CN107911359A - A kind of method for obtaining electronic data - Google Patents
A kind of method for obtaining electronic data Download PDFInfo
- Publication number
- CN107911359A CN107911359A CN201711103881.XA CN201711103881A CN107911359A CN 107911359 A CN107911359 A CN 107911359A CN 201711103881 A CN201711103881 A CN 201711103881A CN 107911359 A CN107911359 A CN 107911359A
- Authority
- CN
- China
- Prior art keywords
- client
- server
- electronic data
- cryptographic hash
- compressed package
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method for obtaining electronic data, including:Client terminal start-up screen recording;Client is removed and browses record and cache file;Client parses DNS and is connected with server;Client enables camera and obtains the facial image of active user and verified;Client stamps the timestamp of Big Dipper time service on electronic data;Client generates the snapshot of electronic data, and the cryptographic Hash of electronic data is calculated using hash algorithm;Client is compressed generation compressed package to electronic data, cryptographic Hash and facial image;Client preserves cryptographic Hash and compressed package uploads onto the server;Server decompression compressed package generation solution briquetting;Server authentication snapshot and cryptographic Hash, when verifying qualified, preserve electronic data and cryptographic Hash, and send and feed back to server;Client closes screen recording and preserves the video of recording.By means of the invention it is possible to improve the security of data transfer.
Description
Technical field
The present invention relates to electronic data field, more particularly, to a kind of method for obtaining electronic data.
Background technology
With the development of science and technology, electronic equipment has become a part indispensable in Working Life, and people make
With that will produce substantial amounts of electronic data during electronic equipment, these electronic data had both included the use of caching letter caused by electronic equipment
Breath, also including the document established in people's routine work and photo etc., in actual work and life, inevitably needs
The exchange of electronic data is carried out, causes loss of data sometimes for the local electronic failure of prevention, it is also necessary to by local electricity
Subdata is uploaded to the webserver, carries out cloud storage and backup, is required for carrying out the transmission and friendship of data during these
Change.
But electronic data is easy to be tampered, if electronic data is maliciously repaiied during electronic data is transmitted
Change, then the electronic data of transmission side and recipient will be inconsistent, then transmission also just loses meaning in itself, and therefore, it is necessary to adopt
Transmitting procedure is encrypted with various encryption technologies, prevents that electronic data is maliciously tampered in transmitting procedure, still, electronics
Data are in transmitting procedure in addition to it can be maliciously tampered, it is also possible to which because error code, and non-artificial malice is distorted, and causes to transmit
Electronic data mistake, in addition, during transmission, the electronic data not yet transmitted is also possible to be maliciously tampered, and causes
Recipient can not receive correct electronic data.
Therefore it provides a kind of method for obtaining electronic data, improves the security of data transfer, is that this area is urgently to be resolved hurrily
The problem of.
The content of the invention
In view of this, the present invention provides a kind of method for obtaining electronic data, the security of data transfer is improved.
In order to solve the above-mentioned technical problem, the present invention proposes a kind of method for obtaining electronic data, including:
Client terminal start-up screen recording;
The client is removed and browses record and cache file;
The client parses DNS and is connected with server;
The client enables camera and obtains the facial image of active user and verified;
The client stamps the timestamp of Big Dipper time service on the electronic data;
The client generates the snapshot of the electronic data, and the Hash of the electronic data is calculated using hash algorithm
Value;
The client is compressed generation compressed package to the electronic data, the cryptographic Hash and the facial image;
The client preserves the cryptographic Hash and the compressed package is uploaded to the server;
The server decompresses the compressed package generation solution briquetting;
Snapshot described in the server authentication and the cryptographic Hash, when verifying qualified, preserve the electronic data and institute
Cryptographic Hash is stated, and sends and feeds back to the server;
The client closes screen recording and preserves the video of recording.
Optionally, snapshot described in the server authentication and the cryptographic Hash, further for:Described in the server obtains
The snapshot in briquetting is solved, when the content of the snapshot matches with the electronic data, snapshot verification is qualified, the clothes
Business device calculates the contrast cryptographic Hash of the electronic data using hash algorithm, when the contrast cryptographic Hash is identical with the cryptographic Hash
When, cryptographic Hash verification is qualified.
Optionally, it is described when the client preserves the cryptographic Hash and the compressed package is uploaded to the server
Client is by the write operation of the disk partition where suspending the compressed package.
Optionally, in snapshot and the cryptographic Hash described in the server authentication, Hash described in the server authentication
Value, further for:
The server calculates the contrast cryptographic Hash of the electronic data using hash algorithm, when the contrast cryptographic Hash with
When the cryptographic Hash is identical, the contrast cryptographic Hash is fed back into the client, when the received contrast of the client
Cryptographic Hash, when identical with the cryptographic Hash that the client preserves, the qualified information of client feedback verification to the clothes
Business device, cryptographic Hash verification are qualified.
Optionally, the compressed package is uploaded to the server, further for;
When the compressed package is not more than 50 Mbytes, the compressed package is uploaded to the server by the client;
When the compressed package is more than 50 Mbytes:The compressed package is changed into character string by the client, by described in
Character string splits at least two substring, and is arranged according to the order in the character string, wherein:It is any described
The size of substring, no more than 50 Mbytes,
The substring is uploaded one by one to the server.
Optionally, the client enable camera obtain active user facial image and verified, further for:
The facial image is uploaded to the server by the client, and the server obtains active user and deposits in advance
User images in the server are stored up, obtain the primitive character point in the user images, described in the server obtains
Contrast characteristic's point in facial image, when the primitive character point matches with contrast characteristic's point, facial image verification
It is qualified.
Optionally, before client terminal start-up screen recording, further include:Start network environment detection, kill virus, pause is different
Chang Jincheng
Optionally, when the client preserves the cryptographic Hash and the compressed package is uploaded to the server, use
AES, SHE 1 or md5 encryption algorithm are encrypted.
Compared with prior art, the method for a kind of acquisition electronic data of the invention, realizes following beneficial effect:
A kind of method for obtaining electronic data is provided, by carrying out Hash calculation to electronic data, obtains unique breathe out
Uncommon value, and timestamp is assigned, electronic data is have cured, carries out environmental scanning and checking and killing virus before transmission, and to electronic data
Snapshot is generated, by contrasting cryptographic Hash and snapshot data, so as to ensure the data phase of server received data and client
Together.
By referring to the drawings to the present invention exemplary embodiment detailed description, further feature of the invention and its
Advantage will be made apparent from.
Brief description of the drawings
It is combined in the description and the attached drawing of a part for constitution instruction shows the embodiment of the present invention, and even
It is used to explain the principle of the present invention together with its explanation.
Fig. 1 is a kind of flow chart for the method for obtaining electronic data in embodiment 1;
Embodiment
Carry out the various exemplary embodiments of detailed description of the present invention now with reference to attached drawing.It should be noted that:Unless in addition have
Body illustrates that the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally
The scope of invention.
The description only actually at least one exemplary embodiment is illustrative to be never used as to the present invention below
And its application or any restrictions that use.
It may be not discussed in detail for technology, method and apparatus known to person of ordinary skill in the relevant, but suitable
In the case of, the technology, method and apparatus should be considered as part for specification.
In shown here and discussion all examples, any occurrence should be construed as merely exemplary, without
It is as limitation.Therefore, other examples of exemplary embodiment can have different values.
It should be noted that:Similar label and letter represents similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined, then it need not be further discussed in subsequent attached drawing in a attached drawing.
Embodiment 1
Fig. 1 is a kind of flow chart for the method for obtaining electronic data in embodiment 1, as shown in Figure 1, a kind of obtain electron number
According to method, including:
S101:Client terminal start-up screen recording, removing browse record and cache file.
Specifically, when user needs to transmit electronic data, it is necessary first to start client, client after start-up can
Start screen recording function, third party's screen recording function can also be called, by all operating processes record shield by way of into
Row records, the evidence being transmitted as electronic data, and then client can be disposed and browse record and cache file, prevent these
There is the transmission that wooden horse influences electronic data in file, the transmission of electron data provides a cleaning and safe environment.
S102:Client parses DNS and is connected with server.
S103:Client enables camera and obtains the facial image of active user and verified
Specifically, after client parsing DNS, trial is connected with the server that user specifies, and verifies testing for active user
Account and password are demonstrate,proved, client will singly start camera after successful connection, and gather the facial image of active user, and user is advance
Prestored the user images mutually bound with oneself account on the server, and the purpose for gathering facial image is by recognition of face
Method ensures the legitimacy of the user currently logged in.
Further, in some optional embodiments, client enables the facial image that camera obtains active user
And verified, further for:Client uploads onto the server facial image, and server obtains active user and is stored in advance in
User images in server, obtain the primitive character point in user images, and server obtains the contrast characteristic in facial image
Point, when primitive character point and contrast characteristic's point are to when matching, facial image verification is qualified, i.e., the account of user and user images must
Must all match can carry out the transmission of electronic data.
S104:Client stamps the timestamp of Big Dipper time service on electronic data.
Specifically, after client and server successful connection, client by proofread local time and server when
Between, it is necessary to kept for the time of client consistent with the time of server, differed when the time of client and the time of server
During cause, server to client return warning message, it is desirable to client change local zone time, if client without modification,
And be to continue with operating, institute's having time is subject to time of server end without exception, and the time of server end is awarded by network and the Big Dipper
When it is consistent, the timestamp of Big Dipper time service is beaten on electronic data, it was demonstrated that the actual time that the electronic data is transmitted, make
One of voucher for electronic data transfer.
S105:Client shoots the snapshot for the electronic data to be uploaded, and the Kazakhstan of electronic data is calculated using hash algorithm
Uncommon value.
Specifically, client obtains the essential information for the electronic data to be uploaded, and snapshot is prepared according to the essential information,
The content of snapshot includes:The size of the species of electronic data, the number of various species electronic data and various species electronic data
Deng in the related art, often only electronic data being encrypted without extracting snapshot, the present invention is by generating the side of snapshot
Formula, further increases the security of electronic data, it is necessary to which the electronic data being transmitted can be picture, word, video, sound
One or more in frequency and other kinds of electronic document, client obtain electronic data using hash algorithm and uniquely breathe out
Uncommon value, as the foundation for being transmitted result comparison afterwards, the snapshot of generation can be picture or form or text
Shelves.
S106:Client is compressed electronic data, snapshot and cryptographic Hash generation compressed package, and client preserves cryptographic Hash
And compressed package is uploaded onto the server.
Specifically, electronic data and cryptographic Hash are compressed by client together, the data volume to be uploaded, while visitor are reduced
Family end is locally preserving cryptographic Hash, and before user end to server uploads related data, client first sends pre- to server
The key first set, after received server-side to the key, returns to checking information, client receives checking information to client
Afterwards, it is ensured that connection is correct, then is transmitted, and in some optional embodiments, client preserves cryptographic Hash and by compressed package
When reaching server, it is encrypted using AES, SHE 1 and md5 encryption algorithm.
Further, in some optional embodiments, client preserves cryptographic Hash and compressed package uploads onto the server
When, the write operation of the disk partition where suspending compressed package, i.e. user can be limited compressed package by client when uploading compressed package
The write operation of place disk, prevents malicious plugins from changing data when user uploads data, in some optional embodiments,
A specified region in disk can be delimited as storage region, the electronic data that will be transmitted is stored in the storage region
It is interior, only limit the write operation of the storage region when transmitting electronic data, i.e. the storage region is when data are transmitted
Can read to write, so as to prevent data to be tampered, while nor affect on other normal readings without the electronic data of transmission
Write operation.
Further, in some optional embodiments, compressed package is uploaded onto the server, further for:Work as compressed package
During no more than 50 Mbytes, client uploads onto the server compressed package;
When compressed package is more than 50 Mbytes:Compressed package is changed into character string by client, and character string is split at least 2
A substring, and arranged according to order of the substring in character string, wherein:The size of any substring, no
More than 50 Mbytes, substring is uploaded one by one to server.
Specifically, when uploading electronic data, data volume is bigger, more be easy to cause error code, therefore single by limiting
The mode of file size, can reduce error code, in of the invention, limit the data volume once uploaded and be not more than 50 Mbytes, when need
When the compressed package to be uploaded is less than 50 Mbytes, compressed package is directly uploaded, when compressed package is larger, it is split, split
When convert it into character string, according to the order of character string first extract size be 50,000,000 character string, be then further continued for carrying
The character string that size is 50,000,000 is taken, is uploaded successively until compressed package is fully extracted, then by the substring obtained.
S107:Server decompression compressed package generation solution briquetting, server authentication snapshot and cryptographic Hash, when verifying qualified,
Electronic data and cryptographic Hash are preserved, and sends and feeds back to client.
Specifically, can send confirmation message after client transmissions to server, server will after receiving confirmation message
A feedback information is first sent to client, shows to receive, client confirms that upload terminates after receiving the feedback information,
After if client sends confirmation message, feedback information is not received by more than certain time, will be again attempted to and server phase
Connection, and upload again, in some optional embodiments, client often uploads a certain amount of data, can all require server
A feedback information is sent, institute's feedack is default information, ensures client and server by verifying presupposed information
Between connection safety.Server is after compressed package is received, decompression generation solution briquetting, including:Cryptographic Hash, electronic data and
Snapshot, then verifies cryptographic Hash, electronic data and snapshot, when a certain item is verified obstructed out-of-date, shows to client feedback information
Error of transmission, it is desirable to upload again.When being all verified, electronic data and cryptographic Hash are preserved, then to client feedback
Information shows that transmission smoothly completes.
Further, in some optional embodiments, server authentication snapshot and cryptographic Hash, further for:Server
Obtain the snapshot in solution briquetting, so that it is determined that the electronic data that transmission comes include data class, number, the information such as size, when
When the content of snapshot matches with electronic data, snapshot verification is qualified, and server calculates pair of electronic data using hash algorithm
Than cryptographic Hash, when contrast cryptographic Hash is identical with cryptographic Hash, cryptographic Hash verification is qualified.Different electronic data uses hash algorithm
The cryptographic Hash obtained afterwards is different, and cryptographic Hash is as data fingerprint, as the unique mark of electronic data, so as to ensure electricity
The integrality and uniqueness of subdata, in some optional embodiments, server authentication cryptographic Hash, further for:Server
The contrast cryptographic Hash of electronic data is calculated using hash algorithm, when contrast cryptographic Hash is identical with cryptographic Hash, cryptographic Hash will be contrasted
Feed back to client, when the received contrast cryptographic Hash of client, with client be stored in local cryptographic Hash it is identical when, client
Feedback validation qualification information is qualified to server, cryptographic Hash verification.May electronic data and cryptographic Hash i.e. in data transmission procedure
All it is maliciously tampered, at this time, contrast cryptographic Hash is fed back into client, then judged by client, so as to further improves
The security of electronic data, prevents from being maliciously tampered.
S108:Client closes screen recording and preserves the video of recording.
Specifically, client preserves the video recorded as the upload successful voucher of data.
Further, in some optional embodiments, before client terminal start-up screen recording, further include:Start network
Environment measuring, kills virus, and suspends abnormal process.
Specifically, by detecting network environment, killing virus and wooden horse and pause abnormal process, it is provided to data
Transmission provide a safety environment, prevent malice distort and intercept.
A kind of method of acquisition electronic data of the present invention, realizes following beneficial effect:
A kind of method for obtaining electronic data is provided, by carrying out Hash calculation to electronic data, obtains unique breathe out
Uncommon value, and timestamp is assigned, electronic data is have cured, carries out environmental scanning and checking and killing virus before transmission, and to electronic data
Snapshot is generated, by contrasting cryptographic Hash and snapshot data, so as to ensure the data phase of server received data and client
Together
Although some specific embodiments of the present invention are described in detail by example, the skill of this area
Art personnel it should be understood that example above merely to illustrating, the scope being not intended to be limiting of the invention.The skill of this area
Art personnel are it should be understood that without departing from the scope and spirit of the present invention can modify above example.This hair
Bright scope is defined by the following claims.
Claims (8)
- A kind of 1. method for obtaining electronic data, it is characterised in that including:Client terminal start-up screen recording;The client is removed and browses record and cache file;The client parses DNS and is connected with server;The client enables camera and obtains the facial image of active user and verified;The client stamps the timestamp of Big Dipper time service on electronic data;The client generates the snapshot of the electronic data, and the cryptographic Hash of the electronic data is calculated using hash algorithm;The client is compressed generation compressed package to the electronic data, the cryptographic Hash and the facial image;The client preserves the cryptographic Hash and the compressed package is uploaded to the server;The server decompresses the compressed package generation solution briquetting;Snapshot described in the server authentication and the cryptographic Hash, when verifying qualified, preserve the electronic data and the Kazakhstan Uncommon value, and send and feed back to the server;The client closes screen recording and preserves the video of recording.
- 2. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that fast described in the server authentication According to the cryptographic Hash, further for:The server obtains the snapshot in the solution briquetting, when the content of the snapshot When matching with the electronic data, snapshot verification is qualified, and the server calculates the electronic data using hash algorithm Cryptographic Hash is contrasted, when the contrast cryptographic Hash is identical with the cryptographic Hash, cryptographic Hash verification is qualified.
- 3. a kind of method for obtaining electronic data as claimed in claim 2, it is characterised in that the client preserves the Kazakhstan Uncommon value and when the compressed package is uploaded to the server, the client is by the disk partition where suspending the compressed package Write operation.
- 4. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that fast described in the server authentication According to in the cryptographic Hash, cryptographic Hash described in the server authentication, further for:The server calculates the contrast cryptographic Hash of the electronic data using hash algorithm, when the contrast cryptographic Hash with it is described When cryptographic Hash is identical, the contrast cryptographic Hash is fed back into the client, when the received contrast Hash of the client Value, when identical with the cryptographic Hash that the client preserves, the qualified information of client feedback verification to the server, Cryptographic Hash verification is qualified.
- 5. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that the compressed package is uploaded to institute State server, further for;When the compressed package is not more than 50 Mbytes, the compressed package is uploaded to the server by the client;When the compressed package is more than 50 Mbytes:The compressed package is changed into character string by the client, by the character String splits at least two substring, and is arranged according to the order in the character string, wherein:Any sub- word The size of string is accorded with, no more than 50 Mbytes,The substring is uploaded one by one to the server.
- 6. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that the client enables camera Obtain active user facial image simultaneously verified, further for:The facial image is uploaded to the server by the client, and the server obtains active user and is stored in advance in User images in the server, obtain the primitive character point in the user images, and the server obtains the face Contrast characteristic's point in image, when the primitive character point matches with contrast characteristic's point, facial image verification is qualified.
- 7. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that in client terminal start-up screen recording Before, further include:Start network environment detection, kill virus, suspend abnormal process.
- 8. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that the client preserves the Kazakhstan When wishing value and the compressed package being uploaded to the server, it is encrypted using AES, SHE 1 or md5 encryption algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711103881.XA CN107911359B (en) | 2017-11-10 | 2017-11-10 | Method for acquiring electronic data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711103881.XA CN107911359B (en) | 2017-11-10 | 2017-11-10 | Method for acquiring electronic data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107911359A true CN107911359A (en) | 2018-04-13 |
CN107911359B CN107911359B (en) | 2020-08-04 |
Family
ID=61844644
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711103881.XA Expired - Fee Related CN107911359B (en) | 2017-11-10 | 2017-11-10 | Method for acquiring electronic data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107911359B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109509267A (en) * | 2018-10-12 | 2019-03-22 | 珠海横琴现联盛科技发展有限公司 | Anti-tamper Encryption Algorithm method of mobile payment based on Car license recognition |
CN109657499A (en) * | 2018-10-31 | 2019-04-19 | 深圳市网心科技有限公司 | Metadata validation method, system server and computer readable storage medium |
CN109922049A (en) * | 2019-02-02 | 2019-06-21 | 立旃(上海)科技有限公司 | Verifying device and method based on block chain |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101807207A (en) * | 2010-03-22 | 2010-08-18 | 北京大用科技有限责任公司 | Method for sharing document based on content difference comparison |
CN102595139A (en) * | 2012-03-01 | 2012-07-18 | 大连理工大学 | Mobile-phone PDA direct broadcasting system based on android |
CN102724044A (en) * | 2012-07-04 | 2012-10-10 | 东方金盾科技有限公司 | Electronic evidence verification and preservation method |
CN104112093A (en) * | 2014-06-25 | 2014-10-22 | 北京天威诚信电子商务服务有限公司 | Evidence obtaining method and system based on electronic signature data |
CN105260677A (en) * | 2015-10-28 | 2016-01-20 | 南京邮电大学 | Multiple-attribute-based electronic data fixing system and method |
CN105450289A (en) * | 2015-11-16 | 2016-03-30 | 云南财经大学 | Multichannel Beidou satellite communication method |
CN105610848A (en) * | 2016-01-08 | 2016-05-25 | 北京工业大学 | Centralized data preservation method and system with source data security guaranty mechanism |
CN106559433A (en) * | 2016-12-07 | 2017-04-05 | 北京信任度科技有限公司 | The method and system of electronic evidence and user identity are fixed using digital certificate |
-
2017
- 2017-11-10 CN CN201711103881.XA patent/CN107911359B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101807207A (en) * | 2010-03-22 | 2010-08-18 | 北京大用科技有限责任公司 | Method for sharing document based on content difference comparison |
CN102595139A (en) * | 2012-03-01 | 2012-07-18 | 大连理工大学 | Mobile-phone PDA direct broadcasting system based on android |
CN102724044A (en) * | 2012-07-04 | 2012-10-10 | 东方金盾科技有限公司 | Electronic evidence verification and preservation method |
CN104112093A (en) * | 2014-06-25 | 2014-10-22 | 北京天威诚信电子商务服务有限公司 | Evidence obtaining method and system based on electronic signature data |
CN105260677A (en) * | 2015-10-28 | 2016-01-20 | 南京邮电大学 | Multiple-attribute-based electronic data fixing system and method |
CN105450289A (en) * | 2015-11-16 | 2016-03-30 | 云南财经大学 | Multichannel Beidou satellite communication method |
CN105610848A (en) * | 2016-01-08 | 2016-05-25 | 北京工业大学 | Centralized data preservation method and system with source data security guaranty mechanism |
CN106559433A (en) * | 2016-12-07 | 2017-04-05 | 北京信任度科技有限公司 | The method and system of electronic evidence and user identity are fixed using digital certificate |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109509267A (en) * | 2018-10-12 | 2019-03-22 | 珠海横琴现联盛科技发展有限公司 | Anti-tamper Encryption Algorithm method of mobile payment based on Car license recognition |
CN109657499A (en) * | 2018-10-31 | 2019-04-19 | 深圳市网心科技有限公司 | Metadata validation method, system server and computer readable storage medium |
CN109922049A (en) * | 2019-02-02 | 2019-06-21 | 立旃(上海)科技有限公司 | Verifying device and method based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN107911359B (en) | 2020-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240039737A1 (en) | Systems and methods for trusted path secure communication | |
EP2191610B1 (en) | Software based multi-channel polymorphic data obfuscation | |
Garman et al. | Dancing on the lip of the volcano: Chosen ciphertext attacks on apple {iMessage} | |
US8744076B2 (en) | Method and apparatus for encrypting data to facilitate resource savings and tamper detection | |
CN107911359A (en) | A kind of method for obtaining electronic data | |
WO2014083382A1 (en) | A system and method for authenticating the legitimacy of a request for a resource by a user | |
WO2014164375A1 (en) | System and method of secure remote authentication of acquired data | |
Ning et al. | Secret message sharing using online social media | |
EP3153985A1 (en) | Device and method for password generation in a user device | |
Vanhoef et al. | HEIST: HTTP Encrypted Information can be Stolen through TCP-windows | |
CN101558599A (en) | Client device, mail system, program, and recording medium | |
CN114244508B (en) | Data encryption method, device, equipment and storage medium | |
CN107888591A (en) | The method and system that a kind of electronic data is saved from damage | |
CN114616795A (en) | Security mechanism for preventing retry or replay attacks | |
Anderson et al. | Limitless http in an https world: Inferring the semantics of the https protocol without decryption | |
CN111740995A (en) | Authorization authentication method and related device | |
GB2488753A (en) | Encrypted communication | |
CN108418679A (en) | The method, apparatus and electronic equipment of key are handled under a kind of multiple data centers | |
CN105827673B (en) | A kind of method, apparatus and network server of door chain | |
CN106302539A (en) | A kind of embedded type WEB safety certifying method | |
WO2010116109A1 (en) | Method of authentication at a server by a user of a mobile apparatus | |
CN117439799A (en) | Anti-tampering method for http request data | |
CN109886011B (en) | Safety protection method and device | |
CN108052836B (en) | Anti-tampering method and device for patch package and server | |
Chen et al. | Path leaks of HTTPS Side-Channel by cookie injection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200804 Termination date: 20201110 |
|
CF01 | Termination of patent right due to non-payment of annual fee |