CN107911359B - Method for acquiring electronic data - Google Patents

Method for acquiring electronic data Download PDF

Info

Publication number
CN107911359B
CN107911359B CN201711103881.XA CN201711103881A CN107911359B CN 107911359 B CN107911359 B CN 107911359B CN 201711103881 A CN201711103881 A CN 201711103881A CN 107911359 B CN107911359 B CN 107911359B
Authority
CN
China
Prior art keywords
client
hash value
server
electronic data
snapshot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201711103881.XA
Other languages
Chinese (zh)
Other versions
CN107911359A (en
Inventor
徐茂兰
李伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guoxin Jianing Data Technology Co ltd
Original Assignee
Guoxin Jianing Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guoxin Jianing Data Technology Co ltd filed Critical Guoxin Jianing Data Technology Co ltd
Priority to CN201711103881.XA priority Critical patent/CN107911359B/en
Publication of CN107911359A publication Critical patent/CN107911359A/en
Application granted granted Critical
Publication of CN107911359B publication Critical patent/CN107911359B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method for acquiring electronic data, which comprises the following steps: the client starts screen recording; the client clears the browsing records and cache files; the client analyzes the DNS and is connected with the server; the client starts a camera to acquire a face image of a current user and verifies the face image; the client side stamps a Beidou time service timestamp on the electronic data; the client generates a snapshot of the electronic data and calculates a hash value of the electronic data by adopting a hash algorithm; the client compresses the electronic data, the hash value and the face image to generate a compressed packet; the client stores the hash value and uploads the compressed packet to the server; decompressing the compressed packet by the server to generate a decompressed packet; the server verifies the snapshot and the hash value, and when the snapshot and the hash value are verified to be qualified, the electronic data and the hash value are stored and feedback is sent to the server; and the client closes the screen to record and stores the recorded video. By the invention, the safety of data transmission can be improved.

Description

Method for acquiring electronic data
Technical Field
The present invention relates to the field of electronic data, and more particularly, to a method of acquiring electronic data.
Background
With the development of scientific technology, electronic equipment has become an indispensable part of work and life, and people use electronic equipment to generate a large amount of electronic data, which includes cache information generated when using electronic equipment, and documents and photos established in daily work of people, and in actual work and life, the exchange of electronic data is inevitably required, and sometimes, in order to prevent data loss caused by local electronic equipment failure, local electronic data needs to be uploaded to a network server for cloud storage and backup, and data transmission and exchange are required in the processes.
However, electronic data is easy to be tampered, if electronic data is maliciously modified in the process of transmitting electronic data, electronic data of a transmitting party and electronic data of a receiving party are inconsistent, and transmission per se loses meaning, so various encryption technologies are required to be adopted to encrypt the transmission process, and electronic data is prevented from being maliciously tampered in the transmission process.
Therefore, it is an urgent problem in the art to provide a method for acquiring electronic data to improve the security of data transmission.
Disclosure of Invention
In view of this, the present invention provides a method for acquiring electronic data, which improves the security of data transmission.
In order to solve the above technical problem, the present invention provides a method for acquiring electronic data, including:
the client starts screen recording;
the client clears browsing records and cache files;
the client analyzes the DNS and is connected with the server;
the client side starts a camera to acquire a face image of a current user and verifies the face image;
the client side stamps a Beidou time service timestamp on the electronic data;
the client generates a snapshot of the electronic data and calculates a hash value of the electronic data by adopting a hash algorithm;
the client compresses the electronic data, the hash value and the face image to generate a compressed packet;
the client saves the hash value and uploads the compressed packet to the server;
the server decompresses the compressed packet to generate a decompressed packet;
the server verifies the snapshot and the hash value, saves the electronic data and the hash value when the snapshot and the hash value are qualified, and sends feedback to the server;
and the client closes the screen to record and stores the recorded video.
Optionally, the server verifies the snapshot and the hash value, and further includes: the server acquires the snapshot in the decompressed packet, when the content of the snapshot is matched with the electronic data, the snapshot is verified to be qualified, the server calculates a comparison hash value of the electronic data by adopting a hash algorithm, and when the comparison hash value is the same as the hash value, the hash value is verified to be qualified.
Optionally, when the client stores the hash value and uploads the compressed packet to the server, the client suspends the write operation of the disk partition where the compressed packet is located.
Optionally, the server verifies one of the snapshot and the hash value, and the server verifies the hash value, further including:
the server calculates a comparison hash value of the electronic data by adopting a hash algorithm, when the comparison hash value is the same as the hash value, the comparison hash value is fed back to the client, when the comparison hash value received by the client is the same as the hash value stored by the client, the client feeds back verification qualified information to the server, and the hash value is verified to be qualified.
Optionally, the compressed packet is uploaded to the server, further;
when the compressed packet is not more than 50 megabytes, the client uploads the compressed packet to the server;
when the compressed packet is greater than 50 megabytes: the client converts the compressed packet into a character string, splits the character string into at least 2 sub-character strings, and arranges the sub-character strings according to the sequence in the character string, wherein: the size of any of the substrings, no more than 50 megabytes,
and uploading the substrings to the server one by one.
Optionally, the client starts a camera to acquire a face image of the current user and performs verification, and further includes:
the client uploads the face image to the server, the server acquires a user image pre-stored in the server by a current user, acquires original feature points in the user image, the server acquires contrast feature points in the face image, and when the original feature points are matched with the contrast feature points, the face image is qualified in verification.
Optionally, before the client starts the screen recording, the method further includes: starting network environment detection, killing virus, suspending abnormal process
Optionally, when the client stores the hash value and uploads the compressed packet to the server, encryption is performed by using an AES, SHE 1, or MD5 encryption algorithm.
Compared with the prior art, the method for acquiring electronic data of the invention has the following beneficial effects:
the method comprises the steps of carrying out hash calculation on electronic data, obtaining a unique hash value, giving a timestamp, solidifying the electronic data, carrying out environment scanning and virus killing before transmission, generating a snapshot on the electronic data, and comparing the hash value with snapshot data to ensure that data received by a server is the same as data of a client.
Other features of the present invention and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flowchart of a method of acquiring electronic data in embodiment 1;
Detailed Description
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
Example 1
Fig. 1 is a flowchart of a method of acquiring electronic data according to embodiment 1, and as shown in fig. 1, a method of acquiring electronic data includes:
s101: and the client starts screen recording, and clears browsing records and cache files.
Specifically, when a user needs to transmit electronic data, the client needs to be started first, the client starts a screen recording function after being started, and can also call a third-party screen recording function to record all operation flows in a screen recording mode as evidence of the electronic data being transmitted, and then the client can remove browsing records and cache files, prevent Trojan horses in the files from influencing the transmission of the electronic data, and provide a clean and safe environment for the transmission of the electronic data.
S102: the client resolves the DNS and connects with the server.
S103: client-side starts camera to obtain face image of current user and carries out verification
Specifically, after analyzing the DNS, the client tries to connect with a server designated by a user to verify the verification account and the password of the current user, after the connection is successful, the client starts a camera and collects the face image of the current user, the user prestores the user image bound with the account in advance on the server, and the purpose of collecting the face image is to ensure the validity of the currently logged-in user through a face recognition method.
Further, in some optional embodiments, the client enables a camera to acquire a face image of the current user and performs verification, and further includes: the client uploads the face image to the server, the server acquires a user image pre-stored in the server by a current user, acquires original feature points in the user image, and the server acquires comparison feature points in the face image.
S104: and the client side stamps a Beidou time service timestamp on the electronic data.
Specifically, after the client is successfully connected with the server, the client checks the local time and the time of the server, the time of the client must be kept consistent with the time of the server, when the time of the client is inconsistent with the time of the server, the server returns warning information to the client to require the client to modify the local time, if the client does not modify the local time but continues to operate, all the time is uniformly based on the time of the server, the time of the server is consistent with the Beidou time service through a network, a timestamp of the Beidou time service is printed on electronic data to prove the real time of the electronic data transmission, and the real time serves as one of certificates of the electronic data transmission.
S105: the client takes a snapshot of the electronic data to be uploaded and calculates a hash value of the electronic data using a hash algorithm.
Specifically, the client acquires basic information of electronic data to be uploaded, and prepares a snapshot according to the basic information, wherein the snapshot includes: the invention further improves the security of the electronic data by generating a snapshot, the electronic data to be transmitted can be one or more of pictures, characters, videos, audios and other electronic documents, a client acquires a unique hash value of the electronic data by adopting a hash algorithm, and the generated snapshot can be a picture or a table or a document as a basis for comparing transmission results later.
S106: the client compresses the electronic data, the snapshot and the hash value to generate a compressed packet, and the client stores the hash value and uploads the compressed packet to the server.
Specifically, the client compresses the electronic data and the hash value together to reduce the data volume to be uploaded, meanwhile, the client stores the hash value locally, before the client uploads the related data to the server, the client sends a preset key to the server, the server returns verification information to the client after receiving the key, and after receiving the verification information, the client ensures correct connection and then transmits the data.
Further, in some optional embodiments, when the client stores the hash value and uploads the compressed packet to the server, the client suspends the write operation of the disk partition where the compressed packet is located, that is, when the user uploads the compressed packet, the write operation of the disk where the compressed packet is located is limited, and a malicious plug-in is prevented from modifying data when the user uploads the data.
Further, in some optional embodiments, the compressed packet is uploaded to the server, and further: when the compression packet is not more than 50 megabytes, the client uploads the compression packet to the server;
when the compressed packet is greater than 50 megabytes: the client converts the compressed packet into a character string, splits the character string into at least 2 sub-character strings, and arranges the sub-character strings in the character string according to the sequence of the sub-character strings, wherein: the size of any substring, no greater than 50 megabytes, uploads the substrings one by one to the server.
Specifically, when the electronic data is uploaded, the larger the data volume is, the more error codes are easily caused, so that the error codes can be reduced by limiting the size of a single file, in the invention, the data volume uploaded once is limited to be not more than 50 megabytes, when the size of a compressed packet to be uploaded is less than 50 megabytes, the compressed packet is directly uploaded, when the size of the compressed packet is larger, the compressed packet is split and converted into character strings when the compressed packet is larger, the character strings with the size of 50 megabytes are extracted firstly according to the sequence of the character strings, then the character strings with the size of 50 megabytes are extracted continuously until the compressed packet is completely extracted, and then the obtained substrings are uploaded sequentially.
S107: and the server decompresses the compressed packet to generate a decompressed packet, verifies the snapshot and the hash value, stores the electronic data and the hash value when the snapshot and the hash value are qualified, and sends feedback to the client.
Specifically, after the transmission of the client is finished, the client sends confirmation information to the server, after receiving the confirmation information, the server sends feedback information to the client once, the reception is finished, the client confirms that the uploading is finished after receiving the feedback information, if the client does not receive the feedback information after sending the confirmation information for a certain time, the client tries to connect with the server again and uploads the feedback information again, in some optional embodiments, the server is required to send the feedback information once every time the client uploads a certain amount of data, the feedback information is preset information, and the safety of the connection between the client and the server is ensured by checking the preset information. After the server receives the compressed packet, decompressing and generating a decompressed packet, comprising: and then verifying the hash value, the electronic data and the snapshot, and when a certain verification fails, feeding back information indicating transmission errors to the client to request to upload again. And when all the verification passes, storing the electronic data and the hash value, and then feeding back information to the client to indicate that the transmission is successfully completed.
Further, in some optional embodiments, the server verifies the snapshot and the hash value, and further: the server acquires the snapshot in the decompressed packet, so that the information such as the data type, the number, the size and the like contained in the transmitted electronic data is determined, when the content of the snapshot is matched with the electronic data, the snapshot is verified to be qualified, the server calculates the comparison hash value of the electronic data by adopting a hash algorithm, and when the comparison hash value is the same as the hash value, the hash value is verified to be qualified. Different electronic data are subjected to different hash values obtained by adopting a hash algorithm, and the hash values serve as unique identifiers of the electronic data like data fingerprints, so that the integrity and the uniqueness of the electronic data are ensured, in some optional embodiments, the server verifies the hash values, and further: the server calculates a comparison hash value of the electronic data by adopting a hash algorithm, when the comparison hash value is the same as the hash value, the comparison hash value is fed back to the client, when the comparison hash value received by the client is the same as the hash value stored locally by the client, the client feeds back verification qualified information to the server, and the hash value is verified to be qualified. That is, it is possible that the electronic data and the hash value are maliciously tampered in the data transmission process, at this time, the comparison hash value is fed back to the client, and then the client performs judgment, so that the security of the electronic data is further improved, and the electronic data is prevented from being maliciously tampered.
S108: and the client closes the screen to record and stores the recorded video.
Specifically, the client stores the recorded video as a certificate for successful data uploading.
Further, in some optional embodiments, before the client starts the screen recording, the method further includes: and starting network environment detection, sterilizing and suspending the abnormal process.
Specifically, the network environment is detected, viruses and trojans are killed, and abnormal processes are suspended, so that a safe environment is provided for data transmission, and malicious tampering and interception are prevented.
The method for acquiring electronic data of the invention realizes the following beneficial effects:
the method comprises the steps of carrying out hash calculation on electronic data, obtaining a unique hash value, giving a timestamp, solidifying the electronic data, carrying out environment scanning and virus killing before transmission, generating a snapshot on the electronic data, and comparing the hash value with snapshot data to ensure that data received by a server is the same as data of a client
Although some specific embodiments of the present invention have been described in detail by way of examples, it should be understood by those skilled in the art that the above examples are for illustrative purposes only and are not intended to limit the scope of the present invention. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the invention. The scope of the invention is defined by the appended claims.

Claims (6)

1. A method of obtaining electronic data, comprising:
the client starts screen recording;
the client clears browsing records and cache files;
the client analyzes the DNS and is connected with the server;
the client side starts a camera to acquire a face image of a current user and verifies the face image;
the client side stamps a Beidou time service timestamp on the electronic data;
the client generates a snapshot of the electronic data and calculates a hash value of the electronic data by adopting a hash algorithm;
the client compresses the electronic data, the snapshot and the hash value to generate a compressed packet;
the client saves the hash value and uploads the compressed packet to the server, and the client suspends the write operation of the disk partition where the compressed packet is located; or, a designated area in the disk is defined as a storage area, the compressed packet is stored in the storage area, and when the client stores the hash value and uploads the compressed packet to the server, the client suspends the write operation in the storage area where the compressed packet is located;
the server decompresses the compressed packet to generate a decompressed packet;
the server verifies the snapshot and the hash value, saves the electronic data and the hash value when the snapshot and the hash value are qualified, and sends feedback to the client;
and the client closes the screen to record and stores the recorded video.
2. A method of obtaining electronic data according to claim 1, wherein said server verifies said snapshot and said hash value, further comprising: the server acquires the snapshot in the decompressed packet, when the content of the snapshot is matched with the electronic data, the snapshot is verified to be qualified, the server calculates a comparison hash value of the electronic data by adopting a hash algorithm, and when the comparison hash value is the same as the hash value, the hash value is verified to be qualified.
3. A method of obtaining electronic data according to claim 1, wherein the server verifies one of the snapshot and the hash value, the server verifying the hash value further comprising:
the server calculates a comparison hash value of the electronic data by adopting a hash algorithm, when the comparison hash value is the same as the hash value, the comparison hash value is fed back to the client, when the comparison hash value received by the client is the same as the hash value stored by the client, the client feeds back verification qualified information to the server, and the hash value is verified to be qualified.
4. A method of obtaining electronic data according to claim 1, wherein said compressed package is uploaded to said server, further;
when the compressed packet is not more than 50 megabytes, the client uploads the compressed packet to the server;
when the compressed packet is greater than 50 megabytes: the client converts the compressed packet into a character string, splits the character string into at least 2 sub-character strings, and arranges the sub-character strings according to the sequence in the character string, wherein: the size of any of the substrings, no more than 50 megabytes,
and uploading the substrings to the server one by one.
5. The method for acquiring electronic data according to claim 1, wherein the client side enables a camera to acquire a face image of a current user and performs verification, and further comprising:
the client uploads the face image to the server, the server acquires a user image pre-stored in the server by a current user, acquires original feature points in the user image, the server acquires contrast feature points in the face image, and when the original feature points are matched with the contrast feature points, the face image is qualified in verification.
6. The method of claim 1, further comprising, before the client initiates the screen recording: and starting network environment detection, sterilizing and suspending the abnormal process.
CN201711103881.XA 2017-11-10 2017-11-10 Method for acquiring electronic data Expired - Fee Related CN107911359B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711103881.XA CN107911359B (en) 2017-11-10 2017-11-10 Method for acquiring electronic data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711103881.XA CN107911359B (en) 2017-11-10 2017-11-10 Method for acquiring electronic data

Publications (2)

Publication Number Publication Date
CN107911359A CN107911359A (en) 2018-04-13
CN107911359B true CN107911359B (en) 2020-08-04

Family

ID=61844644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711103881.XA Expired - Fee Related CN107911359B (en) 2017-11-10 2017-11-10 Method for acquiring electronic data

Country Status (1)

Country Link
CN (1) CN107911359B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109509267B (en) * 2018-10-12 2021-03-05 珠海横琴现联盛科技发展有限公司 License plate recognition-based tamper-proof encryption algorithm mobile payment method
CN109657499A (en) * 2018-10-31 2019-04-19 深圳市网心科技有限公司 Metadata validation method, system server and computer readable storage medium
CN109922049B (en) * 2019-02-02 2021-09-28 立旃(上海)科技有限公司 Verification device and method based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102724044A (en) * 2012-07-04 2012-10-10 东方金盾科技有限公司 Electronic evidence verification and preservation method
CN104112093A (en) * 2014-06-25 2014-10-22 北京天威诚信电子商务服务有限公司 Evidence obtaining method and system based on electronic signature data
CN105260677A (en) * 2015-10-28 2016-01-20 南京邮电大学 Multiple-attribute-based electronic data fixing system and method
CN105610848A (en) * 2016-01-08 2016-05-25 北京工业大学 Centralized data preservation method and system with source data security guaranty mechanism
CN106559433A (en) * 2016-12-07 2017-04-05 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using digital certificate

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101807207B (en) * 2010-03-22 2011-10-26 北京大用科技有限责任公司 Method for sharing document based on content difference comparison
CN102595139A (en) * 2012-03-01 2012-07-18 大连理工大学 Mobile-phone PDA direct broadcasting system based on android
CN105450289A (en) * 2015-11-16 2016-03-30 云南财经大学 Multichannel Beidou satellite communication method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102724044A (en) * 2012-07-04 2012-10-10 东方金盾科技有限公司 Electronic evidence verification and preservation method
CN104112093A (en) * 2014-06-25 2014-10-22 北京天威诚信电子商务服务有限公司 Evidence obtaining method and system based on electronic signature data
CN105260677A (en) * 2015-10-28 2016-01-20 南京邮电大学 Multiple-attribute-based electronic data fixing system and method
CN105610848A (en) * 2016-01-08 2016-05-25 北京工业大学 Centralized data preservation method and system with source data security guaranty mechanism
CN106559433A (en) * 2016-12-07 2017-04-05 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using digital certificate

Also Published As

Publication number Publication date
CN107911359A (en) 2018-04-13

Similar Documents

Publication Publication Date Title
CN106878265B (en) Data processing method and device
US20180249190A1 (en) Method and apparatus for cloud storage and cloud download of multimedia data
CN107423639B (en) Webpage tampering monitoring method and device
CN110798315B (en) Data processing method and device based on block chain and terminal
CN104980278B (en) The method and apparatus for verifying the availability of biometric image
US20110029555A1 (en) Method, system and apparatus for content identification
KR20190031989A (en) System and method for processing electronic contracts based on blockchain
CN107124281B (en) Data security method and related system
CN109714370B (en) HTTP (hyper text transport protocol) -based cloud security communication implementation method
CN107911359B (en) Method for acquiring electronic data
EP3659311B1 (en) Data stream integrity
CN107508822B (en) Access control method and device
CN107888591B (en) Method and system for electronic data preservation
WO2014111022A1 (en) Mobile terminal user information display method, mobile terminal, and service system
WO2018127809A2 (en) Verification of data captured by a consumer electronic device
CN109726578A (en) A kind of anti-fake solution of novel dynamic two-dimension code
CN108259460A (en) Apparatus control method and device
CN101005611A (en) Net bar video frequency monitor and real name shooting method, system and device
CN110213232B (en) fingerprint feature and key double verification method and device
CN111756716A (en) Flow detection method and device and computer readable storage medium
CN111885085A (en) Electronic data comprehensive certificate storing method and certificate storing system
EP2761823B1 (en) Methods and apparatuses for electronic message authentication
US9825942B2 (en) System and method of authenticating a live video stream
CN110535649B (en) Data circulation method and system, service platform and first terminal device
JP2019519873A5 (en)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200804

Termination date: 20201110

CF01 Termination of patent right due to non-payment of annual fee