CN106548092B - File processing method and device - Google Patents

File processing method and device Download PDF

Info

Publication number
CN106548092B
CN106548092B CN201610933607.4A CN201610933607A CN106548092B CN 106548092 B CN106548092 B CN 106548092B CN 201610933607 A CN201610933607 A CN 201610933607A CN 106548092 B CN106548092 B CN 106548092B
Authority
CN
China
Prior art keywords
file
cryptographic hash
verified
format
file destination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610933607.4A
Other languages
Chinese (zh)
Other versions
CN106548092A (en
Inventor
张楠赓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Canaan Jiesi Information Technology Co ltd
Original Assignee
Hangzhou Canaan Creative Information Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Canaan Creative Information Technology Ltd filed Critical Hangzhou Canaan Creative Information Technology Ltd
Priority to CN201610933607.4A priority Critical patent/CN106548092B/en
Publication of CN106548092A publication Critical patent/CN106548092A/en
Application granted granted Critical
Publication of CN106548092B publication Critical patent/CN106548092B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention discloses a file processing method and device, which are used for verifying whether a file is tampered or not so as to improve the security of the file. The method comprises the following steps: receiving files to be verified in various preset formats sent by a user; respectively carrying out Hash calculation on the files to be verified in each format to obtain Hash values corresponding to the files to be verified in each format; performing hash calculation again according to a plurality of hash values corresponding to the obtained files to be verified in various formats to obtain a first target hash value; comparing the first target hash value with a second target hash value corresponding to a target file; and when the comparison result of the first target hash value and the second target hash value is consistent, determining that the content of the file to be verified is the same as that of the target file. By adopting the method provided by the invention, whether the file is tampered or not can be verified, and the safety of the file is improved.

Description

A kind of document handling method and device
Technical field
The present invention relates to field of computer technology, in particular to a kind of document handling method and device.
Background technique
Data save from damage be exactly with data mode (text, figure, letter, number, three-dimensional symbol, color combination and sound with And above-mentioned factor combination etc.) existing for Various types of data information, with special operation mode carry out operation, encryption fix, state clearly It the standard time etc. for saving generation from damage, prevents from being distorted by people, it is ensured that the program and method of electronic data primitiveness and objectivity.
Compared with paper document, electronic document mainly have it is with high content of technology, be not easy to be forged and distort, plyability, indirectly The features such as property;Due to the various features of electronic evidence, how to confirm whether electronic document is tampered, becomes whether electronic document has The key that has authenticity, can be used as evidence etc..
Up to the present, there are no a kind of technologies to confirm whether electronic document is tampered with well.Thus, how Whether verifying electronic document is tampered, and then improves the safety of electronic document, is a technical problem urgently to be resolved.
Summary of the invention
The present invention provides a kind of document handling method and device, to verify whether file is tampered, and then improves file Safety.
The present invention provides a kind of document handling method, comprising:
Receive the file to be verified for a variety of preset formats that user sends;
Hash calculation is carried out to the file to be verified of every kind of format respectively, the file to be verified for obtaining every kind of format is corresponding Cryptographic Hash;
Hash calculation is carried out again according to the corresponding multiple cryptographic Hash of the file to be verified of obtained multiple format, obtains One target cryptographic Hash;
The first object cryptographic Hash the second target cryptographic Hash corresponding with file destination is compared;
When the first object cryptographic Hash is consistent with the second target cryptographic Hash comparison result, determine described to be verified File is identical as the file destination content.
The beneficial effects of the present invention are: the corresponding cryptographic Hash of file to be verified of multiple format is generated, and these are breathed out Uncommon value carries out secondary Hash, obtains the corresponding first object cryptographic Hash of multiple format file to be verified, and with pre-stored mesh The corresponding second target cryptographic Hash of mark file is compared, so that whether verify file identical as file destination, to test Whether card file is tampered, and improves the safety of file.
In one embodiment, described before the file to be verified for a variety of preset formats that the reception user sends Method further include:
Receive the file destination for a variety of preset formats that user sends;
Hash calculation is carried out to the file destination of every kind of format respectively, obtains the corresponding Hash of file destination of every kind of format Value;
Hash calculation is carried out again according to the corresponding multiple cryptographic Hash of the file destination of obtained multiple format, is obtained described Second target cryptographic Hash;
The second target cryptographic Hash is stored.
The beneficial effect of the present embodiment is: when file changes, corresponding cryptographic Hash will necessarily change, Using this characteristic, as long as obtaining the corresponding cryptographic Hash of file, can be verified by cryptographic Hash, thus, it need to only store text The corresponding cryptographic Hash of part, without storing entire file, thus, reduce the consumption of storage resource.
It is in one embodiment, described to store the second target cryptographic Hash, comprising:
The second target cryptographic Hash is sent in the block chain for being used to carry out encryption moneytary operations;
When the transaction count of the encryption currency reaches preset number, determine the second target cryptographic Hash storage at Function, and the second target cryptographic Hash is not modifiable state.
The beneficial effect of the present embodiment is: the second target cryptographic Hash is placed in the block for being used to carry out encryption moneytary operations In chain, since block chain process of exchange is similar to stacking process, due to encrypting moneytary operations fast speed, and due to stack architecture Particularity, thus, after trading for several times, the state of the second target cryptographic Hash becomes not modifiable state, avoids other use Family modifies to the second target cryptographic Hash, ensure that the safety of the second target cryptographic Hash.
In one embodiment, a variety of preset formats comprise at least one of the following format:
Unprocessed form, extensible markup language format and number format;Wherein, the extensible markup language format sum number Word format is converted to according to the unprocessed form.
The beneficial effect of the present embodiment is: by the way that multiple format is arranged, with by the file destination of multiple format and to Verifying file obtains multiple cryptographic Hash, and ensure that can carry out second of Hash operation, secondly, making file destination and text to be verified The format of part is more diversified.
In one embodiment, the method also includes:
When the first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, can expand described in judgement The file destination of the corresponding cryptographic Hash of file to be verified and the extensible markup language format of opening up markup language is corresponding Cryptographic Hash it is whether identical;
When the corresponding cryptographic Hash of file to be verified of the extensible markup language format and the extensible markup language When the corresponding cryptographic Hash of the file destination of format is identical, determine that the file to be verified is identical as the file destination.
The beneficial effect of the present embodiment is: when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent When, it does not directly determine that file to be verified is different from file destination, but compares the to be verified of extensible markup language format again The corresponding cryptographic Hash of file destination of the corresponding cryptographic Hash of file and extensible markup language format, when extensible markup language lattice The corresponding cryptographic Hash of file to be verified of formula is when corresponding cryptographic Hash is identical with the file destination of extensible markup language format, still It so determines that file to be verified is identical as file destination, avoids due to the damage of file fraction or change of format etc. and cause The verification result of mistake is obtained, the accuracy of verifying is improved.
In one embodiment, the method also includes:
When the first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, can expand described in judgement The file destination of the corresponding cryptographic Hash of file to be verified and the extensible markup language format of opening up markup language is corresponding Cryptographic Hash it is whether identical;
When the corresponding cryptographic Hash of file to be verified of the extensible markup language format and the extensible markup language When the corresponding cryptographic Hash of the file destination of format is identical, the corresponding cryptographic Hash of file to be verified and the institute of the number format are judged Whether the corresponding cryptographic Hash of file destination for stating number format is identical;
When the corresponding cryptographic Hash of file to be verified of the number format is corresponding with the file destination of the number format When cryptographic Hash is identical, determine that the file to be verified is identical as the file destination.
The beneficial effect of the present embodiment is: when the corresponding cryptographic Hash of the file of extensible markup language format and digital lattice When the corresponding cryptographic Hash comparison result of the file of formula is all the same, determine that file to be verified is identical as file destination, thus, by double Re-examination card, further ensures the accuracy of verifying.
In one embodiment, the method also includes:
When the corresponding cryptographic Hash of file to be verified of the number format is corresponding with the file destination of the number format When cryptographic Hash is not identical, the file destination of the file and number format to be verified of the number format is compared;
It is preset when the difference between the file to be verified of the number format and the file destination of the number format is less than When threshold value, determine that the file to be verified is identical as the file destination.
The beneficial effect of the present embodiment is: when the file to be verified corresponding cryptographic Hash and number format of number format When the corresponding cryptographic Hash of file destination is not identical, it is different from file destination not directly determine file to be verified, but will be digital The file destination of the file and number format to be verified of format is compared, when the band verifying file and number format of number format File destination between difference be less than preset threshold when, still determine that file to be verified is identical as file destination, thus, avoid When original document is entity file, the verification result of mistake is obtained due to file slight damage, further ensures verifying Accuracy.
It in one embodiment, include the text for needing to be verified according to the file destination in the file to be verified Part;
The method also includes:
When determining that the file to be verified is identical as the file destination content, determine that the file verification to be verified is logical It crosses;
Export the prompting message being verified.
The beneficial effect of the present embodiment is: when file to be verified is identical as file destination content, determining text to be verified Part is verified, and exports the prompting message being verified, to realize the prompting to verification result.
The present invention also provides a kind of document handling apparatus, comprising:
First receiving module, the file to be verified of a variety of preset formats for receiving user's transmission;
First computing module carries out Hash calculation for the file to be verified respectively to every kind of format, obtains every kind of format The corresponding cryptographic Hash of file to be verified;
Second computing module, for according to the obtained corresponding multiple cryptographic Hash of file to be verified of multiple format again into Row Hash calculation obtains first object cryptographic Hash;
Comparison module, for comparing the first object cryptographic Hash the second target cryptographic Hash corresponding with file destination Compared with;
First determining module, it is consistent with the second target cryptographic Hash comparison result for working as the first object cryptographic Hash When, determine that the file to be verified is identical as the file destination content.
In one embodiment, described device further include:
Second receiving module, for connecing before the file to be verified for a variety of preset formats that the reception user sends Receive the file destination for a variety of preset formats that user sends;
Third computing module carries out Hash calculation for the file destination respectively to every kind of format, obtains every kind of format The corresponding cryptographic Hash of file destination;
4th computing module, for being carried out again according to the corresponding multiple cryptographic Hash of file destination of obtained multiple format Hash calculation obtains the second target cryptographic Hash;
Memory module, for storing the second target cryptographic Hash.
In one embodiment, the memory module, comprising:
Sending module, for the second target cryptographic Hash is sent to be used to carry out encryption moneytary operations block chain In;
Second determining module, for determining described second when the transaction count of the encryption currency reaches preset number Target cryptographic Hash stores successfully, and the second target cryptographic Hash is not modifiable state.
In one embodiment, described device further include:
First judgment module, it is different for working as the first object cryptographic Hash and the second target cryptographic Hash comparison result When cause, the target of the file to be verified corresponding cryptographic Hash and extensible markup language format of extensible markup language format is judged Whether the corresponding cryptographic Hash of file is identical;
Third determining module, for working as the corresponding cryptographic Hash of file to be verified and the institute of the extensible markup language format State extensible markup language format the corresponding cryptographic Hash of file destination it is identical when, determine the file to be verified and the target File is identical.
In one embodiment, described device further include:
Second judgment module, it is different for working as the first object cryptographic Hash and the second target cryptographic Hash comparison result When cause, the target of the file to be verified corresponding cryptographic Hash and extensible markup language format of extensible markup language format is judged Whether the corresponding cryptographic Hash of file is identical;
Third judgment module, for working as the corresponding cryptographic Hash of file to be verified and the institute of the extensible markup language format State extensible markup language format the corresponding cryptographic Hash of file destination it is identical when, judge that the file to be verified of number format is corresponding Cryptographic Hash cryptographic Hash corresponding with the file destination of number format it is whether identical;
4th determining module, for when the number format the corresponding cryptographic Hash of file to be verified and the number format The corresponding cryptographic Hash of file destination it is identical when, determine that the file to be verified is identical as the file destination.
In one embodiment, described device further include:
Comparison module, the mesh for file to be verified corresponding cryptographic Hash and the number format when the number format When the corresponding cryptographic Hash of mark file is not identical, the file destination of the file and number format to be verified of the number format is carried out It compares;
5th determining module, for when the number format file to be verified and the number format file destination it Between difference be less than preset threshold when, determine that the file to be verified is identical as the file destination.
It in one embodiment, include the text for needing to be verified according to the file destination in the file to be verified Part;
Described device further include:
Output module, for when determining that the file to be verified is identical as the file destination content, output verifying to be logical The prompting message crossed.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by written explanation Specifically noted structure is achieved and obtained in book, claims and attached drawing.
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention It applies example to be used to explain the present invention together, not be construed as limiting the invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 3 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 4 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 5 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 6 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 7 is a kind of flow chart of document handling method shown according to an exemplary embodiment;
Fig. 8 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Fig. 9 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Figure 10 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Figure 11 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Figure 12 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Figure 13 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment;
Figure 14 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment.
Specific embodiment
Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings, it should be understood that preferred reality described herein Apply example only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
Fig. 1 is a kind of flow chart of document handling method shown according to an exemplary embodiment, as shown in Figure 1, the party Method can be saved from damage server corresponding to the mechanism of service or notarization service as offer data and realize that this method can be implemented as Following steps S101-S105:
In step s101, the file to be verified for a variety of preset formats that user sends is received;
In step s 102, Hash calculation is carried out to the file to be verified of every kind of format respectively, obtain every kind of format to Verify the corresponding cryptographic Hash of file;
In step s 103, it is breathed out again according to the corresponding multiple cryptographic Hash of the file to be verified of obtained multiple format It is uncommon to calculate, obtain first object cryptographic Hash;
In step S104, first object cryptographic Hash the second target cryptographic Hash corresponding with file destination is compared;
In step s105, it when first object cryptographic Hash is consistent with the second target cryptographic Hash comparison result, determines to be tested It is identical as file destination content to demonstrate,prove file.
In order to avoid file is tampered, more important file destination can be deposited in by user to be used to provide data and saves clothes from damage The mechanism of business.At this point, user needs to provide the file destination of multiple format, for example, original file destination, the mesh of number format Mark the file destination of file and extensible markup language format.Server is after receiving the file destination of these formats, respectively Hash calculation is carried out to the file destination of these formats, thus the corresponding digital digest of the file destination for obtaining every kind of format, and Hash calculation is carried out to these digital digests, obtains the final cryptographic Hash of file destination.Any one is carried out on to file destination After the small change of point, different cryptographic Hash can be all obtained, due to this characteristic of cryptographic Hash, thus, currently available target text The final cryptographic Hash of part can only identify the file destination at current time, and cannot identify the target text after future is modified Part.To the cryptographic Hash final by storage this document, the saving from damage in data plane to file destination is realized.
The present embodiment is the file verification process after saving from damage to the above-mentioned file of progress.In the present embodiment, user's hair is received The file to be verified of the multiple format sent is (for example, original file to be verified, the file to be verified and expansible mark of number format Remember the file to be verified of language format.), Hash calculation is carried out to the file to be verified of these formats respectively, to obtain every kind The corresponding digital digest of file to be verified of format, and Hash calculation is carried out again to these digital digests, obtain text to be verified The final cryptographic Hash of part.After obtaining the final cryptographic Hash of file to be verified, what is stored before taking out is to be tested for verifying this The final cryptographic Hash of the file destination of file is demonstrate,proved, and the cryptographic Hash final with the file to be verified is compared, and works as comparison result When consistent, determine that the file to be verified is identical as the content of file destination, at this point, then meaning that the file to be verified is being counted According to after saving from damage to being not tampered within this period of time at current time.
It should be noted that the original document in the present embodiment can be electronic document, it is also possible to entity file (such as paper Matter file), when file is entity file, the original document of electronic format is extracted after the entity file being scanned.
The beneficial effects of the present invention are: the corresponding cryptographic Hash of file to be verified of multiple format is generated, and these are breathed out Uncommon value carries out secondary Hash, obtains the corresponding first object cryptographic Hash of multiple format file to be verified, and with pre-stored mesh The corresponding second target cryptographic Hash of mark file is compared, so that whether verify file identical as file destination, to test Whether card file is tampered, and improves the safety of file.
In one embodiment, as shown in Fig. 2, before above-mentioned steps S101, this method can also be implemented as walking as follows Rapid S201-S204:
In step s 201, the file destination for a variety of preset formats that user sends is received;
In step S202, Hash calculation is carried out to the file destination of every kind of format respectively, obtains the target of every kind of format The corresponding cryptographic Hash of file;
In step S203, Hash is carried out again according to the corresponding multiple cryptographic Hash of the file destination of obtained multiple format It calculates, obtains the second target cryptographic Hash;
In step S204, the second target cryptographic Hash is stored.
In the present embodiment, before user verifies file to be verified, need that the file to be verified will be verified in advance File destination be sent to the mechanism verified, user needs to provide the file destination of multiple format, for example, original target File, the file destination of number format and the file destination of extensible markup language format.Server is receiving these formats File destination after, Hash calculation is carried out to the file destinations of these formats respectively, to obtain the file destination of every kind of format Corresponding digital digest, and Hash calculation is carried out to these digital digests, the final cryptographic Hash of file destination is obtained, and storing should The final cryptographic Hash of file destination.After the change small to progress any point on file destination, different Hash can be all obtained Value, due to this characteristic of cryptographic Hash, thus, the final cryptographic Hash of currently available file destination can only identify current time File destination, and the file destination after future is modified cannot be identified.To pass through the final cryptographic Hash of storage this document, Realize the saving from damage in data plane to file destination.
The beneficial effect of the present embodiment is: when file changes, corresponding cryptographic Hash will necessarily change, Using this characteristic, as long as obtaining the corresponding cryptographic Hash of file, can be verified by cryptographic Hash, thus, it need to only store text The corresponding cryptographic Hash of part, without storing entire file, thus, reduce the consumption of storage resource.
In one embodiment, as shown in figure 3, above-mentioned steps S204 can be implemented as following steps S301-S302:
In step S301, the second target cryptographic Hash is sent in the block chain for being used to carry out encryption moneytary operations;
In step s 302, when the transaction count for encrypting currency reaches preset number, determine that the second target cryptographic Hash is deposited It stores up successfully, and the second target cryptographic Hash is not modifiable state.
In the present embodiment, to guarantee that the final cryptographic Hash (the second cryptographic Hash) of file destination is not modified, by file destination Final cryptographic Hash is sent in the block chain for carrying out encryption moneytary operations.And the data structure in block chain is similar to heap Stack architecture.Thus, when the final cryptographic Hash of file destination to be sent to the block chain for carrying out encryption moneytary operations, it is equivalent to mesh The final cryptographic Hash of mark file is placed in stack top.Due to that can only be edited to the data of stack top in storehouse, thus, with encryption goods The continuous progress of coin transaction, stack top location are traded replaced corresponding transaction data by these.And due to encryption moneytary operations Speed is very fast, thus, when the encryption moneytary operations number in block chain reaches certain value, handed over unless the speed of access evidence is greater than Otherwise easy speed can not just take out the final cryptographic Hash of file destination, thus, cryptographic Hash that can not be final to file destination carries out Editor.The other users cryptographic Hash final to file destination is avoided to modify.It ensure that the final cryptographic Hash of file destination Safety.
The beneficial effect of the present embodiment is: the second target cryptographic Hash is placed in the block for being used to carry out encryption moneytary operations In chain, since block chain process of exchange is similar to stacking process, due to encrypting moneytary operations fast speed, and due to stack architecture Particularity, thus, after trading for several times, the state of the second target cryptographic Hash becomes not modifiable state, avoids other use Family modifies to the second target cryptographic Hash, ensure that the safety of the second target cryptographic Hash.
In one embodiment, a variety of preset formats comprise at least one of the following format:
Unprocessed form, extensible markup language format and number format;Wherein, extensible markup language format and digital lattice Formula is converted to according to unprocessed form.
In the present embodiment, preset format may include unprocessed form, extensible markup language format and number format.
For example, the file of unprocessed form can be the original document of electronic edition, which can be to entity It is obtained after file scan, such as text file, picture file, audio file, video file.
The file of extensible markup language format can be original document is standardized based on feature database after It arrives, it is generally the case that the file of this kind of format is by information (such as modifier, file format inessential in original document Deng) all weed out after, only retain key message a kind of file.
The file of number format refers to that will save original record with quality as high as possible (records mainly for analogy method Audio, picture, video), generate corresponding number format.For example, original document is a vinyl record, reads the black glue and sing Audio-frequency information in piece stores the audio-frequency information with mp3 format, then the file of the mp3 format is number format File.
The beneficial effect of the present embodiment is: by the way that multiple format is arranged, with by the file destination of multiple format and to Verifying file obtains multiple cryptographic Hash, and ensure that can carry out second of Hash operation, secondly, making file destination and text to be verified The format of part is more diversified.
In one embodiment, as shown in figure 4, after above-mentioned steps S104, this method can also be implemented as walking as follows Rapid S401-S402:
In step S401, when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, judgement can The corresponding cryptographic Hash of file to be verified of extending mark language format and the file destination of extensible markup language format are corresponding Whether cryptographic Hash is identical;
In step S402, when the corresponding cryptographic Hash of file to be verified and extensible markup of extensible markup language format When the corresponding cryptographic Hash of the file destination of language format is identical, determine that file to be verified is identical as file destination.
Content format is adjusted because of situations such as being also likely to be present in the word or file of electronic format, such as word document Middle adjustment line space.And such case and it is not belonging to the behavior distorted to file, but the final cryptographic Hash of this document is still It can so change.
The key message in original document is only recorded in view of the file of extensible markup language format, does not record file The inessential information such as the format of middle content, thus, in the word or file of electronic format when Format adjusting, having no effect on can expand Open up cryptographic Hash corresponding to the file of markup language.Thus, in the present embodiment, when first object cryptographic Hash and the second target When cryptographic Hash comparison result is inconsistent, it is different from file destination file to be verified is not directly determined.But it is more expansible again The corresponding cryptographic Hash of file to be verified of markup language and the corresponding Hash of file destination of extensible markup language format Value.
When the mesh of the file to be verified corresponding cryptographic Hash and extensible markup language format of extensible markup language format When the corresponding cryptographic Hash of mark file is identical, illustrate first object cryptographic Hash and the second inconsistent possibility of target cryptographic Hash comparison result Be due to file slight damage, slight aging or Format adjusting etc. caused by.Therefore, file to be verified is still determined It is identical as file destination, it avoids due to the damage of file fraction or change of format etc. and causes to obtain the verifying knot of mistake Fruit improves the accuracy of verifying.
The beneficial effect of the present embodiment is: when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent When, it does not directly determine that file to be verified is different from file destination, but compares the to be verified of extensible markup language format again The corresponding cryptographic Hash of file destination of the corresponding cryptographic Hash of file and extensible markup language format, when extensible markup language lattice The corresponding cryptographic Hash of file to be verified of formula is when corresponding cryptographic Hash is identical with the file destination of extensible markup language format, still It so determines that file to be verified is identical as file destination, avoids due to change of format etc. and cause to obtain the verifying knot of mistake Fruit improves the accuracy of verifying.
In one embodiment, as shown in figure 5, after above-mentioned steps S104, this method can also be implemented as walking as follows Rapid S501-S503:
In step S501, when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, judgement can The corresponding cryptographic Hash of file to be verified of extending mark language format and the file destination of extensible markup language format are corresponding Whether cryptographic Hash is identical;
In step S502, when the corresponding cryptographic Hash of file to be verified and extensible markup of extensible markup language format When the corresponding cryptographic Hash of the file destination of language format is identical, the corresponding cryptographic Hash of file to be verified and number of number format are judged Whether the corresponding cryptographic Hash of the file destination of word format is identical;
In step S503, when the file destination pair of the file to be verified corresponding cryptographic Hash and number format of number format When the cryptographic Hash answered is identical, determine that file to be verified is identical as file destination.
Since there are slight aging or slight damages for the original document of entity, it is contemplated that extensible markup language lattice The file of formula only records the key message in original document, does not record the inessential information such as format of content in file, Thus, when original document does not still lose key message there are slight aging or slight damage, have no effect on expansible mark Remember cryptographic Hash corresponding to the file of language format.Thus, in the present embodiment, when first object cryptographic Hash and the second target Hash When value comparison result is inconsistent, it is different from file destination file to be verified is not directly determined.But compare extensible markup again The corresponding cryptographic Hash of file to be verified of language format and the corresponding cryptographic Hash of file destination of extensible markup language format.
But the continuity of some the file informations is more important, a such as disc, when the slight aging of disc generation or gently After micro- damage, lost part audio data then will lead to that audio is discontinuous, and only key message is not lost still to will affect and be listened Feel effect.
Thus, it is contemplated that above situation, when extensible markup language format the corresponding cryptographic Hash of file to be verified and can When the corresponding cryptographic Hash of the file destination of extending mark language format is identical.File and file destination to be verified are not directly determined It is identical, but need to continue to judge that the corresponding cryptographic Hash of file to be verified of number format is corresponding with the file destination of number format Cryptographic Hash it is whether identical.
When the corresponding cryptographic Hash of the file to be verified cryptographic Hash phase corresponding with the file destination of number format of number format Meanwhile just determining that file to be verified is identical as file destination.
The beneficial effect of the present embodiment is: when the corresponding cryptographic Hash of the file of extensible markup language format and digital lattice When the corresponding cryptographic Hash comparison result of the file of formula is all the same, determine that file to be verified is identical as file destination, thus, by double Re-examination card, further ensures the accuracy of verifying.
In one embodiment, as shown in fig. 6, after above-mentioned steps S502, method can also be implemented as following steps S601-S602:
In step s 601, when the file destination pair of the file to be verified corresponding cryptographic Hash and number format of number format When the cryptographic Hash answered is not identical, the file destination of the file and number format to be verified of number format is compared;
In step S602, when the difference between the file destination of the file and number format to be verified of number format is less than When preset threshold, determine that file to be verified is identical as file destination.
Still by taking disc as an example, when the damage of disc and its small, for example, when only several seconds audio-frequency informations are lost, this The damage of sample is acceptable.Thus, in the present embodiment, when the corresponding cryptographic Hash of file to be verified and number of number format When the corresponding cryptographic Hash of the file destination of format is not identical, by the file destination of the file and number format to be verified of number format It is compared.
When the difference between the file destination of the file and number format to be verified of number format is less than preset threshold.Example Such as, less than 0.1%, then such difference be within the acceptable range, thus, still can determine file to be verified and target File is identical.
The beneficial effect of the present embodiment is: when the file to be verified corresponding cryptographic Hash and number format of number format When the corresponding cryptographic Hash of file destination is not identical, it is different from file destination not directly determine file to be verified, but will be digital The file destination of the file and number format to be verified of format is compared, when the band verifying file and number format of number format File destination between difference be less than preset threshold when, still determine that file to be verified is identical as file destination, thus, avoid When original document is entity file, the verification result of mistake is obtained due to file slight damage, further ensures verifying Accuracy.
It in one embodiment, include the file for needing to be verified according to file destination in file to be verified;
As shown in fig. 7, in above-mentioned steps S105, S402, S503, S602 after either step, method can also be carried out For following steps S701-S702:
In step s 701, when determining that file to be verified is identical as file destination content, file verification to be verified is determined Pass through;
In step S702, the prompting message being verified is exported.
In the present embodiment, when determining that file to be verified is identical as file destination content, it is determined that file verification to be verified Pass through, exports the prompting message being verified.
In addition, the prompting message not only can also can be transmitted in local output to the user of offer file to be verified.
The beneficial effect of the present embodiment is: when file to be verified is identical as file destination content, determining text to be verified Part is verified, and exports the prompting message being verified, to realize the prompting to verification result.
Fig. 8 is a kind of block diagram of document handling apparatus shown according to an exemplary embodiment, as shown in figure 8, the device Server corresponding to the mechanism of service or notarization service can be saved from damage as offer data to realize, which includes such as lower die Block:
First receiving module 81, the file to be verified of a variety of preset formats for receiving user's transmission;
First computing module 82 carries out Hash calculation for the file to be verified respectively to every kind of format, obtains every kind of lattice The corresponding cryptographic Hash of file to be verified of formula;
Second computing module 83, for according to the obtained corresponding multiple cryptographic Hash of file to be verified of multiple format again Hash calculation is carried out, first object cryptographic Hash is obtained;
Comparison module 84, for comparing first object cryptographic Hash the second target cryptographic Hash corresponding with file destination Compared with;
First determining module 85 is used for when first object cryptographic Hash is consistent with the second target cryptographic Hash comparison result, really Fixed file to be verified is identical as file destination content.
In one embodiment, as shown in figure 9, device further include:
Second receiving module 91, for receiving before the file to be verified for receiving a variety of preset formats that user sends The file destination for a variety of preset formats that user sends;
Third computing module 92 carries out Hash calculation for the file destination respectively to every kind of format, obtains every kind of format The corresponding cryptographic Hash of file destination;
4th computing module 93, for according to the obtained corresponding multiple cryptographic Hash of file destination of multiple format again into Row Hash calculation obtains the second target cryptographic Hash;
Memory module 94, for storing the second target cryptographic Hash.
In one embodiment, as shown in Figure 10, memory module 94, comprising:
Sending module 101, for being sent to the second target cryptographic Hash in the block chain for being used to carry out encryption moneytary operations;
Second determining module 102, for determining that the second target is breathed out when the transaction count for encrypting currency reaches preset number Uncommon value stores successfully, and the second target cryptographic Hash is not modifiable state.
In one embodiment, as shown in figure 11, device further include:
First judgment module 111 is used for when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, Judge the file destination of the file to be verified corresponding cryptographic Hash and extensible markup language format of extensible markup language format Whether corresponding cryptographic Hash is identical;
Third determining module 112, for when extensible markup language format the corresponding cryptographic Hash of file to be verified and can When the corresponding cryptographic Hash of the file destination of extending mark language format is identical, determine that file to be verified is identical as file destination.
In one embodiment, as shown in figure 12, device further include:
Second judgment module 121 is used for when first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, Judge the file destination of the file to be verified corresponding cryptographic Hash and extensible markup language format of extensible markup language format Whether corresponding cryptographic Hash is identical;
Third judgment module 122, for when extensible markup language format the corresponding cryptographic Hash of file to be verified and can When the corresponding cryptographic Hash of the file destination of extending mark language format is identical, the corresponding Kazakhstan of file to be verified of number format is judged Whether identical wish value cryptographic Hash corresponding with the file destination of number format;
4th determining module 123, the mesh for file to be verified corresponding cryptographic Hash and number format when number format When the corresponding cryptographic Hash of mark file is identical, determine that file to be verified is identical as file destination.
In one embodiment, as shown in figure 13, device further include:
Comparison module 131, for when the corresponding cryptographic Hash of file to be verified of number format and the target text of number format When the corresponding cryptographic Hash of part is not identical, the file destination of the file and number format to be verified of number format is compared;
5th determining module 132, for when between the file destination of the file and number format to be verified of number format When difference is less than preset threshold, determine that file to be verified is identical as file destination.
It in one embodiment, include the file for needing to be verified according to file destination in file to be verified;
As shown in figure 14, device further include:
Output module 141, for when determining that file to be verified is identical as file destination content, exporting mentioning of being verified Show message.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The shape for the computer program product implemented in usable storage medium (including but not limited to magnetic disk storage and optical memory etc.) Formula.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (14)

1. a kind of document handling method characterized by comprising
Receive the file to be verified for a variety of preset formats that user sends;
Hash calculation is carried out to the file to be verified of every kind of format respectively, obtains the corresponding Hash of file to be verified of every kind of format Value;
Hash calculation is carried out again according to the corresponding multiple cryptographic Hash of the file to be verified of obtained multiple format, obtains the first mesh Mark cryptographic Hash;
The first object cryptographic Hash the second target cryptographic Hash corresponding with file destination is compared;
When the first object cryptographic Hash is consistent with the second target cryptographic Hash comparison result, the file to be verified is determined It is identical as the file destination content;
A variety of preset formats comprise at least one of the following format:
Unprocessed form, extensible markup language format and number format;Wherein, the extensible markup language format and digital lattice Formula is converted to according to the unprocessed form.
2. the method as described in claim 1, which is characterized in that
Before the file to be verified for a variety of preset formats that the reception user sends, the method also includes:
Receive the file destination for a variety of preset formats that user sends;
Hash calculation is carried out to the file destination of every kind of format respectively, obtains the corresponding cryptographic Hash of file destination of every kind of format;
Hash calculation is carried out again according to the corresponding multiple cryptographic Hash of the file destination of obtained multiple format, obtains described second Target cryptographic Hash;
The second target cryptographic Hash is stored.
3. method according to claim 2, which is characterized in that
It is described to store the second target cryptographic Hash, comprising:
The second target cryptographic Hash is sent in the block chain for being used to carry out encryption moneytary operations;
When the transaction count of the encryption currency reaches preset number, determine that the second target cryptographic Hash stores successfully, and The second target cryptographic Hash is not modifiable state.
4. the method as described in claim 1, which is characterized in that
The method also includes:
When the first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, the expansible mark is judged Remember the corresponding cryptographic Hash of file to be verified of language format and the corresponding Kazakhstan of file destination of the extensible markup language format Whether uncommon value is identical;
The corresponding cryptographic Hash of file to be verified and the extensible markup language format when the extensible markup language format The corresponding cryptographic Hash of file destination it is identical when, determine that the file to be verified is identical as the file destination.
5. the method as described in claim 1, which is characterized in that
The method also includes:
When the first object cryptographic Hash and the second target cryptographic Hash comparison result are inconsistent, the expansible mark is judged Remember the corresponding cryptographic Hash of file to be verified of language format and the corresponding Kazakhstan of file destination of the extensible markup language format Whether uncommon value is identical;
The corresponding cryptographic Hash of file to be verified and the extensible markup language format when the extensible markup language format The corresponding cryptographic Hash of file destination it is identical when, judge the number format the corresponding cryptographic Hash of file to be verified and the number Whether the corresponding cryptographic Hash of the file destination of word format is identical;
When the corresponding cryptographic Hash of the file to be verified Hash corresponding with the file destination of the number format of the number format When being worth identical, determine that the file to be verified is identical as the file destination.
6. method as claimed in claim 5, which is characterized in that
The method also includes:
When the corresponding cryptographic Hash of the file to be verified Hash corresponding with the file destination of the number format of the number format When being worth not identical, the file destination of the file and number format to be verified of the number format is compared;
When the difference between the file to be verified of the number format and the file destination of the number format is less than preset threshold When, determine that the file to be verified is identical as the file destination.
7. the method as described in any one of claim 1,4,5,6, which is characterized in that
It include the file for needing to be verified according to the file destination in the file to be verified;
The method also includes:
When determining that the file to be verified is identical as the file destination content, the prompting message being verified is exported.
8. a kind of document handling apparatus characterized by comprising
First receiving module, the file to be verified of a variety of preset formats for receiving user's transmission;
First computing module, for carrying out Hash calculation to the file to be verified of every kind of format respectively, obtain every kind of format to Verify the corresponding cryptographic Hash of file;
Second computing module, for being breathed out again according to the corresponding multiple cryptographic Hash of file to be verified of obtained multiple format It is uncommon to calculate, obtain first object cryptographic Hash;
Comparison module, for the first object cryptographic Hash the second target cryptographic Hash corresponding with file destination to be compared;
First determining module is used for when the first object cryptographic Hash is consistent with the second target cryptographic Hash comparison result, Determine that the file to be verified is identical as the file destination content;
A variety of preset formats comprise at least one of the following format:
Unprocessed form, extensible markup language format and number format;Wherein, the extensible markup language format and digital lattice Formula is converted to according to the unprocessed form.
9. device as claimed in claim 8, which is characterized in that described device further include:
Second receiving module, for receiving and using before the file to be verified for a variety of preset formats that the reception user sends The file destination for a variety of preset formats that family is sent;
Third computing module carries out Hash calculation for the file destination respectively to every kind of format, obtains the target of every kind of format The corresponding cryptographic Hash of file;
4th computing module, for carrying out Hash again according to the corresponding multiple cryptographic Hash of file destination of obtained multiple format It calculates, obtains the second target cryptographic Hash;
Memory module, for storing the second target cryptographic Hash.
10. device as claimed in claim 9, which is characterized in that the memory module, comprising:
Sending module, for being sent to the second target cryptographic Hash in the block chain for being used to carry out encryption moneytary operations;
Second determining module, for determining second target when the transaction count of the encryption currency reaches preset number Cryptographic Hash stores successfully, and the second target cryptographic Hash is not modifiable state.
11. device as claimed in claim 8, which is characterized in that described device further include:
First judgment module, it is inconsistent for working as the first object cryptographic Hash and the second target cryptographic Hash comparison result When, judge the corresponding cryptographic Hash of file to be verified of extensible markup language format and the target text of extensible markup language format Whether the corresponding cryptographic Hash of part is identical;
Third determining module, for when the extensible markup language format the corresponding cryptographic Hash of file to be verified and it is described can When the corresponding cryptographic Hash of the file destination of extending mark language format is identical, the file to be verified and the file destination are determined It is identical.
12. device as claimed in claim 8, which is characterized in that described device further include:
Second judgment module, it is inconsistent for working as the first object cryptographic Hash and the second target cryptographic Hash comparison result When, judge the corresponding cryptographic Hash of file to be verified of extensible markup language format and the target text of extensible markup language format Whether the corresponding cryptographic Hash of part is identical;
Third judgment module, for when the extensible markup language format the corresponding cryptographic Hash of file to be verified and it is described can When the corresponding cryptographic Hash of the file destination of extending mark language format is identical, the corresponding Kazakhstan of file to be verified of number format is judged Whether identical wish value cryptographic Hash corresponding with the file destination of number format;
4th determining module, the mesh for file to be verified corresponding cryptographic Hash and the number format when the number format When the corresponding cryptographic Hash of mark file is identical, determine that the file to be verified is identical as the file destination.
13. device as claimed in claim 12, which is characterized in that described device further include:
Comparison module, for when the corresponding cryptographic Hash of file to be verified of the number format and the target text of the number format When the corresponding cryptographic Hash of part is not identical, the file destination of the file and number format to be verified of the number format is compared It is right;
5th determining module, for when between the file to be verified of the number format and the file destination of the number format When difference is less than preset threshold, determine that the file to be verified is identical as the file destination.
14. the device as described in any one of claim 8,11,12,13, which is characterized in that include in the file to be verified Need the file verified according to the file destination;
Described device further include:
Output module is verified for exporting when determining that the file to be verified is identical as the file destination content Prompting message.
CN201610933607.4A 2016-10-31 2016-10-31 File processing method and device Active CN106548092B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610933607.4A CN106548092B (en) 2016-10-31 2016-10-31 File processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610933607.4A CN106548092B (en) 2016-10-31 2016-10-31 File processing method and device

Publications (2)

Publication Number Publication Date
CN106548092A CN106548092A (en) 2017-03-29
CN106548092B true CN106548092B (en) 2019-07-16

Family

ID=58392842

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610933607.4A Active CN106548092B (en) 2016-10-31 2016-10-31 File processing method and device

Country Status (1)

Country Link
CN (1) CN106548092B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106650495B (en) * 2016-12-16 2019-07-16 杭州嘉楠耘智信息科技有限公司 File verification method and device
CN107273514A (en) * 2017-06-21 2017-10-20 杭州云证网络科技有限公司 A kind of inspection method and application its inspect subsystem and data deposit signed certificate administration chain-circuit system
CN107316239A (en) * 2017-07-14 2017-11-03 众安信息技术服务有限公司 A kind of authentification of message and source tracing method and system based on block chain
CN107943833B (en) * 2017-10-25 2021-11-19 华南农业大学 Centerless distributed file storage and retrieval method based on block chain
CN108764944A (en) * 2018-05-31 2018-11-06 北京京东尚科信息技术有限公司 Verification method, device and computer readable storage medium
CN109409122B (en) * 2018-09-13 2022-08-16 远光软件股份有限公司 File storage method, electronic device and storage medium
CN109472164A (en) * 2018-09-13 2019-03-15 远光软件股份有限公司 The verification method and its network and electronic equipment of contract dataset
CN109409749A (en) * 2018-10-30 2019-03-01 四川长虹电器股份有限公司 A kind of IT assets management method based on block chain
US10949388B2 (en) * 2018-11-16 2021-03-16 Advanced Messaging Technologies, Inc. Systems and methods for distributed data storage and delivery using blockchain
CN109698822A (en) * 2018-11-28 2019-04-30 众安信息技术服务有限公司 Combination learning method and system based on publicly-owned block chain and encryption neural network
CN109977274B (en) * 2019-03-31 2021-05-11 杭州复杂美科技有限公司 Data query and verification method, system, equipment and storage medium
CN112966306A (en) * 2021-04-02 2021-06-15 西安慧博文定信息技术有限公司 Processing method and device for blind verification file

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488952A (en) * 2013-09-24 2014-01-01 华为技术有限公司 File integrity verification method and file processor
CN104298934A (en) * 2014-10-27 2015-01-21 浪潮(北京)电子信息产业有限公司 File verification method, server and system in cloud calculation system
CN104573490A (en) * 2013-10-29 2015-04-29 桂林电子科技大学 Method for protecting installed software on Android platform
CN104954353A (en) * 2015-02-10 2015-09-30 腾讯科技(深圳)有限公司 Verification method and apparatus of APK file package
WO2016127516A1 (en) * 2015-02-13 2016-08-18 中兴通讯股份有限公司 File signature method for operating system, file check method, and apparatus
CN106055602A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 File verification method and apparatus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488952A (en) * 2013-09-24 2014-01-01 华为技术有限公司 File integrity verification method and file processor
CN104573490A (en) * 2013-10-29 2015-04-29 桂林电子科技大学 Method for protecting installed software on Android platform
CN104298934A (en) * 2014-10-27 2015-01-21 浪潮(北京)电子信息产业有限公司 File verification method, server and system in cloud calculation system
CN104954353A (en) * 2015-02-10 2015-09-30 腾讯科技(深圳)有限公司 Verification method and apparatus of APK file package
WO2016127516A1 (en) * 2015-02-13 2016-08-18 中兴通讯股份有限公司 File signature method for operating system, file check method, and apparatus
CN106055602A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 File verification method and apparatus

Also Published As

Publication number Publication date
CN106548092A (en) 2017-03-29

Similar Documents

Publication Publication Date Title
CN106548092B (en) File processing method and device
CN110175436A (en) The generation of block chain digital certificate, verification method, computer equipment and storage medium
CN108809932B (en) Block chain-based deposit certificate system, method and readable medium
US20180121635A1 (en) Systems and methods for authenticating video using watermarks
CN106650495B (en) File verification method and device
US11216903B2 (en) Watermark security
CN110427774A (en) Data based on block chain deposit card method, data verification method and relevant apparatus
CN106534273A (en) Block chain metadata storage system, and storage method and retrieval method thereof
EP4114012A1 (en) Method and apparatus for processing multimedia information, and electronic device and storage medium
CN108256354B (en) Test data-based storage method and storage medium
US8422786B2 (en) Analyzing documents using stored templates
CN109033772A (en) A kind of input method and device of verification information
CN109447809B (en) Video active identification method combined with block chain
CN111177272B (en) Big data credible audit method based on block chain
CN104168117B (en) A kind of speech digit endorsement method
CN111222180A (en) Method, system, device and medium for judging whether accounting document is tampered
US8719690B2 (en) Method and system for automatic data aggregation
CN109191126A (en) A kind of cash inter-bank circulation method, terminal and medium based on block chain
CN115982764A (en) Method, system, device and medium for storing electronic file based on block chain
JP2007096608A (en) Unauthorized image detection apparatus, method, and program
TW202027027A (en) Method and device for invoking voice synthesis file
CN110347678B (en) Financial data storage method, system, device and equipment
US20200057871A1 (en) Apparatuses and methods for signing a legal document
CN108108593A (en) E text power certificates constructing, the method used, terminal device and storage medium
CN114780932B (en) Cross-block chain data interaction verification method, system and equipment for management three-mode platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211021

Address after: 200436 room 138, No. 5 and 6, Lane 1188, Wanrong Road, Jing'an District, Shanghai

Patentee after: Shanghai Canaan Jiesi Information Technology Co.,Ltd.

Address before: Room 1203, 12 / F, building 4, No. 9, Jiuhuan Road, Jianggan District, Hangzhou City, Zhejiang Province, 310019

Patentee before: Hangzhou Canaan Creative Information Technology Ltd.