CN108418813B - 一种基于可信时间戳的电子证据监管链的实现方法 - Google Patents
一种基于可信时间戳的电子证据监管链的实现方法 Download PDFInfo
- Publication number
- CN108418813B CN108418813B CN201810144315.1A CN201810144315A CN108418813B CN 108418813 B CN108418813 B CN 108418813B CN 201810144315 A CN201810144315 A CN 201810144315A CN 108418813 B CN108418813 B CN 108418813B
- Authority
- CN
- China
- Prior art keywords
- stage
- information
- hash value
- trusted timestamp
- requesting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 230000005540 biological transmission Effects 0.000 claims description 22
- 230000003993 interaction Effects 0.000 claims description 20
- 230000008569 process Effects 0.000 claims description 17
- 238000004458 analytical method Methods 0.000 claims description 13
- 238000007405 data analysis Methods 0.000 claims description 8
- 238000013480 data collection Methods 0.000 claims description 7
- 230000008859 change Effects 0.000 claims description 3
- 238000010276 construction Methods 0.000 claims description 3
- 230000002452 interceptive effect Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 10
- 238000011160 research Methods 0.000 description 10
- 230000006872 improvement Effects 0.000 description 7
- 238000007726 management method Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 2
- 235000018958 Gardenia augusta Nutrition 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/308—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Technology Law (AREA)
- Computing Systems (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810144315.1A CN108418813B (zh) | 2018-02-12 | 2018-02-12 | 一种基于可信时间戳的电子证据监管链的实现方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810144315.1A CN108418813B (zh) | 2018-02-12 | 2018-02-12 | 一种基于可信时间戳的电子证据监管链的实现方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108418813A CN108418813A (zh) | 2018-08-17 |
CN108418813B true CN108418813B (zh) | 2020-11-06 |
Family
ID=63128352
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810144315.1A Active CN108418813B (zh) | 2018-02-12 | 2018-02-12 | 一种基于可信时间戳的电子证据监管链的实现方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108418813B (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112488656A (zh) * | 2020-12-04 | 2021-03-12 | 紫绶(上海)信息科技有限公司 | 基于区块链实现对等多方数字化业务全域管理的方法、装置、处理器及其存储介质 |
CN116668451B (zh) * | 2023-04-10 | 2024-01-23 | 中泰证券股份有限公司 | 一种证券业务的数据存证方法、设备及介质 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101017563A (zh) * | 2006-11-21 | 2007-08-15 | 北京大学 | 一种计算机犯罪证据固定和保全方法及实现该方法的装置 |
CN102223374A (zh) * | 2011-06-22 | 2011-10-19 | 熊志海 | 一种基于电子证据在线保全的第三方认证保全系统及方法 |
CN102339370A (zh) * | 2011-09-14 | 2012-02-01 | 福建伊时代信息科技股份有限公司 | 电子文档的保全方法、保全系统和验证系统 |
CN103888241A (zh) * | 2014-03-28 | 2014-06-25 | 北京工业大学 | 一种面向数字取证的数字证据监管链的实现方法 |
CN104102881A (zh) * | 2014-07-07 | 2014-10-15 | 杭州电子科技大学 | 一种基于内核对象链接关系的内存取证方法 |
CN105790954A (zh) * | 2016-03-02 | 2016-07-20 | 布比(北京)网络技术有限公司 | 一种构建电子证据的方法和系统 |
CN105975868A (zh) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | 一种基于区块链的证据保全方法及装置 |
CN106408173A (zh) * | 2016-08-30 | 2017-02-15 | 邱霓 | 一种质量抽查执行过程监管系统 |
CN106850793A (zh) * | 2017-01-23 | 2017-06-13 | 重庆邮电大学 | 一种面向Android手机的远程可信取证的方法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10277608B2 (en) * | 2015-08-20 | 2019-04-30 | Guardtime Ip Holdings Limited | System and method for verification lineage tracking of data sets |
-
2018
- 2018-02-12 CN CN201810144315.1A patent/CN108418813B/zh active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101017563A (zh) * | 2006-11-21 | 2007-08-15 | 北京大学 | 一种计算机犯罪证据固定和保全方法及实现该方法的装置 |
CN102223374A (zh) * | 2011-06-22 | 2011-10-19 | 熊志海 | 一种基于电子证据在线保全的第三方认证保全系统及方法 |
CN102339370A (zh) * | 2011-09-14 | 2012-02-01 | 福建伊时代信息科技股份有限公司 | 电子文档的保全方法、保全系统和验证系统 |
CN103888241A (zh) * | 2014-03-28 | 2014-06-25 | 北京工业大学 | 一种面向数字取证的数字证据监管链的实现方法 |
CN104102881A (zh) * | 2014-07-07 | 2014-10-15 | 杭州电子科技大学 | 一种基于内核对象链接关系的内存取证方法 |
CN105790954A (zh) * | 2016-03-02 | 2016-07-20 | 布比(北京)网络技术有限公司 | 一种构建电子证据的方法和系统 |
CN105975868A (zh) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | 一种基于区块链的证据保全方法及装置 |
CN106408173A (zh) * | 2016-08-30 | 2017-02-15 | 邱霓 | 一种质量抽查执行过程监管系统 |
CN106850793A (zh) * | 2017-01-23 | 2017-06-13 | 重庆邮电大学 | 一种面向Android手机的远程可信取证的方法 |
Also Published As
Publication number | Publication date |
---|---|
CN108418813A (zh) | 2018-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110278211B (zh) | 一种基于区块链的数据检验方法及装置 | |
Scriber | A framework for determining blockchain applicability | |
CN111898148A (zh) | 一种基于区块链的信息监管方法及装置 | |
US20210279257A1 (en) | Identity Mapping For Cloud Migrations | |
CN108418813B (zh) | 一种基于可信时间戳的电子证据监管链的实现方法 | |
CN110443073A (zh) | 一种基于区块链的防篡改数据存储方法、装置及系统 | |
CN102195781A (zh) | 一种基于电子记录关联签名的电子证据取证系统 | |
CN113824900B (zh) | 一种云端视频剪辑系统 | |
CN111339506A (zh) | 一种可信操作系统销售用客户管理平台 | |
CN113886841A (zh) | 一种面向云数据操作行为的可信溯源方法 | |
CN111046000A (zh) | 一种面向政府数据交换共享的安全监管元数据组织方法 | |
RU2018104435A (ru) | Система и способ вынесения решения о компрометации данных | |
CN114254909A (zh) | 一种基于决策引擎的风险管理方法及平台 | |
US11539730B2 (en) | Method, device, and computer program product for abnormality detection | |
CN101408955A (zh) | 一种基于策略的责任认定方法与系统 | |
CN115964407A (zh) | 双副本电力网络安全审计方法、系统、介质及设备 | |
CN116032779A (zh) | 用户日志行为分析方法及装置 | |
CN115587129A (zh) | 一种电力行业反窃电电子证据存证及防伪方法及系统 | |
CN110516460B (zh) | 一种用于bim数据的加密安全方法及其系统 | |
CN115221125A (zh) | 文件处理方法、装置、电子设备及可读存储介质 | |
CN111935142A (zh) | 一种基于云数据的智能编修家谱方法及系统 | |
Sekarini et al. | Security Characteristic Evaluation of New Students Admission Information System Based on ISO/IEC 25010 Quality Standard | |
CN117149915B (zh) | 用于云端数据库迁移到开源数据库的方法 | |
CN116401128B (zh) | 一种基于大数据的信息运维管理系统 | |
CN116668451B (zh) | 一种证券业务的数据存证方法、设备及介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240327 Address after: 101200 room 205-211526, No. 40, Fuqian West Street, Pinggu town, Pinggu District, Beijing (cluster registration) Patentee after: BEIJING YONGBO TECHNOLOGY CO.,LTD. Country or region after: China Address before: 100124 No. 100 Chaoyang District Ping Tian Park, Beijing Patentee before: Beijing University of Technology Country or region before: China |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240610 Address after: Area 29-1, No. 600 Chuangxin Third Road, Songbei District, Harbin City, Heilongjiang Province, 150000 yuan Patentee after: Heilongjiang Jiahe Rongtong IoT Technology Co.,Ltd. Country or region after: China Address before: 101200 room 205-211526, No. 40, Fuqian West Street, Pinggu town, Pinggu District, Beijing (cluster registration) Patentee before: BEIJING YONGBO TECHNOLOGY CO.,LTD. Country or region before: China |
|
TR01 | Transfer of patent right |