CN106548092B - File processing method and device - Google Patents
File processing method and device Download PDFInfo
- Publication number
- CN106548092B CN106548092B CN201610933607.4A CN201610933607A CN106548092B CN 106548092 B CN106548092 B CN 106548092B CN 201610933607 A CN201610933607 A CN 201610933607A CN 106548092 B CN106548092 B CN 106548092B
- Authority
- CN
- China
- Prior art keywords
- file
- cryptographic hash
- verified
- format
- file destination
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title abstract 2
- 238000000034 method Methods 0.000 claims abstract description 50
- 238000004364 calculation method Methods 0.000 claims abstract description 29
- 230000005540 biological transmission Effects 0.000 claims description 3
- 230000009286 beneficial effect Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 14
- 238000012795 verification Methods 0.000 description 9
- 230000008859 change Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 5
- 230000032683 aging Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 235000013399 edible fruits Nutrition 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 239000003292 glue Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000003607 modifier Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 125000000391 vinyl group Chemical group [H]C([*])=C([H])[H] 0.000 description 1
- 229920002554 vinyl polymer Polymers 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Abstract
The invention discloses a file processing method and device, which are used for verifying whether a file is tampered or not so as to improve the security of the file. The method comprises the following steps: receiving files to be verified in various preset formats sent by a user; respectively carrying out Hash calculation on the files to be verified in each format to obtain Hash values corresponding to the files to be verified in each format; performing hash calculation again according to a plurality of hash values corresponding to the obtained files to be verified in various formats to obtain a first target hash value; comparing the first target hash value with a second target hash value corresponding to a target file; and when the comparison result of the first target hash value and the second target hash value is consistent, determining that the content of the file to be verified is the same as that of the target file. By adopting the method provided by the invention, whether the file is tampered or not can be verified, and the safety of the file is improved.
Description
Technical field
The present invention relates to field of computer technology, in particular to a kind of document handling method and device.
Background technique
Data save from damage be exactly with data mode (text, figure, letter, number, three-dimensional symbol, color combination and sound with
And above-mentioned factor combination etc.) existing for Various types of data information, with special operation mode carry out operation, encryption fix, state clearly
It the standard time etc. for saving generation from damage, prevents from being distorted by people, it is ensured that the program and method of electronic data primitiveness and objectivity.
Compared with paper document, electronic document mainly have it is with high content of technology, be not easy to be forged and distort, plyability, indirectly
The features such as property;Due to the various features of electronic evidence, how to confirm whether electronic document is tampered, becomes whether electronic document has
The key that has authenticity, can be used as evidence etc..
Up to the present, there are no a kind of technologies to confirm whether electronic document is tampered with well.Thus, how
Whether verifying electronic document is tampered, and then improves the safety of electronic document, is a technical problem urgently to be resolved.
Summary of the invention
The present invention provides a kind of document handling method and device, to verify whether file is tampered, and then improves file
Safety.
The present invention provides a kind of document handling method, comprising:
Receive the file to be verified for a variety of preset formats that user sends;
Hash calculation is carried out to the file to be verified of every kind of format respectively, the file to be verified for obtaining every kind of format is corresponding
Cryptographic Hash;
Hash calculation is carried out again according to the corresponding multiple cryptographic Hash of the file to be verified of obtained multiple format, obtains
One target cryptographic Hash;
The first object cryptographic Hash the second target cryptographic Hash corresponding with file destination is compared;
When the first object cryptographic Hash is consistent with the second target cryptographic Hash comparison result, determine described to be verified
File is identical as the file destination content.
The beneficial effects of the present invention are: the corresponding cryptographic Hash of file to be verified of multiple format is generated, and these are breathed out
Uncommon value carries out secondary Hash, obtains the corresponding first object cryptographic Hash of multiple format file to be verified, and with pre-stored mesh
The corresponding second target cryptographic Hash of mark file is compared, so that whether verify file identical as file destination, to test
Whether card file is tampered, and improves the safety of file.
In one embodiment, described before the file to be verified for a variety of preset formats that the reception user sends
Method further include:
Receive the file destination for a variety of preset formats that user sends;
Hash calculation is carried out to the file destination of every kind of format respectively, obtains the corresponding Hash of file destination of every kind of format
Value;
Hash calculation is carried out again according to the corresponding multiple cryptographic Hash of the file destination of obtained multiple format, is obtained described
Second target cryptographic Hash;
The second target cryptographic Hash is stored.
The beneficial effect of the present embodiment is: when file changes, corresponding cryptographic Hash will necessarily change,
Using this characteristic, as long as obtaining the corresponding cryptographic Hash of file, can be verified by cryptographic Hash, thus, it need to only store text
The corresponding cryptographic Hash of part, without storing entire file, thus, reduce the consumption of storage resource.
It is in one embodiment, described to store the second target cryptographic Hash, comprising:
The second target cryptographic Hash is sent in the block chain for being used to carry out encryption moneytary operations;
When the transaction count of the encryption currency reaches preset number, determine the second target cryptographic Hash storage at
Function, and the second target cryptographic Hash is not modifiable state.
The beneficial effect of the present embodiment is: the second target cryptographic Hash is placed in the block for being used to carry out encryption moneytary operations
In chain, since block chain process of exchange is similar to stacking process, due to encrypting moneytary operations fast speed, and due to stack architecture
Particularity, thus, after trading for several times, the state of the second target cryptographic Hash becomes not modifiable state, avoids other use
Family modifies to the second target cryptographic Hash, ensure that the safety of the second target cryptographic Hash.
In one embodiment, a variety of preset formats comprise at least one of the following format:
Unprocessed form, extensible markup language format and number format;Wherein, the extensible markup language format sum number
Word format is converted to according to the unprocessed form.
The beneficial effect of the present embodiment is: by the way that multiple format is arranged, with by the file destination of multiple format and to
Verifying file obtains multiple cryptographic Hash, and ensure that can carry out second of Hash operation, secondly, making file destination and text to be verified
The format of part is more diversified.
In one embodiment, the method also includes:
When the first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, can expand described in judgement
The file destination of the corresponding cryptographic Hash of file to be verified and the extensible markup language format of opening up markup language is corresponding
Cryptographic Hash it is whether identical;
When the corresponding cryptographic Hash of file to be verified of the extensible markup language format and the extensible markup language
When the corresponding cryptographic Hash of the file destination of format is identical, determine that the file to be verified is identical as the file destination.
The beneficial effect of the present embodiment is: when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent
When, it does not directly determine that file to be verified is different from file destination, but compares the to be verified of extensible markup language format again
The corresponding cryptographic Hash of file destination of the corresponding cryptographic Hash of file and extensible markup language format, when extensible markup language lattice
The corresponding cryptographic Hash of file to be verified of formula is when corresponding cryptographic Hash is identical with the file destination of extensible markup language format, still
It so determines that file to be verified is identical as file destination, avoids due to the damage of file fraction or change of format etc. and cause
The verification result of mistake is obtained, the accuracy of verifying is improved.
In one embodiment, the method also includes:
When the first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, can expand described in judgement
The file destination of the corresponding cryptographic Hash of file to be verified and the extensible markup language format of opening up markup language is corresponding
Cryptographic Hash it is whether identical;
When the corresponding cryptographic Hash of file to be verified of the extensible markup language format and the extensible markup language
When the corresponding cryptographic Hash of the file destination of format is identical, the corresponding cryptographic Hash of file to be verified and the institute of the number format are judged
Whether the corresponding cryptographic Hash of file destination for stating number format is identical;
When the corresponding cryptographic Hash of file to be verified of the number format is corresponding with the file destination of the number format
When cryptographic Hash is identical, determine that the file to be verified is identical as the file destination.
The beneficial effect of the present embodiment is: when the corresponding cryptographic Hash of the file of extensible markup language format and digital lattice
When the corresponding cryptographic Hash comparison result of the file of formula is all the same, determine that file to be verified is identical as file destination, thus, by double
Re-examination card, further ensures the accuracy of verifying.
In one embodiment, the method also includes:
When the corresponding cryptographic Hash of file to be verified of the number format is corresponding with the file destination of the number format
When cryptographic Hash is not identical, the file destination of the file and number format to be verified of the number format is compared;
It is preset when the difference between the file to be verified of the number format and the file destination of the number format is less than
When threshold value, determine that the file to be verified is identical as the file destination.
The beneficial effect of the present embodiment is: when the file to be verified corresponding cryptographic Hash and number format of number format
When the corresponding cryptographic Hash of file destination is not identical, it is different from file destination not directly determine file to be verified, but will be digital
The file destination of the file and number format to be verified of format is compared, when the band verifying file and number format of number format
File destination between difference be less than preset threshold when, still determine that file to be verified is identical as file destination, thus, avoid
When original document is entity file, the verification result of mistake is obtained due to file slight damage, further ensures verifying
Accuracy.
It in one embodiment, include the text for needing to be verified according to the file destination in the file to be verified
Part;
The method also includes:
When determining that the file to be verified is identical as the file destination content, determine that the file verification to be verified is logical
It crosses;
Export the prompting message being verified.
The beneficial effect of the present embodiment is: when file to be verified is identical as file destination content, determining text to be verified
Part is verified, and exports the prompting message being verified, to realize the prompting to verification result.
The present invention also provides a kind of document handling apparatus, comprising:
First receiving module, the file to be verified of a variety of preset formats for receiving user's transmission;
First computing module carries out Hash calculation for the file to be verified respectively to every kind of format, obtains every kind of format
The corresponding cryptographic Hash of file to be verified;
Second computing module, for according to the obtained corresponding multiple cryptographic Hash of file to be verified of multiple format again into
Row Hash calculation obtains first object cryptographic Hash;
Comparison module, for comparing the first object cryptographic Hash the second target cryptographic Hash corresponding with file destination
Compared with;
First determining module, it is consistent with the second target cryptographic Hash comparison result for working as the first object cryptographic Hash
When, determine that the file to be verified is identical as the file destination content.
In one embodiment, described device further include:
Second receiving module, for connecing before the file to be verified for a variety of preset formats that the reception user sends
Receive the file destination for a variety of preset formats that user sends;
Third computing module carries out Hash calculation for the file destination respectively to every kind of format, obtains every kind of format
The corresponding cryptographic Hash of file destination;
4th computing module, for being carried out again according to the corresponding multiple cryptographic Hash of file destination of obtained multiple format
Hash calculation obtains the second target cryptographic Hash;
Memory module, for storing the second target cryptographic Hash.
In one embodiment, the memory module, comprising:
Sending module, for the second target cryptographic Hash is sent to be used to carry out encryption moneytary operations block chain
In;
Second determining module, for determining described second when the transaction count of the encryption currency reaches preset number
Target cryptographic Hash stores successfully, and the second target cryptographic Hash is not modifiable state.
In one embodiment, described device further include:
First judgment module, it is different for working as the first object cryptographic Hash and the second target cryptographic Hash comparison result
When cause, the target of the file to be verified corresponding cryptographic Hash and extensible markup language format of extensible markup language format is judged
Whether the corresponding cryptographic Hash of file is identical;
Third determining module, for working as the corresponding cryptographic Hash of file to be verified and the institute of the extensible markup language format
State extensible markup language format the corresponding cryptographic Hash of file destination it is identical when, determine the file to be verified and the target
File is identical.
In one embodiment, described device further include:
Second judgment module, it is different for working as the first object cryptographic Hash and the second target cryptographic Hash comparison result
When cause, the target of the file to be verified corresponding cryptographic Hash and extensible markup language format of extensible markup language format is judged
Whether the corresponding cryptographic Hash of file is identical;
Third judgment module, for working as the corresponding cryptographic Hash of file to be verified and the institute of the extensible markup language format
State extensible markup language format the corresponding cryptographic Hash of file destination it is identical when, judge that the file to be verified of number format is corresponding
Cryptographic Hash cryptographic Hash corresponding with the file destination of number format it is whether identical;
4th determining module, for when the number format the corresponding cryptographic Hash of file to be verified and the number format
The corresponding cryptographic Hash of file destination it is identical when, determine that the file to be verified is identical as the file destination.
In one embodiment, described device further include:
Comparison module, the mesh for file to be verified corresponding cryptographic Hash and the number format when the number format
When the corresponding cryptographic Hash of mark file is not identical, the file destination of the file and number format to be verified of the number format is carried out
It compares;
5th determining module, for when the number format file to be verified and the number format file destination it
Between difference be less than preset threshold when, determine that the file to be verified is identical as the file destination.
It in one embodiment, include the text for needing to be verified according to the file destination in the file to be verified
Part;
Described device further include:
Output module, for when determining that the file to be verified is identical as the file destination content, output verifying to be logical
The prompting message crossed.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification
It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by written explanation
Specifically noted structure is achieved and obtained in book, claims and attached drawing.
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention
It applies example to be used to explain the present invention together, not be construed as limiting the invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 3 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 4 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 5 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 6 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 7 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 8 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Fig. 9 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Figure 10 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Figure 11 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Figure 12 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Figure 13 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Figure 14 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment.
Specific embodiment
Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings, it should be understood that preferred reality described herein
Apply example only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
Fig. 1 is a kind of flow chart of document handling method shown according to an exemplary embodiment, as shown in Figure 1, the party
Method can be saved from damage server corresponding to the mechanism of service or notarization service as offer data and realize that this method can be implemented as
Following steps S101-S105:
In step s101, the file to be verified for a variety of preset formats that user sends is received;
In step s 102, Hash calculation is carried out to the file to be verified of every kind of format respectively, obtain every kind of format to
Verify the corresponding cryptographic Hash of file;
In step s 103, it is breathed out again according to the corresponding multiple cryptographic Hash of the file to be verified of obtained multiple format
It is uncommon to calculate, obtain first object cryptographic Hash;
In step S104, first object cryptographic Hash the second target cryptographic Hash corresponding with file destination is compared;
In step s105, it when first object cryptographic Hash is consistent with the second target cryptographic Hash comparison result, determines to be tested
It is identical as file destination content to demonstrate,prove file.
In order to avoid file is tampered, more important file destination can be deposited in by user to be used to provide data and saves clothes from damage
The mechanism of business.At this point, user needs to provide the file destination of multiple format, for example, original file destination, the mesh of number format
Mark the file destination of file and extensible markup language format.Server is after receiving the file destination of these formats, respectively
Hash calculation is carried out to the file destination of these formats, thus the corresponding digital digest of the file destination for obtaining every kind of format, and
Hash calculation is carried out to these digital digests, obtains the final cryptographic Hash of file destination.Any one is carried out on to file destination
After the small change of point, different cryptographic Hash can be all obtained, due to this characteristic of cryptographic Hash, thus, currently available target text
The final cryptographic Hash of part can only identify the file destination at current time, and cannot identify the target text after future is modified
Part.To the cryptographic Hash final by storage this document, the saving from damage in data plane to file destination is realized.
The present embodiment is the file verification process after saving from damage to the above-mentioned file of progress.In the present embodiment, user's hair is received
The file to be verified of the multiple format sent is (for example, original file to be verified, the file to be verified and expansible mark of number format
Remember the file to be verified of language format.), Hash calculation is carried out to the file to be verified of these formats respectively, to obtain every kind
The corresponding digital digest of file to be verified of format, and Hash calculation is carried out again to these digital digests, obtain text to be verified
The final cryptographic Hash of part.After obtaining the final cryptographic Hash of file to be verified, what is stored before taking out is to be tested for verifying this
The final cryptographic Hash of the file destination of file is demonstrate,proved, and the cryptographic Hash final with the file to be verified is compared, and works as comparison result
When consistent, determine that the file to be verified is identical as the content of file destination, at this point, then meaning that the file to be verified is being counted
According to after saving from damage to being not tampered within this period of time at current time.
It should be noted that the original document in the present embodiment can be electronic document, it is also possible to entity file (such as paper
Matter file), when file is entity file, the original document of electronic format is extracted after the entity file being scanned.
The beneficial effects of the present invention are: the corresponding cryptographic Hash of file to be verified of multiple format is generated, and these are breathed out
Uncommon value carries out secondary Hash, obtains the corresponding first object cryptographic Hash of multiple format file to be verified, and with pre-stored mesh
The corresponding second target cryptographic Hash of mark file is compared, so that whether verify file identical as file destination, to test
Whether card file is tampered, and improves the safety of file.
In one embodiment, as shown in Fig. 2, before above-mentioned steps S101, this method can also be implemented as walking as follows
Rapid S201-S204:
In step s 201, the file destination for a variety of preset formats that user sends is received;
In step S202, Hash calculation is carried out to the file destination of every kind of format respectively, obtains the target of every kind of format
The corresponding cryptographic Hash of file;
In step S203, Hash is carried out again according to the corresponding multiple cryptographic Hash of the file destination of obtained multiple format
It calculates, obtains the second target cryptographic Hash;
In step S204, the second target cryptographic Hash is stored.
In the present embodiment, before user verifies file to be verified, need that the file to be verified will be verified in advance
File destination be sent to the mechanism verified, user needs to provide the file destination of multiple format, for example, original target
File, the file destination of number format and the file destination of extensible markup language format.Server is receiving these formats
File destination after, Hash calculation is carried out to the file destinations of these formats respectively, to obtain the file destination of every kind of format
Corresponding digital digest, and Hash calculation is carried out to these digital digests, the final cryptographic Hash of file destination is obtained, and storing should
The final cryptographic Hash of file destination.After the change small to progress any point on file destination, different Hash can be all obtained
Value, due to this characteristic of cryptographic Hash, thus, the final cryptographic Hash of currently available file destination can only identify current time
File destination, and the file destination after future is modified cannot be identified.To pass through the final cryptographic Hash of storage this document,
Realize the saving from damage in data plane to file destination.
The beneficial effect of the present embodiment is: when file changes, corresponding cryptographic Hash will necessarily change,
Using this characteristic, as long as obtaining the corresponding cryptographic Hash of file, can be verified by cryptographic Hash, thus, it need to only store text
The corresponding cryptographic Hash of part, without storing entire file, thus, reduce the consumption of storage resource.
In one embodiment, as shown in figure 3, above-mentioned steps S204 can be implemented as following steps S301-S302:
In step S301, the second target cryptographic Hash is sent in the block chain for being used to carry out encryption moneytary operations;
In step s 302, when the transaction count for encrypting currency reaches preset number, determine that the second target cryptographic Hash is deposited
It stores up successfully, and the second target cryptographic Hash is not modifiable state.
In the present embodiment, to guarantee that the final cryptographic Hash (the second cryptographic Hash) of file destination is not modified, by file destination
Final cryptographic Hash is sent in the block chain for carrying out encryption moneytary operations.And the data structure in block chain is similar to heap
Stack architecture.Thus, when the final cryptographic Hash of file destination to be sent to the block chain for carrying out encryption moneytary operations, it is equivalent to mesh
The final cryptographic Hash of mark file is placed in stack top.Due to that can only be edited to the data of stack top in storehouse, thus, with encryption goods
The continuous progress of coin transaction, stack top location are traded replaced corresponding transaction data by these.And due to encryption moneytary operations
Speed is very fast, thus, when the encryption moneytary operations number in block chain reaches certain value, handed over unless the speed of access evidence is greater than
Otherwise easy speed can not just take out the final cryptographic Hash of file destination, thus, cryptographic Hash that can not be final to file destination carries out
Editor.The other users cryptographic Hash final to file destination is avoided to modify.It ensure that the final cryptographic Hash of file destination
Safety.
The beneficial effect of the present embodiment is: the second target cryptographic Hash is placed in the block for being used to carry out encryption moneytary operations
In chain, since block chain process of exchange is similar to stacking process, due to encrypting moneytary operations fast speed, and due to stack architecture
Particularity, thus, after trading for several times, the state of the second target cryptographic Hash becomes not modifiable state, avoids other use
Family modifies to the second target cryptographic Hash, ensure that the safety of the second target cryptographic Hash.
In one embodiment, a variety of preset formats comprise at least one of the following format:
Unprocessed form, extensible markup language format and number format;Wherein, extensible markup language format and digital lattice
Formula is converted to according to unprocessed form.
In the present embodiment, preset format may include unprocessed form, extensible markup language format and number format.
For example, the file of unprocessed form can be the original document of electronic edition, which can be to entity
It is obtained after file scan, such as text file, picture file, audio file, video file.
The file of extensible markup language format can be original document is standardized based on feature database after
It arrives, it is generally the case that the file of this kind of format is by information (such as modifier, file format inessential in original document
Deng) all weed out after, only retain key message a kind of file.
The file of number format refers to that will save original record with quality as high as possible (records mainly for analogy method
Audio, picture, video), generate corresponding number format.For example, original document is a vinyl record, reads the black glue and sing
Audio-frequency information in piece stores the audio-frequency information with mp3 format, then the file of the mp3 format is number format
File.
The beneficial effect of the present embodiment is: by the way that multiple format is arranged, with by the file destination of multiple format and to
Verifying file obtains multiple cryptographic Hash, and ensure that can carry out second of Hash operation, secondly, making file destination and text to be verified
The format of part is more diversified.
In one embodiment, as shown in figure 4, after above-mentioned steps S104, this method can also be implemented as walking as follows
Rapid S401-S402:
In step S401, when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, judgement can
The corresponding cryptographic Hash of file to be verified of extending mark language format and the file destination of extensible markup language format are corresponding
Whether cryptographic Hash is identical;
In step S402, when the corresponding cryptographic Hash of file to be verified and extensible markup of extensible markup language format
When the corresponding cryptographic Hash of the file destination of language format is identical, determine that file to be verified is identical as file destination.
Content format is adjusted because of situations such as being also likely to be present in the word or file of electronic format, such as word document
Middle adjustment line space.And such case and it is not belonging to the behavior distorted to file, but the final cryptographic Hash of this document is still
It can so change.
The key message in original document is only recorded in view of the file of extensible markup language format, does not record file
The inessential information such as the format of middle content, thus, in the word or file of electronic format when Format adjusting, having no effect on can expand
Open up cryptographic Hash corresponding to the file of markup language.Thus, in the present embodiment, when first object cryptographic Hash and the second target
When cryptographic Hash comparison result is inconsistent, it is different from file destination file to be verified is not directly determined.But it is more expansible again
The corresponding cryptographic Hash of file to be verified of markup language and the corresponding Hash of file destination of extensible markup language format
Value.
When the mesh of the file to be verified corresponding cryptographic Hash and extensible markup language format of extensible markup language format
When the corresponding cryptographic Hash of mark file is identical, illustrate first object cryptographic Hash and the second inconsistent possibility of target cryptographic Hash comparison result
Be due to file slight damage, slight aging or Format adjusting etc. caused by.Therefore, file to be verified is still determined
It is identical as file destination, it avoids due to the damage of file fraction or change of format etc. and causes to obtain the verifying knot of mistake
Fruit improves the accuracy of verifying.
The beneficial effect of the present embodiment is: when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent
When, it does not directly determine that file to be verified is different from file destination, but compares the to be verified of extensible markup language format again
The corresponding cryptographic Hash of file destination of the corresponding cryptographic Hash of file and extensible markup language format, when extensible markup language lattice
The corresponding cryptographic Hash of file to be verified of formula is when corresponding cryptographic Hash is identical with the file destination of extensible markup language format, still
It so determines that file to be verified is identical as file destination, avoids due to change of format etc. and cause to obtain the verifying knot of mistake
Fruit improves the accuracy of verifying.
In one embodiment, as shown in figure 5, after above-mentioned steps S104, this method can also be implemented as walking as follows
Rapid S501-S503:
In step S501, when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, judgement can
The corresponding cryptographic Hash of file to be verified of extending mark language format and the file destination of extensible markup language format are corresponding
Whether cryptographic Hash is identical;
In step S502, when the corresponding cryptographic Hash of file to be verified and extensible markup of extensible markup language format
When the corresponding cryptographic Hash of the file destination of language format is identical, the corresponding cryptographic Hash of file to be verified and number of number format are judged
Whether the corresponding cryptographic Hash of the file destination of word format is identical;
In step S503, when the file destination pair of the file to be verified corresponding cryptographic Hash and number format of number format
When the cryptographic Hash answered is identical, determine that file to be verified is identical as file destination.
Since there are slight aging or slight damages for the original document of entity, it is contemplated that extensible markup language lattice
The file of formula only records the key message in original document, does not record the inessential information such as format of content in file,
Thus, when original document does not still lose key message there are slight aging or slight damage, have no effect on expansible mark
Remember cryptographic Hash corresponding to the file of language format.Thus, in the present embodiment, when first object cryptographic Hash and the second target Hash
When value comparison result is inconsistent, it is different from file destination file to be verified is not directly determined.But compare extensible markup again
The corresponding cryptographic Hash of file to be verified of language format and the corresponding cryptographic Hash of file destination of extensible markup language format.
But the continuity of some the file informations is more important, a such as disc, when the slight aging of disc generation or gently
After micro- damage, lost part audio data then will lead to that audio is discontinuous, and only key message is not lost still to will affect and be listened
Feel effect.
Thus, it is contemplated that above situation, when extensible markup language format the corresponding cryptographic Hash of file to be verified and can
When the corresponding cryptographic Hash of the file destination of extending mark language format is identical.File and file destination to be verified are not directly determined
It is identical, but need to continue to judge that the corresponding cryptographic Hash of file to be verified of number format is corresponding with the file destination of number format
Cryptographic Hash it is whether identical.
When the corresponding cryptographic Hash of the file to be verified cryptographic Hash phase corresponding with the file destination of number format of number format
Meanwhile just determining that file to be verified is identical as file destination.
The beneficial effect of the present embodiment is: when the corresponding cryptographic Hash of the file of extensible markup language format and digital lattice
When the corresponding cryptographic Hash comparison result of the file of formula is all the same, determine that file to be verified is identical as file destination, thus, by double
Re-examination card, further ensures the accuracy of verifying.
In one embodiment, as shown in fig. 6, after above-mentioned steps S502, method can also be implemented as following steps
S601-S602:
In step s 601, when the file destination pair of the file to be verified corresponding cryptographic Hash and number format of number format
When the cryptographic Hash answered is not identical, the file destination of the file and number format to be verified of number format is compared;
In step S602, when the difference between the file destination of the file and number format to be verified of number format is less than
When preset threshold, determine that file to be verified is identical as file destination.
Still by taking disc as an example, when the damage of disc and its small, for example, when only several seconds audio-frequency informations are lost, this
The damage of sample is acceptable.Thus, in the present embodiment, when the corresponding cryptographic Hash of file to be verified and number of number format
When the corresponding cryptographic Hash of the file destination of format is not identical, by the file destination of the file and number format to be verified of number format
It is compared.
When the difference between the file destination of the file and number format to be verified of number format is less than preset threshold.Example
Such as, less than 0.1%, then such difference be within the acceptable range, thus, still can determine file to be verified and target
File is identical.
The beneficial effect of the present embodiment is: when the file to be verified corresponding cryptographic Hash and number format of number format
When the corresponding cryptographic Hash of file destination is not identical, it is different from file destination not directly determine file to be verified, but will be digital
The file destination of the file and number format to be verified of format is compared, when the band verifying file and number format of number format
File destination between difference be less than preset threshold when, still determine that file to be verified is identical as file destination, thus, avoid
When original document is entity file, the verification result of mistake is obtained due to file slight damage, further ensures verifying
Accuracy.
It in one embodiment, include the file for needing to be verified according to file destination in file to be verified;
As shown in fig. 7, in above-mentioned steps S105, S402, S503, S602 after either step, method can also be carried out
For following steps S701-S702:
In step s 701, when determining that file to be verified is identical as file destination content, file verification to be verified is determined
Pass through;
In step S702, the prompting message being verified is exported.
In the present embodiment, when determining that file to be verified is identical as file destination content, it is determined that file verification to be verified
Pass through, exports the prompting message being verified.
In addition, the prompting message not only can also can be transmitted in local output to the user of offer file to be verified.
The beneficial effect of the present embodiment is: when file to be verified is identical as file destination content, determining text to be verified
Part is verified, and exports the prompting message being verified, to realize the prompting to verification result.
Fig. 8 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment, as shown in figure 8, the device
Server corresponding to the mechanism of service or notarization service can be saved from damage as offer data to realize, which includes such as lower die
Block:
First receiving module 81, the file to be verified of a variety of preset formats for receiving user's transmission;
First computing module 82 carries out Hash calculation for the file to be verified respectively to every kind of format, obtains every kind of lattice
The corresponding cryptographic Hash of file to be verified of formula;
Second computing module 83, for according to the obtained corresponding multiple cryptographic Hash of file to be verified of multiple format again
Hash calculation is carried out, first object cryptographic Hash is obtained;
Comparison module 84, for comparing first object cryptographic Hash the second target cryptographic Hash corresponding with file destination
Compared with;
First determining module 85 is used for when first object cryptographic Hash is consistent with the second target cryptographic Hash comparison result, really
Fixed file to be verified is identical as file destination content.
In one embodiment, as shown in figure 9, device further include:
Second receiving module 91, for receiving before the file to be verified for receiving a variety of preset formats that user sends
The file destination for a variety of preset formats that user sends;
Third computing module 92 carries out Hash calculation for the file destination respectively to every kind of format, obtains every kind of format
The corresponding cryptographic Hash of file destination;
4th computing module 93, for according to the obtained corresponding multiple cryptographic Hash of file destination of multiple format again into
Row Hash calculation obtains the second target cryptographic Hash;
Memory module 94, for storing the second target cryptographic Hash.
In one embodiment, as shown in Figure 10, memory module 94, comprising:
Sending module 101, for being sent to the second target cryptographic Hash in the block chain for being used to carry out encryption moneytary operations;
Second determining module 102, for determining that the second target is breathed out when the transaction count for encrypting currency reaches preset number
Uncommon value stores successfully, and the second target cryptographic Hash is not modifiable state.
In one embodiment, as shown in figure 11, device further include:
First judgment module 111 is used for when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent,
Judge the file destination of the file to be verified corresponding cryptographic Hash and extensible markup language format of extensible markup language format
Whether corresponding cryptographic Hash is identical;
Third determining module 112, for when extensible markup language format the corresponding cryptographic Hash of file to be verified and can
When the corresponding cryptographic Hash of the file destination of extending mark language format is identical, determine that file to be verified is identical as file destination.
In one embodiment, as shown in figure 12, device further include:
Second judgment module 121 is used for when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent,
Judge the file destination of the file to be verified corresponding cryptographic Hash and extensible markup language format of extensible markup language format
Whether corresponding cryptographic Hash is identical;
Third judgment module 122, for when extensible markup language format the corresponding cryptographic Hash of file to be verified and can
When the corresponding cryptographic Hash of the file destination of extending mark language format is identical, the corresponding Kazakhstan of file to be verified of number format is judged
Whether identical wish value cryptographic Hash corresponding with the file destination of number format;
4th determining module 123, the mesh for file to be verified corresponding cryptographic Hash and number format when number format
When the corresponding cryptographic Hash of mark file is identical, determine that file to be verified is identical as file destination.
In one embodiment, as shown in figure 13, device further include:
Comparison module 131, for when the corresponding cryptographic Hash of file to be verified of number format and the target text of number format
When the corresponding cryptographic Hash of part is not identical, the file destination of the file and number format to be verified of number format is compared;
5th determining module 132, for when between the file destination of the file and number format to be verified of number format
When difference is less than preset threshold, determine that file to be verified is identical as file destination.
It in one embodiment, include the file for needing to be verified according to file destination in file to be verified;
As shown in figure 14, device further include:
Output module 141, for when determining that file to be verified is identical as file destination content, exporting mentioning of being verified
Show message.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The shape for the computer program product implemented in usable storage medium (including but not limited to magnetic disk storage and optical memory etc.)
Formula.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (14)
1. a kind of document handling method characterized by comprising
Receive the file to be verified for a variety of preset formats that user sends;
Hash calculation is carried out to the file to be verified of every kind of format respectively, obtains the corresponding Hash of file to be verified of every kind of format
Value;
Hash calculation is carried out again according to the corresponding multiple cryptographic Hash of the file to be verified of obtained multiple format, obtains the first mesh
Mark cryptographic Hash;
The first object cryptographic Hash the second target cryptographic Hash corresponding with file destination is compared;
When the first object cryptographic Hash is consistent with the second target cryptographic Hash comparison result, the file to be verified is determined
It is identical as the file destination content;
A variety of preset formats comprise at least one of the following format:
Unprocessed form, extensible markup language format and number format;Wherein, the extensible markup language format and digital lattice
Formula is converted to according to the unprocessed form.
2. the method as described in claim 1, which is characterized in that
Before the file to be verified for a variety of preset formats that the reception user sends, the method also includes:
Receive the file destination for a variety of preset formats that user sends;
Hash calculation is carried out to the file destination of every kind of format respectively, obtains the corresponding cryptographic Hash of file destination of every kind of format;
Hash calculation is carried out again according to the corresponding multiple cryptographic Hash of the file destination of obtained multiple format, obtains described second
Target cryptographic Hash;
The second target cryptographic Hash is stored.
3. method according to claim 2, which is characterized in that
It is described to store the second target cryptographic Hash, comprising:
The second target cryptographic Hash is sent in the block chain for being used to carry out encryption moneytary operations;
When the transaction count of the encryption currency reaches preset number, determine that the second target cryptographic Hash stores successfully, and
The second target cryptographic Hash is not modifiable state.
4. the method as described in claim 1, which is characterized in that
The method also includes:
When the first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, the expansible mark is judged
Remember the corresponding cryptographic Hash of file to be verified of language format and the corresponding Kazakhstan of file destination of the extensible markup language format
Whether uncommon value is identical;
The corresponding cryptographic Hash of file to be verified and the extensible markup language format when the extensible markup language format
The corresponding cryptographic Hash of file destination it is identical when, determine that the file to be verified is identical as the file destination.
5. the method as described in claim 1, which is characterized in that
The method also includes:
When the first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, the expansible mark is judged
Remember the corresponding cryptographic Hash of file to be verified of language format and the corresponding Kazakhstan of file destination of the extensible markup language format
Whether uncommon value is identical;
The corresponding cryptographic Hash of file to be verified and the extensible markup language format when the extensible markup language format
The corresponding cryptographic Hash of file destination it is identical when, judge the number format the corresponding cryptographic Hash of file to be verified and the number
Whether the corresponding cryptographic Hash of the file destination of word format is identical;
When the corresponding cryptographic Hash of the file to be verified Hash corresponding with the file destination of the number format of the number format
When being worth identical, determine that the file to be verified is identical as the file destination.
6. method as claimed in claim 5, which is characterized in that
The method also includes:
When the corresponding cryptographic Hash of the file to be verified Hash corresponding with the file destination of the number format of the number format
When being worth not identical, the file destination of the file and number format to be verified of the number format is compared;
When the difference between the file to be verified of the number format and the file destination of the number format is less than preset threshold
When, determine that the file to be verified is identical as the file destination.
7. the method as described in any one of claim 1,4,5,6, which is characterized in that
It include the file for needing to be verified according to the file destination in the file to be verified;
The method also includes:
When determining that the file to be verified is identical as the file destination content, the prompting message being verified is exported.
8. a kind of document handling apparatus characterized by comprising
First receiving module, the file to be verified of a variety of preset formats for receiving user's transmission;
First computing module, for carrying out Hash calculation to the file to be verified of every kind of format respectively, obtain every kind of format to
Verify the corresponding cryptographic Hash of file;
Second computing module, for being breathed out again according to the corresponding multiple cryptographic Hash of file to be verified of obtained multiple format
It is uncommon to calculate, obtain first object cryptographic Hash;
Comparison module, for the first object cryptographic Hash the second target cryptographic Hash corresponding with file destination to be compared;
First determining module is used for when the first object cryptographic Hash is consistent with the second target cryptographic Hash comparison result,
Determine that the file to be verified is identical as the file destination content;
A variety of preset formats comprise at least one of the following format:
Unprocessed form, extensible markup language format and number format;Wherein, the extensible markup language format and digital lattice
Formula is converted to according to the unprocessed form.
9. device as claimed in claim 8, which is characterized in that described device further include:
Second receiving module, for receiving and using before the file to be verified for a variety of preset formats that the reception user sends
The file destination for a variety of preset formats that family is sent;
Third computing module carries out Hash calculation for the file destination respectively to every kind of format, obtains the target of every kind of format
The corresponding cryptographic Hash of file;
4th computing module, for carrying out Hash again according to the corresponding multiple cryptographic Hash of file destination of obtained multiple format
It calculates, obtains the second target cryptographic Hash;
Memory module, for storing the second target cryptographic Hash.
10. device as claimed in claim 9, which is characterized in that the memory module, comprising:
Sending module, for being sent to the second target cryptographic Hash in the block chain for being used to carry out encryption moneytary operations;
Second determining module, for determining second target when the transaction count of the encryption currency reaches preset number
Cryptographic Hash stores successfully, and the second target cryptographic Hash is not modifiable state.
11. device as claimed in claim 8, which is characterized in that described device further include:
First judgment module, it is inconsistent for working as the first object cryptographic Hash and the second target cryptographic Hash comparison result
When, judge the corresponding cryptographic Hash of file to be verified of extensible markup language format and the target text of extensible markup language format
Whether the corresponding cryptographic Hash of part is identical;
Third determining module, for when the extensible markup language format the corresponding cryptographic Hash of file to be verified and it is described can
When the corresponding cryptographic Hash of the file destination of extending mark language format is identical, the file to be verified and the file destination are determined
It is identical.
12. device as claimed in claim 8, which is characterized in that described device further include:
Second judgment module, it is inconsistent for working as the first object cryptographic Hash and the second target cryptographic Hash comparison result
When, judge the corresponding cryptographic Hash of file to be verified of extensible markup language format and the target text of extensible markup language format
Whether the corresponding cryptographic Hash of part is identical;
Third judgment module, for when the extensible markup language format the corresponding cryptographic Hash of file to be verified and it is described can
When the corresponding cryptographic Hash of the file destination of extending mark language format is identical, the corresponding Kazakhstan of file to be verified of number format is judged
Whether identical wish value cryptographic Hash corresponding with the file destination of number format;
4th determining module, the mesh for file to be verified corresponding cryptographic Hash and the number format when the number format
When the corresponding cryptographic Hash of mark file is identical, determine that the file to be verified is identical as the file destination.
13. device as claimed in claim 12, which is characterized in that described device further include:
Comparison module, for when the corresponding cryptographic Hash of file to be verified of the number format and the target text of the number format
When the corresponding cryptographic Hash of part is not identical, the file destination of the file and number format to be verified of the number format is compared
It is right;
5th determining module, for when between the file to be verified of the number format and the file destination of the number format
When difference is less than preset threshold, determine that the file to be verified is identical as the file destination.
14. the device as described in any one of claim 8,11,12,13, which is characterized in that include in the file to be verified
Need the file verified according to the file destination;
Described device further include:
Output module is verified for exporting when determining that the file to be verified is identical as the file destination content
Prompting message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610933607.4A CN106548092B (en) | 2016-10-31 | 2016-10-31 | File processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610933607.4A CN106548092B (en) | 2016-10-31 | 2016-10-31 | File processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106548092A CN106548092A (en) | 2017-03-29 |
CN106548092B true CN106548092B (en) | 2019-07-16 |
Family
ID=58392842
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610933607.4A Active CN106548092B (en) | 2016-10-31 | 2016-10-31 | File processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106548092B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106650495B (en) * | 2016-12-16 | 2019-07-16 | 杭州嘉楠耘智信息科技有限公司 | File verification method and device |
CN107273514A (en) * | 2017-06-21 | 2017-10-20 | 杭州云证网络科技有限公司 | A kind of inspection method and application its inspect subsystem and data deposit signed certificate administration chain-circuit system |
CN107316239A (en) * | 2017-07-14 | 2017-11-03 | 众安信息技术服务有限公司 | A kind of authentification of message and source tracing method and system based on block chain |
CN107943833B (en) * | 2017-10-25 | 2021-11-19 | 华南农业大学 | Centerless distributed file storage and retrieval method based on block chain |
CN108764944A (en) * | 2018-05-31 | 2018-11-06 | 北京京东尚科信息技术有限公司 | Verification method, device and computer readable storage medium |
CN109409122B (en) * | 2018-09-13 | 2022-08-16 | 远光软件股份有限公司 | File storage method, electronic device and storage medium |
CN109472164A (en) * | 2018-09-13 | 2019-03-15 | 远光软件股份有限公司 | The verification method and its network and electronic equipment of contract dataset |
CN109409749A (en) * | 2018-10-30 | 2019-03-01 | 四川长虹电器股份有限公司 | A kind of IT assets management method based on block chain |
US10949388B2 (en) * | 2018-11-16 | 2021-03-16 | Advanced Messaging Technologies, Inc. | Systems and methods for distributed data storage and delivery using blockchain |
CN109698822A (en) * | 2018-11-28 | 2019-04-30 | 众安信息技术服务有限公司 | Combination learning method and system based on publicly-owned block chain and encryption neural network |
CN109977274B (en) * | 2019-03-31 | 2021-05-11 | 杭州复杂美科技有限公司 | Data query and verification method, system, equipment and storage medium |
CN112966306A (en) * | 2021-04-02 | 2021-06-15 | 西安慧博文定信息技术有限公司 | Processing method and device for blind verification file |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488952A (en) * | 2013-09-24 | 2014-01-01 | 华为技术有限公司 | File integrity verification method and file processor |
CN104298934A (en) * | 2014-10-27 | 2015-01-21 | 浪潮(北京)电子信息产业有限公司 | File verification method, server and system in cloud calculation system |
CN104573490A (en) * | 2013-10-29 | 2015-04-29 | 桂林电子科技大学 | Method for protecting installed software on Android platform |
CN104954353A (en) * | 2015-02-10 | 2015-09-30 | 腾讯科技(深圳)有限公司 | Verification method and apparatus of APK file package |
WO2016127516A1 (en) * | 2015-02-13 | 2016-08-18 | 中兴通讯股份有限公司 | File signature method for operating system, file check method, and apparatus |
CN106055602A (en) * | 2016-05-24 | 2016-10-26 | 腾讯科技(深圳)有限公司 | File verification method and apparatus |
-
2016
- 2016-10-31 CN CN201610933607.4A patent/CN106548092B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488952A (en) * | 2013-09-24 | 2014-01-01 | 华为技术有限公司 | File integrity verification method and file processor |
CN104573490A (en) * | 2013-10-29 | 2015-04-29 | 桂林电子科技大学 | Method for protecting installed software on Android platform |
CN104298934A (en) * | 2014-10-27 | 2015-01-21 | 浪潮(北京)电子信息产业有限公司 | File verification method, server and system in cloud calculation system |
CN104954353A (en) * | 2015-02-10 | 2015-09-30 | 腾讯科技(深圳)有限公司 | Verification method and apparatus of APK file package |
WO2016127516A1 (en) * | 2015-02-13 | 2016-08-18 | 中兴通讯股份有限公司 | File signature method for operating system, file check method, and apparatus |
CN106055602A (en) * | 2016-05-24 | 2016-10-26 | 腾讯科技(深圳)有限公司 | File verification method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN106548092A (en) | 2017-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106548092B (en) | File processing method and device | |
CN110175436A (en) | The generation of block chain digital certificate, verification method, computer equipment and storage medium | |
CN108809932B (en) | Block chain-based deposit certificate system, method and readable medium | |
US20180121635A1 (en) | Systems and methods for authenticating video using watermarks | |
CN106650495B (en) | File verification method and device | |
US11216903B2 (en) | Watermark security | |
CN110427774A (en) | Data based on block chain deposit card method, data verification method and relevant apparatus | |
CN106534273A (en) | Block chain metadata storage system, and storage method and retrieval method thereof | |
EP4114012A1 (en) | Method and apparatus for processing multimedia information, and electronic device and storage medium | |
CN108256354B (en) | Test data-based storage method and storage medium | |
US8422786B2 (en) | Analyzing documents using stored templates | |
CN109033772A (en) | A kind of input method and device of verification information | |
CN109447809B (en) | Video active identification method combined with block chain | |
CN111177272B (en) | Big data credible audit method based on block chain | |
CN104168117B (en) | A kind of speech digit endorsement method | |
CN111222180A (en) | Method, system, device and medium for judging whether accounting document is tampered | |
US8719690B2 (en) | Method and system for automatic data aggregation | |
CN109191126A (en) | A kind of cash inter-bank circulation method, terminal and medium based on block chain | |
CN115982764A (en) | Method, system, device and medium for storing electronic file based on block chain | |
JP2007096608A (en) | Unauthorized image detection apparatus, method, and program | |
TW202027027A (en) | Method and device for invoking voice synthesis file | |
CN110347678B (en) | Financial data storage method, system, device and equipment | |
US20200057871A1 (en) | Apparatuses and methods for signing a legal document | |
CN108108593A (en) | E text power certificates constructing, the method used, terminal device and storage medium | |
CN114780932B (en) | Cross-block chain data interaction verification method, system and equipment for management three-mode platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20211021 Address after: 200436 room 138, No. 5 and 6, Lane 1188, Wanrong Road, Jing'an District, Shanghai Patentee after: Shanghai Canaan Jiesi Information Technology Co.,Ltd. Address before: Room 1203, 12 / F, building 4, No. 9, Jiuhuan Road, Jianggan District, Hangzhou City, Zhejiang Province, 310019 Patentee before: Hangzhou Canaan Creative Information Technology Ltd. |