CN108921552A - A kind of method and device of experimental evidence - Google Patents

A kind of method and device of experimental evidence Download PDF

Info

Publication number
CN108921552A
CN108921552A CN201810634929.8A CN201810634929A CN108921552A CN 108921552 A CN108921552 A CN 108921552A CN 201810634929 A CN201810634929 A CN 201810634929A CN 108921552 A CN108921552 A CN 108921552A
Authority
CN
China
Prior art keywords
cryptographic hash
contract
original
evidence
tampered
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810634929.8A
Other languages
Chinese (zh)
Other versions
CN108921552B (en
Inventor
张�诚
张行
林峰
丁雪
刘培旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINA FINANCIAL CERTIFICATION AUTHORITY CENTER Co Ltd
Original Assignee
CHINA FINANCIAL CERTIFICATION AUTHORITY CENTER Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINA FINANCIAL CERTIFICATION AUTHORITY CENTER Co Ltd filed Critical CHINA FINANCIAL CERTIFICATION AUTHORITY CENTER Co Ltd
Priority to CN201810634929.8A priority Critical patent/CN108921552B/en
Publication of CN108921552A publication Critical patent/CN108921552A/en
Application granted granted Critical
Publication of CN108921552B publication Critical patent/CN108921552B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

In the embodiment of the present invention, a kind of method of experimental evidence is provided, including:Calculate the first cryptographic Hash of evidence to be verified relevant to contract;The first original cryptographic Hash of the evidence to be verified is obtained from the contract, and the first cryptographic Hash being calculated is matched with the described first original cryptographic Hash;When the first cryptographic Hash being calculated and first original Hash values match success, determine that the evidence to be verified is not tampered with;In this scenario, what is stored in contract is not evidence itself, storage is cryptographic Hash relevant to evidence, in this way, if evidence is tampered, the cryptographic Hash of evidence of the cryptographic Hash of the evidence after distorting with being not tampered with is different, and is easier to be identified whether evidence is tampered, the complexity whether experimental evidence is tampered is reduced, efficiency is improved.

Description

A kind of method and device of experimental evidence
Technical field
The present invention relates to electronic contract technical field more particularly to a kind of method and devices of experimental evidence.
Background technique
With the rapid development of internet, e-commerce has become ubiquitous in various countries, it sends out traditional transaction form Huge change is given birth to.The important foundation and means that electronic contract is operated as e-commerce are by people institute extensive utilization, this is greatly Ground has pushed the development of digital economy.Currently, personal, enterprise and government handle day-to-day work with other business activities from Do not open electronic contract.
In electronic contract field, in many cases, needs to save there are also some materials relevant to electronic contract, such as demonstrate,prove According to, these data are generally stored separately with electronic contract instantly, in this way, if verifying these materials and whether being tampered, It needs individually to verify material itself, haves the defects that complexity is higher, takes a long time.
Summary of the invention
In view of the above problems, the present invention is proposed, overcome the above problem in order to provide one kind or at least is partially solved The method and device of a kind of experimental evidence of the above problem, for solving the poor defect of safety existing in the prior art.
According to the present invention in a first aspect, provide a kind of method of experimental evidence, including:
Calculate the first cryptographic Hash of evidence to be verified relevant to contract;
The first original cryptographic Hash of the evidence to be verified, and the first Hash that will be calculated are obtained from the contract Value is matched with the described first original cryptographic Hash;
When the first cryptographic Hash being calculated and first original Hash values match success, the card to be verified is determined According to being not tampered with.
In one embodiment, method described in above embodiment according to the present invention, first will be calculated Before cryptographic Hash is matched with the described first original cryptographic Hash, including:
Described first original cryptographic Hash is added in the contract.
In some embodiments, method described in any of the above-described embodiment according to the present invention, it is former by described first Beginning cryptographic Hash is added in the contract, including:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
In some embodiments, method described in any of the above-described embodiment according to the present invention, the card to be verified According to format be at least one of document, picture, audio and video.
In some embodiments, method described in any of the above-described embodiment according to the present invention, by what is be calculated First cryptographic Hash is matched with the described first original cryptographic Hash, including:
Judge whether the contract is tampered;
When determining that the contract is not tampered with, by the first cryptographic Hash being calculated and the described first original cryptographic Hash into Row matching.
In some embodiments, method described in any of the above-described embodiment according to the present invention, judges the contract Whether it is tampered, including:
Calculate the second cryptographic Hash of the contract;
Judge whether the second cryptographic Hash being calculated matches with the second original cryptographic Hash of the contract;
Determine that the contract is not tampered with, including:
When the second cryptographic Hash and the second original Hash values match that are calculated described in judgement, the contract is determined not It is tampered.
In the second aspect of embodiment of the present invention, a kind of device of experimental evidence is provided, including:
Computing unit, for calculating the first cryptographic Hash of evidence to be verified relevant to contract;
Matching unit for obtaining the first original cryptographic Hash of the evidence to be verified from the contract, and will calculate The first obtained cryptographic Hash is matched with the described first original cryptographic Hash;
Determination unit, for when the first cryptographic Hash for being calculated and first original Hash values match success, really The fixed evidence to be verified is not tampered with.
In one embodiment, device described in above embodiment according to the present invention, further includes adding unit, is used It is added in the contract in by the described first original cryptographic Hash.
In some embodiments, device described in any of the above-described embodiment according to the present invention, institute's addition are single Described first original cryptographic Hash is added in the contract by member, including:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
In some embodiments, device described in any of the above-described embodiment according to the present invention, institute are described to be verified The format of evidence is at least one of document, picture, audio and video.
In some embodiments, device described in any of the above-described embodiment according to the present invention, institute's matching are single Member matches the first cryptographic Hash being calculated with the described first original cryptographic Hash, including:
Judge whether the contract is tampered;
When determining that the contract is not tampered with, by the first cryptographic Hash being calculated and the described first original cryptographic Hash into Row matching.
In some embodiments, device described in any of the above-described embodiment according to the present invention, institute's matching are single Member judges whether the contract is tampered, including:
Calculate the second cryptographic Hash of the contract;
Judge whether the second cryptographic Hash being calculated matches with the second original cryptographic Hash of the contract;
The matching unit determines that the contract is not tampered with, including:
When the second cryptographic Hash and the second original Hash values match that are calculated described in judgement, the contract is determined not It is tampered.
In the embodiment of the present invention, a kind of method of experimental evidence is provided, including:Calculate card to be verified relevant to contract According to the first cryptographic Hash;It obtains the first original cryptographic Hash of the evidence to be verified from the contract, and will be calculated First cryptographic Hash is matched with the described first original cryptographic Hash;When the first cryptographic Hash and the described first original Kazakhstan being calculated When uncommon value successful match, determine that the evidence to be verified is not tampered with;In this scenario, what is stored in contract is not evidence Itself, storage is cryptographic Hash relevant to evidence, in this way, the cryptographic Hash of the evidence after distorting is not with if evidence is tampered The cryptographic Hash for the evidence being tampered is different, and is easier to be identified whether evidence is tampered, whether is reduced experimental evidence The complexity being tampered, improves efficiency.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 is a kind of flow chart for the experimental evidence that embodiment according to the present invention proposes;
Fig. 2 is a kind of schematic diagram of the device for the experimental evidence that embodiment according to the present invention proposes;
Fig. 3 is another schematic diagram of the device for the experimental evidence that embodiment according to the present invention proposes;
Fig. 4 is another schematic diagram of the device for the experimental evidence that embodiment according to the present invention proposes.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
The process that Fig. 1 schematically shows the method 10 of the accession page experimental evidence of embodiment according to the present invention is shown It is intended to.As shown in Figure 1, this method 10 may include step 100,110 and 120.
Step 100:Calculate the first cryptographic Hash of evidence to be verified relevant to contract;
Step 110:It obtains the first original cryptographic Hash of the evidence to be verified from the contract, and will be calculated First cryptographic Hash is matched with the described first original cryptographic Hash;
Step 120:When the first cryptographic Hash and the first original Hash values match that are calculated succeed, described in determination Evidence to be verified is not tampered with.
In the embodiment of the present invention, step 110 describes will get the first original cryptographic Hash from contract, then, it is inciting somebody to action It further include operating as follows before the first cryptographic Hash being calculated is matched with the described first original cryptographic Hash:
Described first original cryptographic Hash is added in the contract.
In the embodiment of the present invention, optionally, the first original cryptographic Hash, which is added to this operation in contract, to be occurred Before contract signature.
Wherein, there are many modes the described first original cryptographic Hash being added in the contract, it is alternatively possible to using Such as under type:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
It should be noted that there are many format of contract is possible, it is alternatively possible to be PDF (Portable Document Format, portable document format), perhaps it is also possible to word format or is also possible to excel format, does not do have herein Body limits.
When contract be PDF format if, Document Editing function by the described first original cryptographic Hash in the form of attachment It, can be in the following way when being added in the contract:
Based on PDF rule, the described first original cryptographic Hash is added to by institute in the form of attachment Document Editing function It states in contract.
Similarly, if contract is word format, by Document Editing function by the described first original cryptographic Hash with attachment Form when being added in the contract, can be in the following way:
Based on word rule, the described first original cryptographic Hash is added to by institute in the form of attachment Document Editing function It states in contract;
If contract is excel format, by Document Editing function by the described first original cryptographic Hash with the shape of attachment It, can be in the following way when formula is added in the contract:
Based on excel rule, the described first original cryptographic Hash is added in the form of attachment Document Editing function In the contract.
Certainly, for the document of extended formatting, addition manner is similar with aforesaid way, and this will not be detailed here.
It should be noted that foregoing description is that the first original cryptographic Hash is added in contract in the form of attachment, certainly It is also possible to be added in a text form in contract or other modes is added in contract, is not specifically limited herein. Certainly, this segment description is all suitable for for the document of different-format.
In the embodiment of the present invention, the relevant knowledge of hash algorithm is simply introduced.
The principle of hash algorithm is to calculate remainder according to the hashed value server count of data frame, is come by this method true Which hashed value server is content in fixed current data frame will be sent to.It is actually alternatively exactly to be produced between set The raw relationship to correspond to each other is equivalent to that corresponding to being mapped in another set in a data frame in a set The process of a data frame.
The working principle of Hash table is exactly the algorithm that a data frame is set according to a certain kind, such as hashes and calculate Method, be converted into number form, by these digital logarithm group length carry out remainder calculating, take its remainder, using result as Next label of the array, numerical value is stored, and is stored it in the array space under this numeric suffix.If After issuing the querying command in relation to Hash table, so that it may data frame are converted into corresponding number under its label using hash function Group, to obtain corresponding hashed value out of this space.
There are many hash algorithms used in the embodiment of the present invention, it is alternatively possible to can such as be used using following several MD4 algorithm can also use MD5 algorithm, or can also use SHA 1 (Secure Hash Algorithm, secure Hash) Algorithm, it is of course also possible to use other hash algorithms, are not specifically limited herein.
In the embodiment of the present invention, optionally, the format of the evidence to be verified is document, in picture, audio and video It is at least one.
Certainly, several examples of the above-mentioned only format of evidence to be verified, it's not limited to that in practical applications.
It should be noted that the first cryptographic Hash being calculated and the described first original Kazakhstan described in the embodiment of the present invention Uncommon value successful match can refer to that the first cryptographic Hash and the first original cryptographic Hash are completely the same, certainly, under special circumstances, can also Be in a certain range the two with regard to successful match with the error both referred to.
It in the embodiment of the present invention, can first judge whether contract is tampered, be gone again in the case where contract is not tampered with The first cryptographic Hash and the first original cryptographic Hash with evidence, that is to say, that by the first cryptographic Hash being calculated and described first It, can be in the following way when original cryptographic Hash is matched:
Judge whether the contract is tampered;
When determining that the contract is not tampered with, by the first cryptographic Hash being calculated and the described first original cryptographic Hash into Row matching.
Wherein, judge there are many modes that whether contract is tampered, it is alternatively possible in the following way:
Calculate the second cryptographic Hash of the contract;
Judge whether the second cryptographic Hash being calculated matches with the second original cryptographic Hash of the contract;
Determine that the contract is not tampered with, including:
When the second cryptographic Hash and the second original Hash values match that are calculated described in judgement, the contract is determined not It is tampered.
Wherein, contract, which is not tampered with, can refer to that the second cryptographic Hash of contract is identical as the second original cryptographic Hash, can also refer to The difference of second cryptographic Hash of contract and the second original cryptographic Hash belongs to certain range, it is of course also possible to be other modes, This is not specifically limited.
In the embodiment of the present invention, it is also proposed that a kind of device 20 of experimental evidence, including:
Computing unit 200, for calculating the first cryptographic Hash of evidence to be verified relevant to contract;
Matching unit 210, for obtaining the first original cryptographic Hash of the evidence to be verified from the contract, and will meter The first obtained cryptographic Hash is matched with the described first original cryptographic Hash;
Determination unit 220, for when the first cryptographic Hash for being calculated and first original Hash values match success, Determine that the evidence to be verified is not tampered with.
In the embodiment of the present invention, matching unit 210 describes will get the first original cryptographic Hash from contract, then, Device 20 further includes adding unit 230, for the described first original cryptographic Hash to be added in the contract.
In the embodiment of the present invention, optionally, the first original cryptographic Hash, which is added to this operation in contract, to be occurred Before contract signature.
In the embodiment of the present invention, the described first original cryptographic Hash is added in the contract by the adding unit 230 There are many modes, it is alternatively possible in the following way:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
It should be noted that it is alternatively possible to be PDF, or being also possible to word lattice there are many format of contract is possible Formula, or it is also possible to excel format, it is not specifically limited herein.
When contract be PDF format if, Document Editing function by the described first original cryptographic Hash in the form of attachment It, can be in the following way when being added in the contract:
Based on PDF rule, the described first original cryptographic Hash is added to by institute in the form of attachment Document Editing function It states in contract.
Similarly, if contract is word format, by Document Editing function by the described first original cryptographic Hash with attachment Form when being added in the contract, can be in the following way:
Based on word rule, the described first original cryptographic Hash is added to by institute in the form of attachment Document Editing function It states in contract;
If contract is excel format, by Document Editing function by the described first original cryptographic Hash with the shape of attachment It, can be in the following way when formula is added in the contract:
Based on excel rule, the described first original cryptographic Hash is added in the form of attachment Document Editing function In the contract.
Certainly, for the document of extended formatting, addition manner is similar with aforesaid way, and this will not be detailed here.
It should be noted that foregoing description is that the first original cryptographic Hash is added in contract in the form of attachment, certainly It is also possible to be added in a text form in contract or other modes is added in contract, is not specifically limited herein. Certainly, this segment description is all suitable for for the document of different-format.
In the embodiment of the present invention, the relevant knowledge of hash algorithm is simply introduced.
The principle of hash algorithm is to calculate remainder according to the hashed value server count of data frame, is come by this method true Which hashed value server is content in fixed current data frame will be sent to.It is actually alternatively exactly to be produced between set The raw relationship to correspond to each other is equivalent to that corresponding to being mapped in another set in a data frame in a set The process of a data frame.
The working principle of Hash table is exactly the algorithm that a data frame is set according to a certain kind, such as hashes and calculate Method, be converted into number form, by these digital logarithm group length carry out remainder calculating, take its remainder, using result as Next label of the array, numerical value is stored, and is stored it in the array space under this numeric suffix.If After issuing the querying command in relation to Hash table, so that it may data frame are converted into corresponding number under its label using hash function Group, to obtain corresponding hashed value out of this space.
There are many hash algorithms used in the embodiment of the present invention, it is alternatively possible to can such as be used using following several MD4 algorithm can also use MD5 algorithm, or can also use 1 algorithm of SHA, it is of course also possible to use other Hash are calculated Method is not specifically limited herein.
In the embodiment of the present invention, optionally, the format of the evidence to be verified is document, in picture, audio and video It is at least one.
Certainly, several examples of the above-mentioned only format of evidence to be verified, it's not limited to that in practical applications.
It should be noted that the first cryptographic Hash being calculated and the described first original Kazakhstan described in the embodiment of the present invention Uncommon value successful match can refer to that the first cryptographic Hash and the first original cryptographic Hash are completely the same, certainly, under special circumstances, can also Be in a certain range the two with regard to successful match with the error both referred to.
It in the embodiment of the present invention, can first judge whether contract is tampered, be gone again in the case where contract is not tampered with The first cryptographic Hash and the first original cryptographic Hash with evidence, that is to say, that the matching unit 210 is breathed out be calculated first Uncommon value is matched with the described first original cryptographic Hash, including:
Judge whether the contract is tampered;
When determining that the contract is not tampered with, by the first cryptographic Hash being calculated and the described first original cryptographic Hash into Row matching.
Wherein, the matching unit 210 judges whether the contract is tampered, including:
Calculate the second cryptographic Hash of the contract;
Judge whether the second cryptographic Hash being calculated matches with the second original cryptographic Hash of the contract;
The matching unit 210 determines that the contract is not tampered with, including:
When the second cryptographic Hash and the second original Hash values match that are calculated described in judgement, the contract is determined not It is tampered.
Wherein, contract, which is not tampered with, can refer to that the second cryptographic Hash of contract is identical as the second original cryptographic Hash, can also refer to The difference of second cryptographic Hash of contract and the second original cryptographic Hash belongs to certain range, it is of course also possible to be other modes, This is not specifically limited.
Example devices
After describing the method and apparatus of exemplary embodiment of the invention, next, introducing according to the present invention The device for experimental evidence of another exemplary embodiment.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or Program product.Therefore, various aspects of the invention can be embodied in the following forms, i.e.,:It is complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".
In some possible embodiments, the device according to the present invention for experimental evidence can include at least at least One processing unit and at least one storage unit.Wherein, the storage unit is stored with program code, works as described program When code is executed by the processing unit, retouched in above-mentioned " illustrative methods " part of this specification so that the processing unit executes Step in the method for experimental evidence for the illustrative embodiments various according to the present invention stated.For example, the processing is single Member can execute step 100 as shown in fig. 1:Calculate the first cryptographic Hash of evidence to be verified relevant to contract;Step 110:Obtain the first original cryptographic Hash of the evidence to be verified from the contract, and by the first cryptographic Hash being calculated with The first original cryptographic Hash is matched;Step 120:When the first cryptographic Hash and the described first original cryptographic Hash being calculated When successful match, determine that the evidence to be verified is not tampered with.
The device 30 for experimental evidence of this embodiment according to the present invention is described referring to Fig. 3.Fig. 3 is aobvious The device 30 for experimental evidence shown is only an example, should not function to the embodiment of the present invention and use scope bring Any restrictions.
As shown in figure 3, the device 30 for experimental evidence is showed in the form of universal computing device.For experimental evidence The component of device 30 can include but is not limited to:At least one above-mentioned processing unit 16, connects at least one above-mentioned storage unit 28 Connect the bus 18 of different system components (including storage unit 28 and processing unit 16).
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.
Storage unit 28 may include the readable medium of form of volatile memory, such as random access memory (RAM) 31 and/or cache memory 32, it can also further read-only memory (ROM) 34.
Storage unit 28 can also include program/utility 41 with one group of (at least one) program module 42, this The program module 42 of sample includes but is not limited to:Operating system, one or more application program, other program modules and program It may include the realization of network environment in data, each of these examples or certain combination.
Device 30 for experimental evidence can also be with one or more external equipments 14 (such as keyboard, sensing equipment, indigo plant Tooth equipment etc.) communication, the equipment interacted with the device 30 for being used for experimental evidence can be also enabled a user to one or more Communication, and/or appoint with enabling this to be used for the device 30 of experimental evidence with what one or more of the other calculating equipment was communicated What equipment (such as router, modem etc.) communication.This communication can by input/output (I/O) interface 22 into Row.Also, network adapter 21 and one or more network (such as local can also be passed through for the device 30 of experimental evidence Net (LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown, network adapter 21 passes through always Line 18 is communicated with other modules of the device 30 for experimental evidence.It should be understood that being used for although not shown in the drawings, can combine The device 30 of experimental evidence uses other hardware and/or software module, including but not limited to:Microcode, device driver, redundancy Processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Exemplary process product
In some possible embodiments, various aspects of the invention are also implemented as a kind of shape of program product Formula comprising program code, when described program product is run in equipment, said program code is for executing the equipment The verifying that is used for of various illustrative embodiments is demonstrate,proved according to the present invention described in above-mentioned " illustrative methods " part of this specification According to method in step, for example, the equipment can execute step 100 as shown in fig. 1:Calculate it is relevant to contract to First cryptographic Hash of experimental evidence;Step 110:The first original cryptographic Hash of the evidence to be verified is obtained from the contract, And the first cryptographic Hash being calculated is matched with the described first original cryptographic Hash;Step 120:When first be calculated When cryptographic Hash and first original Hash values match success, determine that the evidence to be verified is not tampered with.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example may be-but not limited to-electricity, magnetic, optical, electromagnetic, red The system of outside line or semiconductor, device or device, or any above combination.The more specific example of readable storage medium storing program for executing (non exhaustive list) includes:Electrical connection, portable disc with one or more conducting wires, hard disk, random access memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc Read memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
It, can be with as shown in figure 4, describe the program product 40 for experimental evidence of embodiment according to the present invention Using portable compact disc read only memory (CD-ROM) and including program code, and can be in terminal device, such as personal electricity It is run on brain.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing, which can be, any includes Or the tangible medium of storage program, which can be commanded execution system, device or device use or in connection make With.
Readable signal medium may include in a base band or as the data-signal that carrier wave a part is propagated, wherein carrying Readable program code.The data-signal of this propagation can take various forms, including --- but being not limited to --- electromagnetism letter Number, optical signal or above-mentioned any appropriate combination.Readable signal medium can also be other than readable storage medium storing program for executing it is any can Read medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or Program in connection.
The program code for including on readable medium can transmit with any suitable medium, including --- but being not limited to --- Wirelessly, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind --- including local area network (LAN) or extensively Domain net (WAN)-be connected to user calculating equipment, or, it may be connected to external computing device (such as utilize Internet service Provider is connected by internet).
If it should be noted that although being referred to the equipment for drying or son dress of the equipment for experimental evidence in the above detailed description It sets, but this division is only not enforceable.In fact, embodiment according to the present invention, above-described two or The feature and function of more devices can embody in one apparatus.Conversely, the feature and function of an above-described device It can be able to be to be embodied by multiple devices with further division.
In addition, although describing the operation of the method for the present invention in the accompanying drawings with particular order, this do not require that or Hint must execute these operations in this particular order, or have to carry out shown in whole operation be just able to achieve it is desired As a result.Additionally or alternatively, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/or by one Step is decomposed into execution of multiple steps.
Although detailed description of the preferred embodimentsthe spirit and principles of the present invention are described by reference to several, it should be appreciated that, this It is not limited to the specific embodiments disclosed for invention, does not also mean that the feature in these aspects cannot to the division of various aspects Combination is benefited to carry out, this to divide the convenience merely to statement.The present invention is directed to cover appended claims spirit and Included various modifications and equivalent arrangements in range.

Claims (10)

1. a kind of method of experimental evidence, including:
Calculate the first cryptographic Hash of evidence to be verified relevant to contract;
Obtain the first original cryptographic Hash of the evidence to be verified from the contract, and by the first cryptographic Hash being calculated with The first original cryptographic Hash is matched;
When the first cryptographic Hash being calculated and first original Hash values match success, the evidence to be verified is determined not It is tampered.
2. the method as described in claim 1, by the first cryptographic Hash being calculated and the described first original cryptographic Hash progress With before, including:
Described first original cryptographic Hash is added in the contract.
3. the described first original cryptographic Hash is added in the contract by method according to claim 2, including:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
4. the method according to claim 1, the format of the evidence to be verified is document, picture, audio and view At least one of frequency.
5. the method as described in claim 1, by the first cryptographic Hash being calculated and the described first original cryptographic Hash progress Match, including:
Judge whether the contract is tampered;
When determining that the contract is not tampered with, by the first cryptographic Hash being calculated and the described first original cryptographic Hash progress Match.
6. method as claimed in claim 5, judges whether the contract is tampered, including:
Calculate the second cryptographic Hash of the contract;
Judge whether the second cryptographic Hash being calculated matches with the second original cryptographic Hash of the contract;
Determine that the contract is not tampered with, including:
When the second cryptographic Hash and the second original Hash values match that are calculated described in judgement, determine that the contract is not usurped Change.
7. a kind of device of experimental evidence, including:
Computing unit, for calculating the first cryptographic Hash of evidence to be verified relevant to contract;
Matching unit for obtaining the first original cryptographic Hash of the evidence to be verified from the contract, and will be calculated The first cryptographic Hash matched with the described first original cryptographic Hash;
Determination unit, for determining institute when the first cryptographic Hash being calculated and first original Hash values match success Evidence to be verified is stated to be not tampered with.
8. device as claimed in claim 7 further includes adding unit, described for the described first original cryptographic Hash to be added to In contract.
9. device as claimed in claim 8, the described first original cryptographic Hash is added in the contract by the adding unit, Including:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
10. the format of the evidence to be verified is document, picture, audio and view such as the described in any item devices of claim 7-9 At least one of frequency.
CN201810634929.8A 2018-06-15 2018-06-15 Evidence verification method and device Active CN108921552B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810634929.8A CN108921552B (en) 2018-06-15 2018-06-15 Evidence verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810634929.8A CN108921552B (en) 2018-06-15 2018-06-15 Evidence verification method and device

Publications (2)

Publication Number Publication Date
CN108921552A true CN108921552A (en) 2018-11-30
CN108921552B CN108921552B (en) 2021-08-27

Family

ID=64421480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810634929.8A Active CN108921552B (en) 2018-06-15 2018-06-15 Evidence verification method and device

Country Status (1)

Country Link
CN (1) CN108921552B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756485A (en) * 2018-12-14 2019-05-14 平安科技(深圳)有限公司 Electronic contract signs method, apparatus, computer equipment and storage medium
CN110084072A (en) * 2019-04-30 2019-08-02 北京智签科技有限公司 A kind of electronic contract online verification method based on block chain network
CN111934851A (en) * 2020-07-26 2020-11-13 中国人民解放军93209部队 Flight plan verification method and device based on Hash algorithm
WO2021012499A1 (en) * 2019-07-23 2021-01-28 平安科技(深圳)有限公司 File comparison method and apparatus, computer device and storage medium
CN113343313A (en) * 2021-06-30 2021-09-03 中金金融认证中心有限公司 Verification report validity identification method, legal service system and readable storage medium
CN113378234A (en) * 2021-05-27 2021-09-10 浙江贝才之神网络科技有限公司 Data tampering detection method, system, computer device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514410A (en) * 2013-09-30 2014-01-15 上海市数字证书认证中心有限公司 Dependable preservation and evidence collection system and method for electronic contract
CN104166936A (en) * 2014-08-14 2014-11-26 江苏买卖网电子商务有限公司 Electronic contract storage and validation method
US20160094345A1 (en) * 2014-09-28 2016-03-31 Emc Corporation Generating a qr code
CN107316182A (en) * 2017-06-30 2017-11-03 福建亿榕信息技术有限公司 A kind of generation method of electronic contract chain of evidence and generation system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514410A (en) * 2013-09-30 2014-01-15 上海市数字证书认证中心有限公司 Dependable preservation and evidence collection system and method for electronic contract
CN104166936A (en) * 2014-08-14 2014-11-26 江苏买卖网电子商务有限公司 Electronic contract storage and validation method
US20160094345A1 (en) * 2014-09-28 2016-03-31 Emc Corporation Generating a qr code
CN107316182A (en) * 2017-06-30 2017-11-03 福建亿榕信息技术有限公司 A kind of generation method of electronic contract chain of evidence and generation system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756485A (en) * 2018-12-14 2019-05-14 平安科技(深圳)有限公司 Electronic contract signs method, apparatus, computer equipment and storage medium
CN109756485B (en) * 2018-12-14 2022-11-18 平安科技(深圳)有限公司 Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
CN110084072A (en) * 2019-04-30 2019-08-02 北京智签科技有限公司 A kind of electronic contract online verification method based on block chain network
WO2021012499A1 (en) * 2019-07-23 2021-01-28 平安科技(深圳)有限公司 File comparison method and apparatus, computer device and storage medium
CN111934851A (en) * 2020-07-26 2020-11-13 中国人民解放军93209部队 Flight plan verification method and device based on Hash algorithm
CN113378234A (en) * 2021-05-27 2021-09-10 浙江贝才之神网络科技有限公司 Data tampering detection method, system, computer device and storage medium
CN113343313A (en) * 2021-06-30 2021-09-03 中金金融认证中心有限公司 Verification report validity identification method, legal service system and readable storage medium

Also Published As

Publication number Publication date
CN108921552B (en) 2021-08-27

Similar Documents

Publication Publication Date Title
CN108921552A (en) A kind of method and device of experimental evidence
CN107886306B (en) File approval method, medium, device and computing equipment
US9542461B2 (en) Enhancing performance of extract, transform, and load (ETL) jobs
WO2022007438A1 (en) Emotional voice data conversion method, apparatus, computer device, and storage medium
CN110825363B (en) Intelligent contract acquisition method and device, electronic equipment and storage medium
CN112256275B (en) Code confusion method, device, electronic equipment and medium
CN112417178B (en) Document template definition-based on-chain contract processing method and device and electronic equipment
CN111198945A (en) Data processing method, device, medium and electronic equipment
CN111161085B (en) Service request processing method, device, electronic equipment and computer readable medium
CN109947431A (en) A kind of code generating method, device, equipment and storage medium
WO2021196935A1 (en) Data checking method and apparatus, electronic device, and storage medium
CN109901987A (en) A kind of method and apparatus generating test data
CN105556533A (en) Automatically generating certification documents
CN113806794A (en) Processing method and device for electronic signature of file, computer equipment and storage medium
CN109769010A (en) Method, apparatus, equipment and storage medium based on SDK access CloudStack server
CN112966304B (en) Tamper-proof method and device for flow document, computer equipment and medium
US20150120682A1 (en) Automated recognition of patterns in a log file having unknown grammar
CN107193249A (en) Program development servicing unit and program development householder method
CN110545542A (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN109636460A (en) A kind of method for processing business, device, equipment and storage medium
CN113283222A (en) Automatic report generation method and device, computer equipment and storage medium
CN110457318A (en) The update method of data field, device, medium, electronic equipment in block chain
CN115130130A (en) Network disk file unlocking method and device, network disk and storage medium
CN114218166A (en) Data processing method and device, electronic equipment and readable storage medium
CN112036775A (en) Resource access classification authorization method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant