CN107911359B - Method for acquiring electronic data - Google Patents
Method for acquiring electronic data Download PDFInfo
- Publication number
- CN107911359B CN107911359B CN201711103881.XA CN201711103881A CN107911359B CN 107911359 B CN107911359 B CN 107911359B CN 201711103881 A CN201711103881 A CN 201711103881A CN 107911359 B CN107911359 B CN 107911359B
- Authority
- CN
- China
- Prior art keywords
- client
- hash value
- server
- electronic data
- snapshot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a method for acquiring electronic data, which comprises the following steps: the client starts screen recording; the client clears the browsing records and cache files; the client analyzes the DNS and is connected with the server; the client starts a camera to acquire a face image of a current user and verifies the face image; the client side stamps a Beidou time service timestamp on the electronic data; the client generates a snapshot of the electronic data and calculates a hash value of the electronic data by adopting a hash algorithm; the client compresses the electronic data, the hash value and the face image to generate a compressed packet; the client stores the hash value and uploads the compressed packet to the server; decompressing the compressed packet by the server to generate a decompressed packet; the server verifies the snapshot and the hash value, and when the snapshot and the hash value are verified to be qualified, the electronic data and the hash value are stored and feedback is sent to the server; and the client closes the screen to record and stores the recorded video. By the invention, the safety of data transmission can be improved.
Description
Technical Field
The present invention relates to the field of electronic data, and more particularly, to a method of acquiring electronic data.
Background
With the development of scientific technology, electronic equipment has become an indispensable part of work and life, and people use electronic equipment to generate a large amount of electronic data, which includes cache information generated when using electronic equipment, and documents and photos established in daily work of people, and in actual work and life, the exchange of electronic data is inevitably required, and sometimes, in order to prevent data loss caused by local electronic equipment failure, local electronic data needs to be uploaded to a network server for cloud storage and backup, and data transmission and exchange are required in the processes.
However, electronic data is easy to be tampered, if electronic data is maliciously modified in the process of transmitting electronic data, electronic data of a transmitting party and electronic data of a receiving party are inconsistent, and transmission per se loses meaning, so various encryption technologies are required to be adopted to encrypt the transmission process, and electronic data is prevented from being maliciously tampered in the transmission process.
Therefore, it is an urgent problem in the art to provide a method for acquiring electronic data to improve the security of data transmission.
Disclosure of Invention
In view of this, the present invention provides a method for acquiring electronic data, which improves the security of data transmission.
In order to solve the above technical problem, the present invention provides a method for acquiring electronic data, including:
the client starts screen recording;
the client clears browsing records and cache files;
the client analyzes the DNS and is connected with the server;
the client side starts a camera to acquire a face image of a current user and verifies the face image;
the client side stamps a Beidou time service timestamp on the electronic data;
the client generates a snapshot of the electronic data and calculates a hash value of the electronic data by adopting a hash algorithm;
the client compresses the electronic data, the hash value and the face image to generate a compressed packet;
the client saves the hash value and uploads the compressed packet to the server;
the server decompresses the compressed packet to generate a decompressed packet;
the server verifies the snapshot and the hash value, saves the electronic data and the hash value when the snapshot and the hash value are qualified, and sends feedback to the server;
and the client closes the screen to record and stores the recorded video.
Optionally, the server verifies the snapshot and the hash value, and further includes: the server acquires the snapshot in the decompressed packet, when the content of the snapshot is matched with the electronic data, the snapshot is verified to be qualified, the server calculates a comparison hash value of the electronic data by adopting a hash algorithm, and when the comparison hash value is the same as the hash value, the hash value is verified to be qualified.
Optionally, when the client stores the hash value and uploads the compressed packet to the server, the client suspends the write operation of the disk partition where the compressed packet is located.
Optionally, the server verifies one of the snapshot and the hash value, and the server verifies the hash value, further including:
the server calculates a comparison hash value of the electronic data by adopting a hash algorithm, when the comparison hash value is the same as the hash value, the comparison hash value is fed back to the client, when the comparison hash value received by the client is the same as the hash value stored by the client, the client feeds back verification qualified information to the server, and the hash value is verified to be qualified.
Optionally, the compressed packet is uploaded to the server, further;
when the compressed packet is not more than 50 megabytes, the client uploads the compressed packet to the server;
when the compressed packet is greater than 50 megabytes: the client converts the compressed packet into a character string, splits the character string into at least 2 sub-character strings, and arranges the sub-character strings according to the sequence in the character string, wherein: the size of any of the substrings, no more than 50 megabytes,
and uploading the substrings to the server one by one.
Optionally, the client starts a camera to acquire a face image of the current user and performs verification, and further includes:
the client uploads the face image to the server, the server acquires a user image pre-stored in the server by a current user, acquires original feature points in the user image, the server acquires contrast feature points in the face image, and when the original feature points are matched with the contrast feature points, the face image is qualified in verification.
Optionally, before the client starts the screen recording, the method further includes: starting network environment detection, killing virus, suspending abnormal process
Optionally, when the client stores the hash value and uploads the compressed packet to the server, encryption is performed by using an AES, SHE 1, or MD5 encryption algorithm.
Compared with the prior art, the method for acquiring electronic data of the invention has the following beneficial effects:
the method comprises the steps of carrying out hash calculation on electronic data, obtaining a unique hash value, giving a timestamp, solidifying the electronic data, carrying out environment scanning and virus killing before transmission, generating a snapshot on the electronic data, and comparing the hash value with snapshot data to ensure that data received by a server is the same as data of a client.
Other features of the present invention and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flowchart of a method of acquiring electronic data in embodiment 1;
Detailed Description
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
Example 1
Fig. 1 is a flowchart of a method of acquiring electronic data according to embodiment 1, and as shown in fig. 1, a method of acquiring electronic data includes:
s101: and the client starts screen recording, and clears browsing records and cache files.
Specifically, when a user needs to transmit electronic data, the client needs to be started first, the client starts a screen recording function after being started, and can also call a third-party screen recording function to record all operation flows in a screen recording mode as evidence of the electronic data being transmitted, and then the client can remove browsing records and cache files, prevent Trojan horses in the files from influencing the transmission of the electronic data, and provide a clean and safe environment for the transmission of the electronic data.
S102: the client resolves the DNS and connects with the server.
S103: client-side starts camera to obtain face image of current user and carries out verification
Specifically, after analyzing the DNS, the client tries to connect with a server designated by a user to verify the verification account and the password of the current user, after the connection is successful, the client starts a camera and collects the face image of the current user, the user prestores the user image bound with the account in advance on the server, and the purpose of collecting the face image is to ensure the validity of the currently logged-in user through a face recognition method.
Further, in some optional embodiments, the client enables a camera to acquire a face image of the current user and performs verification, and further includes: the client uploads the face image to the server, the server acquires a user image pre-stored in the server by a current user, acquires original feature points in the user image, and the server acquires comparison feature points in the face image.
S104: and the client side stamps a Beidou time service timestamp on the electronic data.
Specifically, after the client is successfully connected with the server, the client checks the local time and the time of the server, the time of the client must be kept consistent with the time of the server, when the time of the client is inconsistent with the time of the server, the server returns warning information to the client to require the client to modify the local time, if the client does not modify the local time but continues to operate, all the time is uniformly based on the time of the server, the time of the server is consistent with the Beidou time service through a network, a timestamp of the Beidou time service is printed on electronic data to prove the real time of the electronic data transmission, and the real time serves as one of certificates of the electronic data transmission.
S105: the client takes a snapshot of the electronic data to be uploaded and calculates a hash value of the electronic data using a hash algorithm.
Specifically, the client acquires basic information of electronic data to be uploaded, and prepares a snapshot according to the basic information, wherein the snapshot includes: the invention further improves the security of the electronic data by generating a snapshot, the electronic data to be transmitted can be one or more of pictures, characters, videos, audios and other electronic documents, a client acquires a unique hash value of the electronic data by adopting a hash algorithm, and the generated snapshot can be a picture or a table or a document as a basis for comparing transmission results later.
S106: the client compresses the electronic data, the snapshot and the hash value to generate a compressed packet, and the client stores the hash value and uploads the compressed packet to the server.
Specifically, the client compresses the electronic data and the hash value together to reduce the data volume to be uploaded, meanwhile, the client stores the hash value locally, before the client uploads the related data to the server, the client sends a preset key to the server, the server returns verification information to the client after receiving the key, and after receiving the verification information, the client ensures correct connection and then transmits the data.
Further, in some optional embodiments, when the client stores the hash value and uploads the compressed packet to the server, the client suspends the write operation of the disk partition where the compressed packet is located, that is, when the user uploads the compressed packet, the write operation of the disk where the compressed packet is located is limited, and a malicious plug-in is prevented from modifying data when the user uploads the data.
Further, in some optional embodiments, the compressed packet is uploaded to the server, and further: when the compression packet is not more than 50 megabytes, the client uploads the compression packet to the server;
when the compressed packet is greater than 50 megabytes: the client converts the compressed packet into a character string, splits the character string into at least 2 sub-character strings, and arranges the sub-character strings in the character string according to the sequence of the sub-character strings, wherein: the size of any substring, no greater than 50 megabytes, uploads the substrings one by one to the server.
Specifically, when the electronic data is uploaded, the larger the data volume is, the more error codes are easily caused, so that the error codes can be reduced by limiting the size of a single file, in the invention, the data volume uploaded once is limited to be not more than 50 megabytes, when the size of a compressed packet to be uploaded is less than 50 megabytes, the compressed packet is directly uploaded, when the size of the compressed packet is larger, the compressed packet is split and converted into character strings when the compressed packet is larger, the character strings with the size of 50 megabytes are extracted firstly according to the sequence of the character strings, then the character strings with the size of 50 megabytes are extracted continuously until the compressed packet is completely extracted, and then the obtained substrings are uploaded sequentially.
S107: and the server decompresses the compressed packet to generate a decompressed packet, verifies the snapshot and the hash value, stores the electronic data and the hash value when the snapshot and the hash value are qualified, and sends feedback to the client.
Specifically, after the transmission of the client is finished, the client sends confirmation information to the server, after receiving the confirmation information, the server sends feedback information to the client once, the reception is finished, the client confirms that the uploading is finished after receiving the feedback information, if the client does not receive the feedback information after sending the confirmation information for a certain time, the client tries to connect with the server again and uploads the feedback information again, in some optional embodiments, the server is required to send the feedback information once every time the client uploads a certain amount of data, the feedback information is preset information, and the safety of the connection between the client and the server is ensured by checking the preset information. After the server receives the compressed packet, decompressing and generating a decompressed packet, comprising: and then verifying the hash value, the electronic data and the snapshot, and when a certain verification fails, feeding back information indicating transmission errors to the client to request to upload again. And when all the verification passes, storing the electronic data and the hash value, and then feeding back information to the client to indicate that the transmission is successfully completed.
Further, in some optional embodiments, the server verifies the snapshot and the hash value, and further: the server acquires the snapshot in the decompressed packet, so that the information such as the data type, the number, the size and the like contained in the transmitted electronic data is determined, when the content of the snapshot is matched with the electronic data, the snapshot is verified to be qualified, the server calculates the comparison hash value of the electronic data by adopting a hash algorithm, and when the comparison hash value is the same as the hash value, the hash value is verified to be qualified. Different electronic data are subjected to different hash values obtained by adopting a hash algorithm, and the hash values serve as unique identifiers of the electronic data like data fingerprints, so that the integrity and the uniqueness of the electronic data are ensured, in some optional embodiments, the server verifies the hash values, and further: the server calculates a comparison hash value of the electronic data by adopting a hash algorithm, when the comparison hash value is the same as the hash value, the comparison hash value is fed back to the client, when the comparison hash value received by the client is the same as the hash value stored locally by the client, the client feeds back verification qualified information to the server, and the hash value is verified to be qualified. That is, it is possible that the electronic data and the hash value are maliciously tampered in the data transmission process, at this time, the comparison hash value is fed back to the client, and then the client performs judgment, so that the security of the electronic data is further improved, and the electronic data is prevented from being maliciously tampered.
S108: and the client closes the screen to record and stores the recorded video.
Specifically, the client stores the recorded video as a certificate for successful data uploading.
Further, in some optional embodiments, before the client starts the screen recording, the method further includes: and starting network environment detection, sterilizing and suspending the abnormal process.
Specifically, the network environment is detected, viruses and trojans are killed, and abnormal processes are suspended, so that a safe environment is provided for data transmission, and malicious tampering and interception are prevented.
The method for acquiring electronic data of the invention realizes the following beneficial effects:
the method comprises the steps of carrying out hash calculation on electronic data, obtaining a unique hash value, giving a timestamp, solidifying the electronic data, carrying out environment scanning and virus killing before transmission, generating a snapshot on the electronic data, and comparing the hash value with snapshot data to ensure that data received by a server is the same as data of a client
Although some specific embodiments of the present invention have been described in detail by way of examples, it should be understood by those skilled in the art that the above examples are for illustrative purposes only and are not intended to limit the scope of the present invention. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the invention. The scope of the invention is defined by the appended claims.
Claims (6)
1. A method of obtaining electronic data, comprising:
the client starts screen recording;
the client clears browsing records and cache files;
the client analyzes the DNS and is connected with the server;
the client side starts a camera to acquire a face image of a current user and verifies the face image;
the client side stamps a Beidou time service timestamp on the electronic data;
the client generates a snapshot of the electronic data and calculates a hash value of the electronic data by adopting a hash algorithm;
the client compresses the electronic data, the snapshot and the hash value to generate a compressed packet;
the client saves the hash value and uploads the compressed packet to the server, and the client suspends the write operation of the disk partition where the compressed packet is located; or, a designated area in the disk is defined as a storage area, the compressed packet is stored in the storage area, and when the client stores the hash value and uploads the compressed packet to the server, the client suspends the write operation in the storage area where the compressed packet is located;
the server decompresses the compressed packet to generate a decompressed packet;
the server verifies the snapshot and the hash value, saves the electronic data and the hash value when the snapshot and the hash value are qualified, and sends feedback to the client;
and the client closes the screen to record and stores the recorded video.
2. A method of obtaining electronic data according to claim 1, wherein said server verifies said snapshot and said hash value, further comprising: the server acquires the snapshot in the decompressed packet, when the content of the snapshot is matched with the electronic data, the snapshot is verified to be qualified, the server calculates a comparison hash value of the electronic data by adopting a hash algorithm, and when the comparison hash value is the same as the hash value, the hash value is verified to be qualified.
3. A method of obtaining electronic data according to claim 1, wherein the server verifies one of the snapshot and the hash value, the server verifying the hash value further comprising:
the server calculates a comparison hash value of the electronic data by adopting a hash algorithm, when the comparison hash value is the same as the hash value, the comparison hash value is fed back to the client, when the comparison hash value received by the client is the same as the hash value stored by the client, the client feeds back verification qualified information to the server, and the hash value is verified to be qualified.
4. A method of obtaining electronic data according to claim 1, wherein said compressed package is uploaded to said server, further;
when the compressed packet is not more than 50 megabytes, the client uploads the compressed packet to the server;
when the compressed packet is greater than 50 megabytes: the client converts the compressed packet into a character string, splits the character string into at least 2 sub-character strings, and arranges the sub-character strings according to the sequence in the character string, wherein: the size of any of the substrings, no more than 50 megabytes,
and uploading the substrings to the server one by one.
5. The method for acquiring electronic data according to claim 1, wherein the client side enables a camera to acquire a face image of a current user and performs verification, and further comprising:
the client uploads the face image to the server, the server acquires a user image pre-stored in the server by a current user, acquires original feature points in the user image, the server acquires contrast feature points in the face image, and when the original feature points are matched with the contrast feature points, the face image is qualified in verification.
6. The method of claim 1, further comprising, before the client initiates the screen recording: and starting network environment detection, sterilizing and suspending the abnormal process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711103881.XA CN107911359B (en) | 2017-11-10 | 2017-11-10 | Method for acquiring electronic data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711103881.XA CN107911359B (en) | 2017-11-10 | 2017-11-10 | Method for acquiring electronic data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107911359A CN107911359A (en) | 2018-04-13 |
CN107911359B true CN107911359B (en) | 2020-08-04 |
Family
ID=61844644
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711103881.XA Expired - Fee Related CN107911359B (en) | 2017-11-10 | 2017-11-10 | Method for acquiring electronic data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107911359B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109509267B (en) * | 2018-10-12 | 2021-03-05 | 珠海横琴现联盛科技发展有限公司 | License plate recognition-based tamper-proof encryption algorithm mobile payment method |
CN109657499A (en) * | 2018-10-31 | 2019-04-19 | 深圳市网心科技有限公司 | Metadata validation method, system server and computer readable storage medium |
CN109922049B (en) * | 2019-02-02 | 2021-09-28 | 立旃(上海)科技有限公司 | Verification device and method based on block chain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102724044A (en) * | 2012-07-04 | 2012-10-10 | 东方金盾科技有限公司 | Electronic evidence verification and preservation method |
CN104112093A (en) * | 2014-06-25 | 2014-10-22 | 北京天威诚信电子商务服务有限公司 | Evidence obtaining method and system based on electronic signature data |
CN105260677A (en) * | 2015-10-28 | 2016-01-20 | 南京邮电大学 | Multiple-attribute-based electronic data fixing system and method |
CN105610848A (en) * | 2016-01-08 | 2016-05-25 | 北京工业大学 | Centralized data preservation method and system with source data security guaranty mechanism |
CN106559433A (en) * | 2016-12-07 | 2017-04-05 | 北京信任度科技有限公司 | The method and system of electronic evidence and user identity are fixed using digital certificate |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101807207B (en) * | 2010-03-22 | 2011-10-26 | 北京大用科技有限责任公司 | Method for sharing document based on content difference comparison |
CN102595139A (en) * | 2012-03-01 | 2012-07-18 | 大连理工大学 | Mobile-phone PDA direct broadcasting system based on android |
CN105450289A (en) * | 2015-11-16 | 2016-03-30 | 云南财经大学 | Multichannel Beidou satellite communication method |
-
2017
- 2017-11-10 CN CN201711103881.XA patent/CN107911359B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102724044A (en) * | 2012-07-04 | 2012-10-10 | 东方金盾科技有限公司 | Electronic evidence verification and preservation method |
CN104112093A (en) * | 2014-06-25 | 2014-10-22 | 北京天威诚信电子商务服务有限公司 | Evidence obtaining method and system based on electronic signature data |
CN105260677A (en) * | 2015-10-28 | 2016-01-20 | 南京邮电大学 | Multiple-attribute-based electronic data fixing system and method |
CN105610848A (en) * | 2016-01-08 | 2016-05-25 | 北京工业大学 | Centralized data preservation method and system with source data security guaranty mechanism |
CN106559433A (en) * | 2016-12-07 | 2017-04-05 | 北京信任度科技有限公司 | The method and system of electronic evidence and user identity are fixed using digital certificate |
Also Published As
Publication number | Publication date |
---|---|
CN107911359A (en) | 2018-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106878265B (en) | Data processing method and device | |
US20180249190A1 (en) | Method and apparatus for cloud storage and cloud download of multimedia data | |
CN107423639B (en) | Webpage tampering monitoring method and device | |
CN110798315B (en) | Data processing method and device based on block chain and terminal | |
CN104980278B (en) | The method and apparatus for verifying the availability of biometric image | |
US20110029555A1 (en) | Method, system and apparatus for content identification | |
KR20190031989A (en) | System and method for processing electronic contracts based on blockchain | |
CN107124281B (en) | Data security method and related system | |
CN109714370B (en) | HTTP (hyper text transport protocol) -based cloud security communication implementation method | |
CN107911359B (en) | Method for acquiring electronic data | |
EP3659311B1 (en) | Data stream integrity | |
CN107508822B (en) | Access control method and device | |
CN107888591B (en) | Method and system for electronic data preservation | |
WO2014111022A1 (en) | Mobile terminal user information display method, mobile terminal, and service system | |
WO2018127809A2 (en) | Verification of data captured by a consumer electronic device | |
CN109726578A (en) | A kind of anti-fake solution of novel dynamic two-dimension code | |
CN108259460A (en) | Apparatus control method and device | |
CN101005611A (en) | Net bar video frequency monitor and real name shooting method, system and device | |
CN110213232B (en) | fingerprint feature and key double verification method and device | |
CN111756716A (en) | Flow detection method and device and computer readable storage medium | |
CN111885085A (en) | Electronic data comprehensive certificate storing method and certificate storing system | |
EP2761823B1 (en) | Methods and apparatuses for electronic message authentication | |
US9825942B2 (en) | System and method of authenticating a live video stream | |
CN110535649B (en) | Data circulation method and system, service platform and first terminal device | |
JP2019519873A5 (en) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200804 Termination date: 20201110 |
|
CF01 | Termination of patent right due to non-payment of annual fee |