deposit the probation report that card packet is successfully generated and returned;
The probation report is supplied to user.
2. the method as described in claim 1, it is characterised in that the reception user be directed to saved data from damage discern request, Specifically include:
Receive the document of agreement after the signature that user sends;Or
The agreement signature request of user is received, document of agreement is provided a user and is signed for user, obtain user's on-line signing or line Document of agreement after the signature uploaded after lower signature.
3. method as claimed in claim 2, it is characterised in that the generation sample data, and by the sample data and The corresponding card packet of depositing of data is saved from damage to be sent to and discern server, has specifically included:
Confirm whether the document of agreement received is effective document of agreement, when confirming the validity, according to the agreement confirmed the validity File and discern described in being obtained from database request it is targeted saved data from damage, generate sample data;
Obtained from database saved from damage data it is corresponding save from damage digital certificates, subscriber identity information and deposit card coding, constitute institute State and deposit card packet;
By the sample data and deposit card packet and be sent to and discern server.
4. the method as described in claim 1, it is characterised in that the reception is discerned server according to the sample data and deposited The probation report that card packet is successfully generated and returned, is specifically included:
Receive and discern server and save check information from damage according to what the sample data that receive and depositing demonstrate,proved that data detection saved data from damage And verification by when the probation report that generates and return.
5. the method as described in claim 1-4 is any, it is characterised in that also include:
Receive discern that server returns according to the sample data and when depositing card packet successful identification report failure discern mistake Notice is lost, user is provided by the failure notification of discerning.
6. one kind, which saves data from damage, discerns device, it is characterised in that including:
Request receiving module, for receive user be directed to saved data from damage discern request;
Sample generation module, sample number is generated for discerning request according to and discerning the targeted data of having saved from damage of request According to;
Data transmission blocks, for by the sample data and saved from damage data it is corresponding deposit card packet be sent to the service of discerning Device;
Receiver module is reported, server is discerned for receiving according to the sample data and deposits card packet and be successfully generated and return Probation report;
Report provides module, for the probation report to be supplied into user.
7. device as claimed in claim 6, it is characterised in that the request receiving module, specifically for:
Receive the document of agreement after the signature that user sends;Or
The agreement signature request of user is received, document of agreement is provided a user and is signed for user, obtain user's on-line signing or line Document of agreement after the signature uploaded after lower signature.
8. device as claimed in claim 7, it is characterised in that the sample generation module, specifically for:Confirm what is received Whether document of agreement is effective document of agreement, when confirming the validity, according to the document of agreement confirmed the validity and from database Described discern obtained asks targeted data of having saved from damage, generates sample data;Accordingly,
The data transmission blocks, specifically for:Obtained from database and saved that data are corresponding to save digital certificates, user from damage from damage Identity information is encoded with card is deposited, and card packet is deposited described in composition;By the sample data and deposit card packet and be sent to and discern clothes Business device.
9. the device as described in claim 6-8 is any, it is characterised in that the report receiver module, is additionally operable to:Reception is discerned What server was returned according to the sample data and when depositing the successful identification report failure of card packet discerns failure notification;Accordingly ,
The report provides module, specifically for:User is provided by the failure notification of discerning.
10. one kind saves data authentication system from damage, it is characterised in that including:Client, deposit server, discern server;
The client, is asked to the deposit server, and receive described for sending for having saved discerning for data from damage The probation report that deposit server is provided;
The data of saving from damage that the deposit server is included as described in claim 6-9 is any discern device;
It is described to discern server, for receiving the sample data for discerning server transmission and having saved that data are corresponding to deposit card from damage Packet, according to the sample data and deposits card packet and is successfully generated after probation report and returns to the deposit server.
CN201710293292.6A 2017-04-28 2017-04-28 Security data authentication method, system and device Expired - Fee Related CN106953877B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710293292.6A CN106953877B (en) 2017-04-28 2017-04-28 Security data authentication method, system and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710293292.6A CN106953877B (en) 2017-04-28 2017-04-28 Security data authentication method, system and device

Publications (2)

Publication Number Publication Date
CN106953877A true CN106953877A (en) 2017-07-14
CN106953877B CN106953877B (en) 2020-10-30

Family

ID=59477697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710293292.6A Expired - Fee Related CN106953877B (en) 2017-04-28 2017-04-28 Security data authentication method, system and device

Country Status (1)

Country Link
CN (1) CN106953877B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770173A (en) * 2017-10-20 2018-03-06 国信嘉宁数据技术有限公司 Subscriber Management System, related identification information creation method and request method of calibration
CN107809424A (en) * 2017-10-20 2018-03-16 国信嘉宁数据技术有限公司 Deposit card method, equipment and related deposit system in a kind of scene
CN111127183A (en) * 2018-10-31 2020-05-08 重庆小雨点小额贷款有限公司 Data processing method, device, server and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102332980A (en) * 2011-09-14 2012-01-25 福建伊时代信息科技股份有限公司 Method and system for managing electronic file
CN102724044A (en) * 2012-07-04 2012-10-10 东方金盾科技有限公司 Electronic evidence verification and preservation method
CN102223374B (en) * 2011-06-22 2014-04-23 熊志海 Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
CN103778352A (en) * 2014-01-28 2014-05-07 福建伊时代信息科技股份有限公司 Electronic evidence generation and verification method and device as well as electronic evidence generation system
CN105610848A (en) * 2016-01-08 2016-05-25 北京工业大学 Centralized data preservation method and system with source data security guaranty mechanism

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223374B (en) * 2011-06-22 2014-04-23 熊志海 Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
CN102332980A (en) * 2011-09-14 2012-01-25 福建伊时代信息科技股份有限公司 Method and system for managing electronic file
CN102724044A (en) * 2012-07-04 2012-10-10 东方金盾科技有限公司 Electronic evidence verification and preservation method
CN103778352A (en) * 2014-01-28 2014-05-07 福建伊时代信息科技股份有限公司 Electronic evidence generation and verification method and device as well as electronic evidence generation system
CN105610848A (en) * 2016-01-08 2016-05-25 北京工业大学 Centralized data preservation method and system with source data security guaranty mechanism

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770173A (en) * 2017-10-20 2018-03-06 国信嘉宁数据技术有限公司 Subscriber Management System, related identification information creation method and request method of calibration
CN107809424A (en) * 2017-10-20 2018-03-16 国信嘉宁数据技术有限公司 Deposit card method, equipment and related deposit system in a kind of scene
CN107809424B (en) * 2017-10-20 2020-02-11 国信嘉宁数据技术有限公司 On-site certificate storing method and device and related certificate storing system
CN111127183A (en) * 2018-10-31 2020-05-08 重庆小雨点小额贷款有限公司 Data processing method, device, server and computer readable storage medium
CN111127183B (en) * 2018-10-31 2023-10-17 重庆小雨点小额贷款有限公司 Data processing method, device, server and computer readable storage medium

Also Published As

Publication number Publication date
CN106953877B (en) 2020-10-30

Similar Documents

Publication Publication Date Title
CN107070939A (en) A kind of internet data security method, system and device
US10516662B2 (en) System and method for authenticating the legitimacy of a request for a resource by a user
KR101133829B1 (en) Verifying authenticity of webpages
US6938157B2 (en) Distributed information system and protocol for affixing electronic signatures and authenticating documents
CN108900471B (en) Server, client, network system and method for transmitting data
JP4949232B2 (en) Method and system for linking a certificate to a signed file
US7249258B2 (en) Method and system for assuring an original
US7966492B1 (en) System and method for allowing an e-mail message recipient to authenticate the message
JPH11338780A (en) Method and device for acknowledging and safely storing electronic document
JP2002024177A (en) Electronic notarization system and method
US20070204156A1 (en) Systems and methods for providing access to network resources based upon temporary keys
CN109714370B (en) HTTP (hyper text transport protocol) -based cloud security communication implementation method
CN109618341A (en) A kind of digital signature authentication method, system, device and storage medium
US20130103944A1 (en) Hypertext Link Verification In Encrypted E-Mail For Mobile Devices
CN106953877A (en) One kind saves data authentication approach, system and device from damage
US20160173458A9 (en) Method of Encrypting and Transferring Data Between a Sender and a Receiver Using a Network
Alzomai et al. Display security for online transactions: SMS-based authentication scheme
CN102006567B (en) Push-message processing method and system and equipment for implementing push-message processing method
CN112347488B (en) Order information processing method and device, equipment and storage medium
CN106257483B (en) Processing method, equipment and the system of electronic data
US20040143740A1 (en) Method of using hardware-type electronic signature in e-mail handling system
CN113285934A (en) Server cipher machine client IP detection method and device based on digital signature
JP3747394B2 (en) Electronic data arrival guarantee method and program recording medium
JP2000235528A (en) Method for executing remote procedure call on network
JP5118834B2 (en) Fraud check system for time authentication service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201030

Termination date: 20210428