CN107911359A - A kind of method for obtaining electronic data - Google Patents

A kind of method for obtaining electronic data Download PDF

Info

Publication number
CN107911359A
CN107911359A CN201711103881.XA CN201711103881A CN107911359A CN 107911359 A CN107911359 A CN 107911359A CN 201711103881 A CN201711103881 A CN 201711103881A CN 107911359 A CN107911359 A CN 107911359A
Authority
CN
China
Prior art keywords
client
server
electronic data
cryptographic hash
compressed package
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711103881.XA
Other languages
Chinese (zh)
Other versions
CN107911359B (en
Inventor
徐茂兰
李伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guoxin Kaning Data Technology Co Ltd
Original Assignee
Guoxin Kaning Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guoxin Kaning Data Technology Co Ltd filed Critical Guoxin Kaning Data Technology Co Ltd
Priority to CN201711103881.XA priority Critical patent/CN107911359B/en
Publication of CN107911359A publication Critical patent/CN107911359A/en
Application granted granted Critical
Publication of CN107911359B publication Critical patent/CN107911359B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method for obtaining electronic data, including:Client terminal start-up screen recording;Client is removed and browses record and cache file;Client parses DNS and is connected with server;Client enables camera and obtains the facial image of active user and verified;Client stamps the timestamp of Big Dipper time service on electronic data;Client generates the snapshot of electronic data, and the cryptographic Hash of electronic data is calculated using hash algorithm;Client is compressed generation compressed package to electronic data, cryptographic Hash and facial image;Client preserves cryptographic Hash and compressed package uploads onto the server;Server decompression compressed package generation solution briquetting;Server authentication snapshot and cryptographic Hash, when verifying qualified, preserve electronic data and cryptographic Hash, and send and feed back to server;Client closes screen recording and preserves the video of recording.By means of the invention it is possible to improve the security of data transfer.

Description

A kind of method for obtaining electronic data
Technical field
The present invention relates to electronic data field, more particularly, to a kind of method for obtaining electronic data.
Background technology
With the development of science and technology, electronic equipment has become a part indispensable in Working Life, and people make With that will produce substantial amounts of electronic data during electronic equipment, these electronic data had both included the use of caching letter caused by electronic equipment Breath, also including the document established in people's routine work and photo etc., in actual work and life, inevitably needs The exchange of electronic data is carried out, causes loss of data sometimes for the local electronic failure of prevention, it is also necessary to by local electricity Subdata is uploaded to the webserver, carries out cloud storage and backup, is required for carrying out the transmission and friendship of data during these Change.
But electronic data is easy to be tampered, if electronic data is maliciously repaiied during electronic data is transmitted Change, then the electronic data of transmission side and recipient will be inconsistent, then transmission also just loses meaning in itself, and therefore, it is necessary to adopt Transmitting procedure is encrypted with various encryption technologies, prevents that electronic data is maliciously tampered in transmitting procedure, still, electronics Data are in transmitting procedure in addition to it can be maliciously tampered, it is also possible to which because error code, and non-artificial malice is distorted, and causes to transmit Electronic data mistake, in addition, during transmission, the electronic data not yet transmitted is also possible to be maliciously tampered, and causes Recipient can not receive correct electronic data.
Therefore it provides a kind of method for obtaining electronic data, improves the security of data transfer, is that this area is urgently to be resolved hurrily The problem of.
The content of the invention
In view of this, the present invention provides a kind of method for obtaining electronic data, the security of data transfer is improved.
In order to solve the above-mentioned technical problem, the present invention proposes a kind of method for obtaining electronic data, including:
Client terminal start-up screen recording;
The client is removed and browses record and cache file;
The client parses DNS and is connected with server;
The client enables camera and obtains the facial image of active user and verified;
The client stamps the timestamp of Big Dipper time service on the electronic data;
The client generates the snapshot of the electronic data, and the Hash of the electronic data is calculated using hash algorithm Value;
The client is compressed generation compressed package to the electronic data, the cryptographic Hash and the facial image;
The client preserves the cryptographic Hash and the compressed package is uploaded to the server;
The server decompresses the compressed package generation solution briquetting;
Snapshot described in the server authentication and the cryptographic Hash, when verifying qualified, preserve the electronic data and institute Cryptographic Hash is stated, and sends and feeds back to the server;
The client closes screen recording and preserves the video of recording.
Optionally, snapshot described in the server authentication and the cryptographic Hash, further for:Described in the server obtains The snapshot in briquetting is solved, when the content of the snapshot matches with the electronic data, snapshot verification is qualified, the clothes Business device calculates the contrast cryptographic Hash of the electronic data using hash algorithm, when the contrast cryptographic Hash is identical with the cryptographic Hash When, cryptographic Hash verification is qualified.
Optionally, it is described when the client preserves the cryptographic Hash and the compressed package is uploaded to the server Client is by the write operation of the disk partition where suspending the compressed package.
Optionally, in snapshot and the cryptographic Hash described in the server authentication, Hash described in the server authentication Value, further for:
The server calculates the contrast cryptographic Hash of the electronic data using hash algorithm, when the contrast cryptographic Hash with When the cryptographic Hash is identical, the contrast cryptographic Hash is fed back into the client, when the received contrast of the client Cryptographic Hash, when identical with the cryptographic Hash that the client preserves, the qualified information of client feedback verification to the clothes Business device, cryptographic Hash verification are qualified.
Optionally, the compressed package is uploaded to the server, further for;
When the compressed package is not more than 50 Mbytes, the compressed package is uploaded to the server by the client;
When the compressed package is more than 50 Mbytes:The compressed package is changed into character string by the client, by described in Character string splits at least two substring, and is arranged according to the order in the character string, wherein:It is any described The size of substring, no more than 50 Mbytes,
The substring is uploaded one by one to the server.
Optionally, the client enable camera obtain active user facial image and verified, further for:
The facial image is uploaded to the server by the client, and the server obtains active user and deposits in advance User images in the server are stored up, obtain the primitive character point in the user images, described in the server obtains Contrast characteristic's point in facial image, when the primitive character point matches with contrast characteristic's point, facial image verification It is qualified.
Optionally, before client terminal start-up screen recording, further include:Start network environment detection, kill virus, pause is different Chang Jincheng
Optionally, when the client preserves the cryptographic Hash and the compressed package is uploaded to the server, use AES, SHE 1 or md5 encryption algorithm are encrypted.
Compared with prior art, the method for a kind of acquisition electronic data of the invention, realizes following beneficial effect:
A kind of method for obtaining electronic data is provided, by carrying out Hash calculation to electronic data, obtains unique breathe out Uncommon value, and timestamp is assigned, electronic data is have cured, carries out environmental scanning and checking and killing virus before transmission, and to electronic data Snapshot is generated, by contrasting cryptographic Hash and snapshot data, so as to ensure the data phase of server received data and client Together.
By referring to the drawings to the present invention exemplary embodiment detailed description, further feature of the invention and its Advantage will be made apparent from.
Brief description of the drawings
It is combined in the description and the attached drawing of a part for constitution instruction shows the embodiment of the present invention, and even It is used to explain the principle of the present invention together with its explanation.
Fig. 1 is a kind of flow chart for the method for obtaining electronic data in embodiment 1;
Embodiment
Carry out the various exemplary embodiments of detailed description of the present invention now with reference to attached drawing.It should be noted that:Unless in addition have Body illustrates that the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally The scope of invention.
The description only actually at least one exemplary embodiment is illustrative to be never used as to the present invention below And its application or any restrictions that use.
It may be not discussed in detail for technology, method and apparatus known to person of ordinary skill in the relevant, but suitable In the case of, the technology, method and apparatus should be considered as part for specification.
In shown here and discussion all examples, any occurrence should be construed as merely exemplary, without It is as limitation.Therefore, other examples of exemplary embodiment can have different values.
It should be noted that:Similar label and letter represents similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it need not be further discussed in subsequent attached drawing in a attached drawing.
Embodiment 1
Fig. 1 is a kind of flow chart for the method for obtaining electronic data in embodiment 1, as shown in Figure 1, a kind of obtain electron number According to method, including:
S101:Client terminal start-up screen recording, removing browse record and cache file.
Specifically, when user needs to transmit electronic data, it is necessary first to start client, client after start-up can Start screen recording function, third party's screen recording function can also be called, by all operating processes record shield by way of into Row records, the evidence being transmitted as electronic data, and then client can be disposed and browse record and cache file, prevent these There is the transmission that wooden horse influences electronic data in file, the transmission of electron data provides a cleaning and safe environment.
S102:Client parses DNS and is connected with server.
S103:Client enables camera and obtains the facial image of active user and verified
Specifically, after client parsing DNS, trial is connected with the server that user specifies, and verifies testing for active user Account and password are demonstrate,proved, client will singly start camera after successful connection, and gather the facial image of active user, and user is advance Prestored the user images mutually bound with oneself account on the server, and the purpose for gathering facial image is by recognition of face Method ensures the legitimacy of the user currently logged in.
Further, in some optional embodiments, client enables the facial image that camera obtains active user And verified, further for:Client uploads onto the server facial image, and server obtains active user and is stored in advance in User images in server, obtain the primitive character point in user images, and server obtains the contrast characteristic in facial image Point, when primitive character point and contrast characteristic's point are to when matching, facial image verification is qualified, i.e., the account of user and user images must Must all match can carry out the transmission of electronic data.
S104:Client stamps the timestamp of Big Dipper time service on electronic data.
Specifically, after client and server successful connection, client by proofread local time and server when Between, it is necessary to kept for the time of client consistent with the time of server, differed when the time of client and the time of server During cause, server to client return warning message, it is desirable to client change local zone time, if client without modification, And be to continue with operating, institute's having time is subject to time of server end without exception, and the time of server end is awarded by network and the Big Dipper When it is consistent, the timestamp of Big Dipper time service is beaten on electronic data, it was demonstrated that the actual time that the electronic data is transmitted, make One of voucher for electronic data transfer.
S105:Client shoots the snapshot for the electronic data to be uploaded, and the Kazakhstan of electronic data is calculated using hash algorithm Uncommon value.
Specifically, client obtains the essential information for the electronic data to be uploaded, and snapshot is prepared according to the essential information, The content of snapshot includes:The size of the species of electronic data, the number of various species electronic data and various species electronic data Deng in the related art, often only electronic data being encrypted without extracting snapshot, the present invention is by generating the side of snapshot Formula, further increases the security of electronic data, it is necessary to which the electronic data being transmitted can be picture, word, video, sound One or more in frequency and other kinds of electronic document, client obtain electronic data using hash algorithm and uniquely breathe out Uncommon value, as the foundation for being transmitted result comparison afterwards, the snapshot of generation can be picture or form or text Shelves.
S106:Client is compressed electronic data, snapshot and cryptographic Hash generation compressed package, and client preserves cryptographic Hash And compressed package is uploaded onto the server.
Specifically, electronic data and cryptographic Hash are compressed by client together, the data volume to be uploaded, while visitor are reduced Family end is locally preserving cryptographic Hash, and before user end to server uploads related data, client first sends pre- to server The key first set, after received server-side to the key, returns to checking information, client receives checking information to client Afterwards, it is ensured that connection is correct, then is transmitted, and in some optional embodiments, client preserves cryptographic Hash and by compressed package When reaching server, it is encrypted using AES, SHE 1 and md5 encryption algorithm.
Further, in some optional embodiments, client preserves cryptographic Hash and compressed package uploads onto the server When, the write operation of the disk partition where suspending compressed package, i.e. user can be limited compressed package by client when uploading compressed package The write operation of place disk, prevents malicious plugins from changing data when user uploads data, in some optional embodiments, A specified region in disk can be delimited as storage region, the electronic data that will be transmitted is stored in the storage region It is interior, only limit the write operation of the storage region when transmitting electronic data, i.e. the storage region is when data are transmitted Can read to write, so as to prevent data to be tampered, while nor affect on other normal readings without the electronic data of transmission Write operation.
Further, in some optional embodiments, compressed package is uploaded onto the server, further for:Work as compressed package During no more than 50 Mbytes, client uploads onto the server compressed package;
When compressed package is more than 50 Mbytes:Compressed package is changed into character string by client, and character string is split at least 2 A substring, and arranged according to order of the substring in character string, wherein:The size of any substring, no More than 50 Mbytes, substring is uploaded one by one to server.
Specifically, when uploading electronic data, data volume is bigger, more be easy to cause error code, therefore single by limiting The mode of file size, can reduce error code, in of the invention, limit the data volume once uploaded and be not more than 50 Mbytes, when need When the compressed package to be uploaded is less than 50 Mbytes, compressed package is directly uploaded, when compressed package is larger, it is split, split When convert it into character string, according to the order of character string first extract size be 50,000,000 character string, be then further continued for carrying The character string that size is 50,000,000 is taken, is uploaded successively until compressed package is fully extracted, then by the substring obtained.
S107:Server decompression compressed package generation solution briquetting, server authentication snapshot and cryptographic Hash, when verifying qualified, Electronic data and cryptographic Hash are preserved, and sends and feeds back to client.
Specifically, can send confirmation message after client transmissions to server, server will after receiving confirmation message A feedback information is first sent to client, shows to receive, client confirms that upload terminates after receiving the feedback information, After if client sends confirmation message, feedback information is not received by more than certain time, will be again attempted to and server phase Connection, and upload again, in some optional embodiments, client often uploads a certain amount of data, can all require server A feedback information is sent, institute's feedack is default information, ensures client and server by verifying presupposed information Between connection safety.Server is after compressed package is received, decompression generation solution briquetting, including:Cryptographic Hash, electronic data and Snapshot, then verifies cryptographic Hash, electronic data and snapshot, when a certain item is verified obstructed out-of-date, shows to client feedback information Error of transmission, it is desirable to upload again.When being all verified, electronic data and cryptographic Hash are preserved, then to client feedback Information shows that transmission smoothly completes.
Further, in some optional embodiments, server authentication snapshot and cryptographic Hash, further for:Server Obtain the snapshot in solution briquetting, so that it is determined that the electronic data that transmission comes include data class, number, the information such as size, when When the content of snapshot matches with electronic data, snapshot verification is qualified, and server calculates pair of electronic data using hash algorithm Than cryptographic Hash, when contrast cryptographic Hash is identical with cryptographic Hash, cryptographic Hash verification is qualified.Different electronic data uses hash algorithm The cryptographic Hash obtained afterwards is different, and cryptographic Hash is as data fingerprint, as the unique mark of electronic data, so as to ensure electricity The integrality and uniqueness of subdata, in some optional embodiments, server authentication cryptographic Hash, further for:Server The contrast cryptographic Hash of electronic data is calculated using hash algorithm, when contrast cryptographic Hash is identical with cryptographic Hash, cryptographic Hash will be contrasted Feed back to client, when the received contrast cryptographic Hash of client, with client be stored in local cryptographic Hash it is identical when, client Feedback validation qualification information is qualified to server, cryptographic Hash verification.May electronic data and cryptographic Hash i.e. in data transmission procedure All it is maliciously tampered, at this time, contrast cryptographic Hash is fed back into client, then judged by client, so as to further improves The security of electronic data, prevents from being maliciously tampered.
S108:Client closes screen recording and preserves the video of recording.
Specifically, client preserves the video recorded as the upload successful voucher of data.
Further, in some optional embodiments, before client terminal start-up screen recording, further include:Start network Environment measuring, kills virus, and suspends abnormal process.
Specifically, by detecting network environment, killing virus and wooden horse and pause abnormal process, it is provided to data Transmission provide a safety environment, prevent malice distort and intercept.
A kind of method of acquisition electronic data of the present invention, realizes following beneficial effect:
A kind of method for obtaining electronic data is provided, by carrying out Hash calculation to electronic data, obtains unique breathe out Uncommon value, and timestamp is assigned, electronic data is have cured, carries out environmental scanning and checking and killing virus before transmission, and to electronic data Snapshot is generated, by contrasting cryptographic Hash and snapshot data, so as to ensure the data phase of server received data and client Together
Although some specific embodiments of the present invention are described in detail by example, the skill of this area Art personnel it should be understood that example above merely to illustrating, the scope being not intended to be limiting of the invention.The skill of this area Art personnel are it should be understood that without departing from the scope and spirit of the present invention can modify above example.This hair Bright scope is defined by the following claims.

Claims (8)

  1. A kind of 1. method for obtaining electronic data, it is characterised in that including:
    Client terminal start-up screen recording;
    The client is removed and browses record and cache file;
    The client parses DNS and is connected with server;
    The client enables camera and obtains the facial image of active user and verified;
    The client stamps the timestamp of Big Dipper time service on electronic data;
    The client generates the snapshot of the electronic data, and the cryptographic Hash of the electronic data is calculated using hash algorithm;
    The client is compressed generation compressed package to the electronic data, the cryptographic Hash and the facial image;
    The client preserves the cryptographic Hash and the compressed package is uploaded to the server;
    The server decompresses the compressed package generation solution briquetting;
    Snapshot described in the server authentication and the cryptographic Hash, when verifying qualified, preserve the electronic data and the Kazakhstan Uncommon value, and send and feed back to the server;
    The client closes screen recording and preserves the video of recording.
  2. 2. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that fast described in the server authentication According to the cryptographic Hash, further for:The server obtains the snapshot in the solution briquetting, when the content of the snapshot When matching with the electronic data, snapshot verification is qualified, and the server calculates the electronic data using hash algorithm Cryptographic Hash is contrasted, when the contrast cryptographic Hash is identical with the cryptographic Hash, cryptographic Hash verification is qualified.
  3. 3. a kind of method for obtaining electronic data as claimed in claim 2, it is characterised in that the client preserves the Kazakhstan Uncommon value and when the compressed package is uploaded to the server, the client is by the disk partition where suspending the compressed package Write operation.
  4. 4. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that fast described in the server authentication According to in the cryptographic Hash, cryptographic Hash described in the server authentication, further for:
    The server calculates the contrast cryptographic Hash of the electronic data using hash algorithm, when the contrast cryptographic Hash with it is described When cryptographic Hash is identical, the contrast cryptographic Hash is fed back into the client, when the received contrast Hash of the client Value, when identical with the cryptographic Hash that the client preserves, the qualified information of client feedback verification to the server, Cryptographic Hash verification is qualified.
  5. 5. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that the compressed package is uploaded to institute State server, further for;
    When the compressed package is not more than 50 Mbytes, the compressed package is uploaded to the server by the client;
    When the compressed package is more than 50 Mbytes:The compressed package is changed into character string by the client, by the character String splits at least two substring, and is arranged according to the order in the character string, wherein:Any sub- word The size of string is accorded with, no more than 50 Mbytes,
    The substring is uploaded one by one to the server.
  6. 6. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that the client enables camera Obtain active user facial image simultaneously verified, further for:
    The facial image is uploaded to the server by the client, and the server obtains active user and is stored in advance in User images in the server, obtain the primitive character point in the user images, and the server obtains the face Contrast characteristic's point in image, when the primitive character point matches with contrast characteristic's point, facial image verification is qualified.
  7. 7. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that in client terminal start-up screen recording Before, further include:Start network environment detection, kill virus, suspend abnormal process.
  8. 8. a kind of method for obtaining electronic data as claimed in claim 1, it is characterised in that the client preserves the Kazakhstan When wishing value and the compressed package being uploaded to the server, it is encrypted using AES, SHE 1 or md5 encryption algorithm.
CN201711103881.XA 2017-11-10 2017-11-10 Method for acquiring electronic data Expired - Fee Related CN107911359B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711103881.XA CN107911359B (en) 2017-11-10 2017-11-10 Method for acquiring electronic data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711103881.XA CN107911359B (en) 2017-11-10 2017-11-10 Method for acquiring electronic data

Publications (2)

Publication Number Publication Date
CN107911359A true CN107911359A (en) 2018-04-13
CN107911359B CN107911359B (en) 2020-08-04

Family

ID=61844644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711103881.XA Expired - Fee Related CN107911359B (en) 2017-11-10 2017-11-10 Method for acquiring electronic data

Country Status (1)

Country Link
CN (1) CN107911359B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109509267A (en) * 2018-10-12 2019-03-22 珠海横琴现联盛科技发展有限公司 Anti-tamper Encryption Algorithm method of mobile payment based on Car license recognition
CN109657499A (en) * 2018-10-31 2019-04-19 深圳市网心科技有限公司 Metadata validation method, system server and computer readable storage medium
CN109922049A (en) * 2019-02-02 2019-06-21 立旃(上海)科技有限公司 Verifying device and method based on block chain

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101807207A (en) * 2010-03-22 2010-08-18 北京大用科技有限责任公司 Method for sharing document based on content difference comparison
CN102595139A (en) * 2012-03-01 2012-07-18 大连理工大学 Mobile-phone PDA direct broadcasting system based on android
CN102724044A (en) * 2012-07-04 2012-10-10 东方金盾科技有限公司 Electronic evidence verification and preservation method
CN104112093A (en) * 2014-06-25 2014-10-22 北京天威诚信电子商务服务有限公司 Evidence obtaining method and system based on electronic signature data
CN105260677A (en) * 2015-10-28 2016-01-20 南京邮电大学 Multiple-attribute-based electronic data fixing system and method
CN105450289A (en) * 2015-11-16 2016-03-30 云南财经大学 Multichannel Beidou satellite communication method
CN105610848A (en) * 2016-01-08 2016-05-25 北京工业大学 Centralized data preservation method and system with source data security guaranty mechanism
CN106559433A (en) * 2016-12-07 2017-04-05 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using digital certificate

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101807207A (en) * 2010-03-22 2010-08-18 北京大用科技有限责任公司 Method for sharing document based on content difference comparison
CN102595139A (en) * 2012-03-01 2012-07-18 大连理工大学 Mobile-phone PDA direct broadcasting system based on android
CN102724044A (en) * 2012-07-04 2012-10-10 东方金盾科技有限公司 Electronic evidence verification and preservation method
CN104112093A (en) * 2014-06-25 2014-10-22 北京天威诚信电子商务服务有限公司 Evidence obtaining method and system based on electronic signature data
CN105260677A (en) * 2015-10-28 2016-01-20 南京邮电大学 Multiple-attribute-based electronic data fixing system and method
CN105450289A (en) * 2015-11-16 2016-03-30 云南财经大学 Multichannel Beidou satellite communication method
CN105610848A (en) * 2016-01-08 2016-05-25 北京工业大学 Centralized data preservation method and system with source data security guaranty mechanism
CN106559433A (en) * 2016-12-07 2017-04-05 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using digital certificate

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109509267A (en) * 2018-10-12 2019-03-22 珠海横琴现联盛科技发展有限公司 Anti-tamper Encryption Algorithm method of mobile payment based on Car license recognition
CN109657499A (en) * 2018-10-31 2019-04-19 深圳市网心科技有限公司 Metadata validation method, system server and computer readable storage medium
CN109922049A (en) * 2019-02-02 2019-06-21 立旃(上海)科技有限公司 Verifying device and method based on block chain

Also Published As

Publication number Publication date
CN107911359B (en) 2020-08-04

Similar Documents

Publication Publication Date Title
US11818274B1 (en) Systems and methods for trusted path secure communication
EP2191610B1 (en) Software based multi-channel polymorphic data obfuscation
Garman et al. Dancing on the lip of the volcano: Chosen ciphertext attacks on apple {iMessage}
US8744076B2 (en) Method and apparatus for encrypting data to facilitate resource savings and tamper detection
US20140281523A1 (en) System and method of secure remote authentication of acquired data
CN107911359A (en) A kind of method for obtaining electronic data
WO2014083382A1 (en) A system and method for authenticating the legitimacy of a request for a resource by a user
Ning et al. Secret message sharing using online social media
EP3153985A1 (en) Device and method for password generation in a user device
Vanhoef et al. HEIST: HTTP Encrypted Information can be Stolen through TCP-windows
CN101558599A (en) Client device, mail system, program, and recording medium
CN107888591A (en) The method and system that a kind of electronic data is saved from damage
CN114616795A (en) Security mechanism for preventing retry or replay attacks
US9426148B2 (en) Increased communication security
Anderson et al. Limitless http in an https world: Inferring the semantics of the https protocol without decryption
CN111740995A (en) Authorization authentication method and related device
GB2488753A (en) Encrypted communication
CN108418679A (en) The method, apparatus and electronic equipment of key are handled under a kind of multiple data centers
CN105827673B (en) A kind of method, apparatus and network server of door chain
CN106302539A (en) A kind of embedded type WEB safety certifying method
WO2010116109A1 (en) Method of authentication at a server by a user of a mobile apparatus
CN109886011B (en) Safety protection method and device
CN101197822A (en) System for preventing information leakage and method based on the same
CN108052836B (en) Anti-tampering method and device for patch package and server
CN106503529A (en) A kind of cloud storage system based on fingerprint

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200804

Termination date: 20201110

CF01 Termination of patent right due to non-payment of annual fee