CN108921552A - A kind of method and device of experimental evidence - Google Patents
A kind of method and device of experimental evidence Download PDFInfo
- Publication number
- CN108921552A CN108921552A CN201810634929.8A CN201810634929A CN108921552A CN 108921552 A CN108921552 A CN 108921552A CN 201810634929 A CN201810634929 A CN 201810634929A CN 108921552 A CN108921552 A CN 108921552A
- Authority
- CN
- China
- Prior art keywords
- cryptographic hash
- contract
- original
- evidence
- tampered
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
In the embodiment of the present invention, a kind of method of experimental evidence is provided, including:Calculate the first cryptographic Hash of evidence to be verified relevant to contract;The first original cryptographic Hash of the evidence to be verified is obtained from the contract, and the first cryptographic Hash being calculated is matched with the described first original cryptographic Hash;When the first cryptographic Hash being calculated and first original Hash values match success, determine that the evidence to be verified is not tampered with;In this scenario, what is stored in contract is not evidence itself, storage is cryptographic Hash relevant to evidence, in this way, if evidence is tampered, the cryptographic Hash of evidence of the cryptographic Hash of the evidence after distorting with being not tampered with is different, and is easier to be identified whether evidence is tampered, the complexity whether experimental evidence is tampered is reduced, efficiency is improved.
Description
Technical field
The present invention relates to electronic contract technical field more particularly to a kind of method and devices of experimental evidence.
Background technique
With the rapid development of internet, e-commerce has become ubiquitous in various countries, it sends out traditional transaction form
Huge change is given birth to.The important foundation and means that electronic contract is operated as e-commerce are by people institute extensive utilization, this is greatly
Ground has pushed the development of digital economy.Currently, personal, enterprise and government handle day-to-day work with other business activities from
Do not open electronic contract.
In electronic contract field, in many cases, needs to save there are also some materials relevant to electronic contract, such as demonstrate,prove
According to, these data are generally stored separately with electronic contract instantly, in this way, if verifying these materials and whether being tampered,
It needs individually to verify material itself, haves the defects that complexity is higher, takes a long time.
Summary of the invention
In view of the above problems, the present invention is proposed, overcome the above problem in order to provide one kind or at least is partially solved
The method and device of a kind of experimental evidence of the above problem, for solving the poor defect of safety existing in the prior art.
According to the present invention in a first aspect, provide a kind of method of experimental evidence, including:
Calculate the first cryptographic Hash of evidence to be verified relevant to contract;
The first original cryptographic Hash of the evidence to be verified, and the first Hash that will be calculated are obtained from the contract
Value is matched with the described first original cryptographic Hash;
When the first cryptographic Hash being calculated and first original Hash values match success, the card to be verified is determined
According to being not tampered with.
In one embodiment, method described in above embodiment according to the present invention, first will be calculated
Before cryptographic Hash is matched with the described first original cryptographic Hash, including:
Described first original cryptographic Hash is added in the contract.
In some embodiments, method described in any of the above-described embodiment according to the present invention, it is former by described first
Beginning cryptographic Hash is added in the contract, including:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
In some embodiments, method described in any of the above-described embodiment according to the present invention, the card to be verified
According to format be at least one of document, picture, audio and video.
In some embodiments, method described in any of the above-described embodiment according to the present invention, by what is be calculated
First cryptographic Hash is matched with the described first original cryptographic Hash, including:
Judge whether the contract is tampered;
When determining that the contract is not tampered with, by the first cryptographic Hash being calculated and the described first original cryptographic Hash into
Row matching.
In some embodiments, method described in any of the above-described embodiment according to the present invention, judges the contract
Whether it is tampered, including:
Calculate the second cryptographic Hash of the contract;
Judge whether the second cryptographic Hash being calculated matches with the second original cryptographic Hash of the contract;
Determine that the contract is not tampered with, including:
When the second cryptographic Hash and the second original Hash values match that are calculated described in judgement, the contract is determined not
It is tampered.
In the second aspect of embodiment of the present invention, a kind of device of experimental evidence is provided, including:
Computing unit, for calculating the first cryptographic Hash of evidence to be verified relevant to contract;
Matching unit for obtaining the first original cryptographic Hash of the evidence to be verified from the contract, and will calculate
The first obtained cryptographic Hash is matched with the described first original cryptographic Hash;
Determination unit, for when the first cryptographic Hash for being calculated and first original Hash values match success, really
The fixed evidence to be verified is not tampered with.
In one embodiment, device described in above embodiment according to the present invention, further includes adding unit, is used
It is added in the contract in by the described first original cryptographic Hash.
In some embodiments, device described in any of the above-described embodiment according to the present invention, institute's addition are single
Described first original cryptographic Hash is added in the contract by member, including:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
In some embodiments, device described in any of the above-described embodiment according to the present invention, institute are described to be verified
The format of evidence is at least one of document, picture, audio and video.
In some embodiments, device described in any of the above-described embodiment according to the present invention, institute's matching are single
Member matches the first cryptographic Hash being calculated with the described first original cryptographic Hash, including:
Judge whether the contract is tampered;
When determining that the contract is not tampered with, by the first cryptographic Hash being calculated and the described first original cryptographic Hash into
Row matching.
In some embodiments, device described in any of the above-described embodiment according to the present invention, institute's matching are single
Member judges whether the contract is tampered, including:
Calculate the second cryptographic Hash of the contract;
Judge whether the second cryptographic Hash being calculated matches with the second original cryptographic Hash of the contract;
The matching unit determines that the contract is not tampered with, including:
When the second cryptographic Hash and the second original Hash values match that are calculated described in judgement, the contract is determined not
It is tampered.
In the embodiment of the present invention, a kind of method of experimental evidence is provided, including:Calculate card to be verified relevant to contract
According to the first cryptographic Hash;It obtains the first original cryptographic Hash of the evidence to be verified from the contract, and will be calculated
First cryptographic Hash is matched with the described first original cryptographic Hash;When the first cryptographic Hash and the described first original Kazakhstan being calculated
When uncommon value successful match, determine that the evidence to be verified is not tampered with;In this scenario, what is stored in contract is not evidence
Itself, storage is cryptographic Hash relevant to evidence, in this way, the cryptographic Hash of the evidence after distorting is not with if evidence is tampered
The cryptographic Hash for the evidence being tampered is different, and is easier to be identified whether evidence is tampered, whether is reduced experimental evidence
The complexity being tampered, improves efficiency.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 is a kind of flow chart for the experimental evidence that embodiment according to the present invention proposes;
Fig. 2 is a kind of schematic diagram of the device for the experimental evidence that embodiment according to the present invention proposes;
Fig. 3 is another schematic diagram of the device for the experimental evidence that embodiment according to the present invention proposes;
Fig. 4 is another schematic diagram of the device for the experimental evidence that embodiment according to the present invention proposes.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
The process that Fig. 1 schematically shows the method 10 of the accession page experimental evidence of embodiment according to the present invention is shown
It is intended to.As shown in Figure 1, this method 10 may include step 100,110 and 120.
Step 100:Calculate the first cryptographic Hash of evidence to be verified relevant to contract;
Step 110:It obtains the first original cryptographic Hash of the evidence to be verified from the contract, and will be calculated
First cryptographic Hash is matched with the described first original cryptographic Hash;
Step 120:When the first cryptographic Hash and the first original Hash values match that are calculated succeed, described in determination
Evidence to be verified is not tampered with.
In the embodiment of the present invention, step 110 describes will get the first original cryptographic Hash from contract, then, it is inciting somebody to action
It further include operating as follows before the first cryptographic Hash being calculated is matched with the described first original cryptographic Hash:
Described first original cryptographic Hash is added in the contract.
In the embodiment of the present invention, optionally, the first original cryptographic Hash, which is added to this operation in contract, to be occurred
Before contract signature.
Wherein, there are many modes the described first original cryptographic Hash being added in the contract, it is alternatively possible to using
Such as under type:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
It should be noted that there are many format of contract is possible, it is alternatively possible to be PDF (Portable Document
Format, portable document format), perhaps it is also possible to word format or is also possible to excel format, does not do have herein
Body limits.
When contract be PDF format if, Document Editing function by the described first original cryptographic Hash in the form of attachment
It, can be in the following way when being added in the contract:
Based on PDF rule, the described first original cryptographic Hash is added to by institute in the form of attachment Document Editing function
It states in contract.
Similarly, if contract is word format, by Document Editing function by the described first original cryptographic Hash with attachment
Form when being added in the contract, can be in the following way:
Based on word rule, the described first original cryptographic Hash is added to by institute in the form of attachment Document Editing function
It states in contract;
If contract is excel format, by Document Editing function by the described first original cryptographic Hash with the shape of attachment
It, can be in the following way when formula is added in the contract:
Based on excel rule, the described first original cryptographic Hash is added in the form of attachment Document Editing function
In the contract.
Certainly, for the document of extended formatting, addition manner is similar with aforesaid way, and this will not be detailed here.
It should be noted that foregoing description is that the first original cryptographic Hash is added in contract in the form of attachment, certainly
It is also possible to be added in a text form in contract or other modes is added in contract, is not specifically limited herein.
Certainly, this segment description is all suitable for for the document of different-format.
In the embodiment of the present invention, the relevant knowledge of hash algorithm is simply introduced.
The principle of hash algorithm is to calculate remainder according to the hashed value server count of data frame, is come by this method true
Which hashed value server is content in fixed current data frame will be sent to.It is actually alternatively exactly to be produced between set
The raw relationship to correspond to each other is equivalent to that corresponding to being mapped in another set in a data frame in a set
The process of a data frame.
The working principle of Hash table is exactly the algorithm that a data frame is set according to a certain kind, such as hashes and calculate
Method, be converted into number form, by these digital logarithm group length carry out remainder calculating, take its remainder, using result as
Next label of the array, numerical value is stored, and is stored it in the array space under this numeric suffix.If
After issuing the querying command in relation to Hash table, so that it may data frame are converted into corresponding number under its label using hash function
Group, to obtain corresponding hashed value out of this space.
There are many hash algorithms used in the embodiment of the present invention, it is alternatively possible to can such as be used using following several
MD4 algorithm can also use MD5 algorithm, or can also use SHA 1 (Secure Hash Algorithm, secure Hash)
Algorithm, it is of course also possible to use other hash algorithms, are not specifically limited herein.
In the embodiment of the present invention, optionally, the format of the evidence to be verified is document, in picture, audio and video
It is at least one.
Certainly, several examples of the above-mentioned only format of evidence to be verified, it's not limited to that in practical applications.
It should be noted that the first cryptographic Hash being calculated and the described first original Kazakhstan described in the embodiment of the present invention
Uncommon value successful match can refer to that the first cryptographic Hash and the first original cryptographic Hash are completely the same, certainly, under special circumstances, can also
Be in a certain range the two with regard to successful match with the error both referred to.
It in the embodiment of the present invention, can first judge whether contract is tampered, be gone again in the case where contract is not tampered with
The first cryptographic Hash and the first original cryptographic Hash with evidence, that is to say, that by the first cryptographic Hash being calculated and described first
It, can be in the following way when original cryptographic Hash is matched:
Judge whether the contract is tampered;
When determining that the contract is not tampered with, by the first cryptographic Hash being calculated and the described first original cryptographic Hash into
Row matching.
Wherein, judge there are many modes that whether contract is tampered, it is alternatively possible in the following way:
Calculate the second cryptographic Hash of the contract;
Judge whether the second cryptographic Hash being calculated matches with the second original cryptographic Hash of the contract;
Determine that the contract is not tampered with, including:
When the second cryptographic Hash and the second original Hash values match that are calculated described in judgement, the contract is determined not
It is tampered.
Wherein, contract, which is not tampered with, can refer to that the second cryptographic Hash of contract is identical as the second original cryptographic Hash, can also refer to
The difference of second cryptographic Hash of contract and the second original cryptographic Hash belongs to certain range, it is of course also possible to be other modes,
This is not specifically limited.
In the embodiment of the present invention, it is also proposed that a kind of device 20 of experimental evidence, including:
Computing unit 200, for calculating the first cryptographic Hash of evidence to be verified relevant to contract;
Matching unit 210, for obtaining the first original cryptographic Hash of the evidence to be verified from the contract, and will meter
The first obtained cryptographic Hash is matched with the described first original cryptographic Hash;
Determination unit 220, for when the first cryptographic Hash for being calculated and first original Hash values match success,
Determine that the evidence to be verified is not tampered with.
In the embodiment of the present invention, matching unit 210 describes will get the first original cryptographic Hash from contract, then,
Device 20 further includes adding unit 230, for the described first original cryptographic Hash to be added in the contract.
In the embodiment of the present invention, optionally, the first original cryptographic Hash, which is added to this operation in contract, to be occurred
Before contract signature.
In the embodiment of the present invention, the described first original cryptographic Hash is added in the contract by the adding unit 230
There are many modes, it is alternatively possible in the following way:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
It should be noted that it is alternatively possible to be PDF, or being also possible to word lattice there are many format of contract is possible
Formula, or it is also possible to excel format, it is not specifically limited herein.
When contract be PDF format if, Document Editing function by the described first original cryptographic Hash in the form of attachment
It, can be in the following way when being added in the contract:
Based on PDF rule, the described first original cryptographic Hash is added to by institute in the form of attachment Document Editing function
It states in contract.
Similarly, if contract is word format, by Document Editing function by the described first original cryptographic Hash with attachment
Form when being added in the contract, can be in the following way:
Based on word rule, the described first original cryptographic Hash is added to by institute in the form of attachment Document Editing function
It states in contract;
If contract is excel format, by Document Editing function by the described first original cryptographic Hash with the shape of attachment
It, can be in the following way when formula is added in the contract:
Based on excel rule, the described first original cryptographic Hash is added in the form of attachment Document Editing function
In the contract.
Certainly, for the document of extended formatting, addition manner is similar with aforesaid way, and this will not be detailed here.
It should be noted that foregoing description is that the first original cryptographic Hash is added in contract in the form of attachment, certainly
It is also possible to be added in a text form in contract or other modes is added in contract, is not specifically limited herein.
Certainly, this segment description is all suitable for for the document of different-format.
In the embodiment of the present invention, the relevant knowledge of hash algorithm is simply introduced.
The principle of hash algorithm is to calculate remainder according to the hashed value server count of data frame, is come by this method true
Which hashed value server is content in fixed current data frame will be sent to.It is actually alternatively exactly to be produced between set
The raw relationship to correspond to each other is equivalent to that corresponding to being mapped in another set in a data frame in a set
The process of a data frame.
The working principle of Hash table is exactly the algorithm that a data frame is set according to a certain kind, such as hashes and calculate
Method, be converted into number form, by these digital logarithm group length carry out remainder calculating, take its remainder, using result as
Next label of the array, numerical value is stored, and is stored it in the array space under this numeric suffix.If
After issuing the querying command in relation to Hash table, so that it may data frame are converted into corresponding number under its label using hash function
Group, to obtain corresponding hashed value out of this space.
There are many hash algorithms used in the embodiment of the present invention, it is alternatively possible to can such as be used using following several
MD4 algorithm can also use MD5 algorithm, or can also use 1 algorithm of SHA, it is of course also possible to use other Hash are calculated
Method is not specifically limited herein.
In the embodiment of the present invention, optionally, the format of the evidence to be verified is document, in picture, audio and video
It is at least one.
Certainly, several examples of the above-mentioned only format of evidence to be verified, it's not limited to that in practical applications.
It should be noted that the first cryptographic Hash being calculated and the described first original Kazakhstan described in the embodiment of the present invention
Uncommon value successful match can refer to that the first cryptographic Hash and the first original cryptographic Hash are completely the same, certainly, under special circumstances, can also
Be in a certain range the two with regard to successful match with the error both referred to.
It in the embodiment of the present invention, can first judge whether contract is tampered, be gone again in the case where contract is not tampered with
The first cryptographic Hash and the first original cryptographic Hash with evidence, that is to say, that the matching unit 210 is breathed out be calculated first
Uncommon value is matched with the described first original cryptographic Hash, including:
Judge whether the contract is tampered;
When determining that the contract is not tampered with, by the first cryptographic Hash being calculated and the described first original cryptographic Hash into
Row matching.
Wherein, the matching unit 210 judges whether the contract is tampered, including:
Calculate the second cryptographic Hash of the contract;
Judge whether the second cryptographic Hash being calculated matches with the second original cryptographic Hash of the contract;
The matching unit 210 determines that the contract is not tampered with, including:
When the second cryptographic Hash and the second original Hash values match that are calculated described in judgement, the contract is determined not
It is tampered.
Wherein, contract, which is not tampered with, can refer to that the second cryptographic Hash of contract is identical as the second original cryptographic Hash, can also refer to
The difference of second cryptographic Hash of contract and the second original cryptographic Hash belongs to certain range, it is of course also possible to be other modes,
This is not specifically limited.
Example devices
After describing the method and apparatus of exemplary embodiment of the invention, next, introducing according to the present invention
The device for experimental evidence of another exemplary embodiment.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or
Program product.Therefore, various aspects of the invention can be embodied in the following forms, i.e.,:It is complete hardware embodiment, complete
The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here
Referred to as circuit, " module " or " system ".
In some possible embodiments, the device according to the present invention for experimental evidence can include at least at least
One processing unit and at least one storage unit.Wherein, the storage unit is stored with program code, works as described program
When code is executed by the processing unit, retouched in above-mentioned " illustrative methods " part of this specification so that the processing unit executes
Step in the method for experimental evidence for the illustrative embodiments various according to the present invention stated.For example, the processing is single
Member can execute step 100 as shown in fig. 1:Calculate the first cryptographic Hash of evidence to be verified relevant to contract;Step
110:Obtain the first original cryptographic Hash of the evidence to be verified from the contract, and by the first cryptographic Hash being calculated with
The first original cryptographic Hash is matched;Step 120:When the first cryptographic Hash and the described first original cryptographic Hash being calculated
When successful match, determine that the evidence to be verified is not tampered with.
The device 30 for experimental evidence of this embodiment according to the present invention is described referring to Fig. 3.Fig. 3 is aobvious
The device 30 for experimental evidence shown is only an example, should not function to the embodiment of the present invention and use scope bring
Any restrictions.
As shown in figure 3, the device 30 for experimental evidence is showed in the form of universal computing device.For experimental evidence
The component of device 30 can include but is not limited to:At least one above-mentioned processing unit 16, connects at least one above-mentioned storage unit 28
Connect the bus 18 of different system components (including storage unit 28 and processing unit 16).
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.
Storage unit 28 may include the readable medium of form of volatile memory, such as random access memory (RAM)
31 and/or cache memory 32, it can also further read-only memory (ROM) 34.
Storage unit 28 can also include program/utility 41 with one group of (at least one) program module 42, this
The program module 42 of sample includes but is not limited to:Operating system, one or more application program, other program modules and program
It may include the realization of network environment in data, each of these examples or certain combination.
Device 30 for experimental evidence can also be with one or more external equipments 14 (such as keyboard, sensing equipment, indigo plant
Tooth equipment etc.) communication, the equipment interacted with the device 30 for being used for experimental evidence can be also enabled a user to one or more
Communication, and/or appoint with enabling this to be used for the device 30 of experimental evidence with what one or more of the other calculating equipment was communicated
What equipment (such as router, modem etc.) communication.This communication can by input/output (I/O) interface 22 into
Row.Also, network adapter 21 and one or more network (such as local can also be passed through for the device 30 of experimental evidence
Net (LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown, network adapter 21 passes through always
Line 18 is communicated with other modules of the device 30 for experimental evidence.It should be understood that being used for although not shown in the drawings, can combine
The device 30 of experimental evidence uses other hardware and/or software module, including but not limited to:Microcode, device driver, redundancy
Processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Exemplary process product
In some possible embodiments, various aspects of the invention are also implemented as a kind of shape of program product
Formula comprising program code, when described program product is run in equipment, said program code is for executing the equipment
The verifying that is used for of various illustrative embodiments is demonstrate,proved according to the present invention described in above-mentioned " illustrative methods " part of this specification
According to method in step, for example, the equipment can execute step 100 as shown in fig. 1:Calculate it is relevant to contract to
First cryptographic Hash of experimental evidence;Step 110:The first original cryptographic Hash of the evidence to be verified is obtained from the contract,
And the first cryptographic Hash being calculated is matched with the described first original cryptographic Hash;Step 120:When first be calculated
When cryptographic Hash and first original Hash values match success, determine that the evidence to be verified is not tampered with.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example may be-but not limited to-electricity, magnetic, optical, electromagnetic, red
The system of outside line or semiconductor, device or device, or any above combination.The more specific example of readable storage medium storing program for executing
(non exhaustive list) includes:Electrical connection, portable disc with one or more conducting wires, hard disk, random access memory
(RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc
Read memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
It, can be with as shown in figure 4, describe the program product 40 for experimental evidence of embodiment according to the present invention
Using portable compact disc read only memory (CD-ROM) and including program code, and can be in terminal device, such as personal electricity
It is run on brain.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing, which can be, any includes
Or the tangible medium of storage program, which can be commanded execution system, device or device use or in connection make
With.
Readable signal medium may include in a base band or as the data-signal that carrier wave a part is propagated, wherein carrying
Readable program code.The data-signal of this propagation can take various forms, including --- but being not limited to --- electromagnetism letter
Number, optical signal or above-mentioned any appropriate combination.Readable signal medium can also be other than readable storage medium storing program for executing it is any can
Read medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or
Program in connection.
The program code for including on readable medium can transmit with any suitable medium, including --- but being not limited to ---
Wirelessly, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind --- including local area network (LAN) or extensively
Domain net (WAN)-be connected to user calculating equipment, or, it may be connected to external computing device (such as utilize Internet service
Provider is connected by internet).
If it should be noted that although being referred to the equipment for drying or son dress of the equipment for experimental evidence in the above detailed description
It sets, but this division is only not enforceable.In fact, embodiment according to the present invention, above-described two or
The feature and function of more devices can embody in one apparatus.Conversely, the feature and function of an above-described device
It can be able to be to be embodied by multiple devices with further division.
In addition, although describing the operation of the method for the present invention in the accompanying drawings with particular order, this do not require that or
Hint must execute these operations in this particular order, or have to carry out shown in whole operation be just able to achieve it is desired
As a result.Additionally or alternatively, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/or by one
Step is decomposed into execution of multiple steps.
Although detailed description of the preferred embodimentsthe spirit and principles of the present invention are described by reference to several, it should be appreciated that, this
It is not limited to the specific embodiments disclosed for invention, does not also mean that the feature in these aspects cannot to the division of various aspects
Combination is benefited to carry out, this to divide the convenience merely to statement.The present invention is directed to cover appended claims spirit and
Included various modifications and equivalent arrangements in range.
Claims (10)
1. a kind of method of experimental evidence, including:
Calculate the first cryptographic Hash of evidence to be verified relevant to contract;
Obtain the first original cryptographic Hash of the evidence to be verified from the contract, and by the first cryptographic Hash being calculated with
The first original cryptographic Hash is matched;
When the first cryptographic Hash being calculated and first original Hash values match success, the evidence to be verified is determined not
It is tampered.
2. the method as described in claim 1, by the first cryptographic Hash being calculated and the described first original cryptographic Hash progress
With before, including:
Described first original cryptographic Hash is added in the contract.
3. the described first original cryptographic Hash is added in the contract by method according to claim 2, including:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
4. the method according to claim 1, the format of the evidence to be verified is document, picture, audio and view
At least one of frequency.
5. the method as described in claim 1, by the first cryptographic Hash being calculated and the described first original cryptographic Hash progress
Match, including:
Judge whether the contract is tampered;
When determining that the contract is not tampered with, by the first cryptographic Hash being calculated and the described first original cryptographic Hash progress
Match.
6. method as claimed in claim 5, judges whether the contract is tampered, including:
Calculate the second cryptographic Hash of the contract;
Judge whether the second cryptographic Hash being calculated matches with the second original cryptographic Hash of the contract;
Determine that the contract is not tampered with, including:
When the second cryptographic Hash and the second original Hash values match that are calculated described in judgement, determine that the contract is not usurped
Change.
7. a kind of device of experimental evidence, including:
Computing unit, for calculating the first cryptographic Hash of evidence to be verified relevant to contract;
Matching unit for obtaining the first original cryptographic Hash of the evidence to be verified from the contract, and will be calculated
The first cryptographic Hash matched with the described first original cryptographic Hash;
Determination unit, for determining institute when the first cryptographic Hash being calculated and first original Hash values match success
Evidence to be verified is stated to be not tampered with.
8. device as claimed in claim 7 further includes adding unit, described for the described first original cryptographic Hash to be added to
In contract.
9. device as claimed in claim 8, the described first original cryptographic Hash is added in the contract by the adding unit,
Including:
The described first original cryptographic Hash is added in the contract in the form of attachment Document Editing function.
10. the format of the evidence to be verified is document, picture, audio and view such as the described in any item devices of claim 7-9
At least one of frequency.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810634929.8A CN108921552B (en) | 2018-06-15 | 2018-06-15 | Evidence verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810634929.8A CN108921552B (en) | 2018-06-15 | 2018-06-15 | Evidence verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108921552A true CN108921552A (en) | 2018-11-30 |
CN108921552B CN108921552B (en) | 2021-08-27 |
Family
ID=64421480
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810634929.8A Active CN108921552B (en) | 2018-06-15 | 2018-06-15 | Evidence verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108921552B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109756485A (en) * | 2018-12-14 | 2019-05-14 | 平安科技(深圳)有限公司 | Electronic contract signs method, apparatus, computer equipment and storage medium |
CN110084072A (en) * | 2019-04-30 | 2019-08-02 | 北京智签科技有限公司 | A kind of electronic contract online verification method based on block chain network |
CN111934851A (en) * | 2020-07-26 | 2020-11-13 | 中国人民解放军93209部队 | Flight plan verification method and device based on Hash algorithm |
WO2021012499A1 (en) * | 2019-07-23 | 2021-01-28 | 平安科技(深圳)有限公司 | File comparison method and apparatus, computer device and storage medium |
CN113343313A (en) * | 2021-06-30 | 2021-09-03 | 中金金融认证中心有限公司 | Verification report validity identification method, legal service system and readable storage medium |
CN113378234A (en) * | 2021-05-27 | 2021-09-10 | 浙江贝才之神网络科技有限公司 | Data tampering detection method, system, computer device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103514410A (en) * | 2013-09-30 | 2014-01-15 | 上海市数字证书认证中心有限公司 | Dependable preservation and evidence collection system and method for electronic contract |
CN104166936A (en) * | 2014-08-14 | 2014-11-26 | 江苏买卖网电子商务有限公司 | Electronic contract storage and validation method |
US20160094345A1 (en) * | 2014-09-28 | 2016-03-31 | Emc Corporation | Generating a qr code |
CN107316182A (en) * | 2017-06-30 | 2017-11-03 | 福建亿榕信息技术有限公司 | A kind of generation method of electronic contract chain of evidence and generation system |
-
2018
- 2018-06-15 CN CN201810634929.8A patent/CN108921552B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103514410A (en) * | 2013-09-30 | 2014-01-15 | 上海市数字证书认证中心有限公司 | Dependable preservation and evidence collection system and method for electronic contract |
CN104166936A (en) * | 2014-08-14 | 2014-11-26 | 江苏买卖网电子商务有限公司 | Electronic contract storage and validation method |
US20160094345A1 (en) * | 2014-09-28 | 2016-03-31 | Emc Corporation | Generating a qr code |
CN107316182A (en) * | 2017-06-30 | 2017-11-03 | 福建亿榕信息技术有限公司 | A kind of generation method of electronic contract chain of evidence and generation system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109756485A (en) * | 2018-12-14 | 2019-05-14 | 平安科技(深圳)有限公司 | Electronic contract signs method, apparatus, computer equipment and storage medium |
CN109756485B (en) * | 2018-12-14 | 2022-11-18 | 平安科技(深圳)有限公司 | Electronic contract signing method, electronic contract signing device, computer equipment and storage medium |
CN110084072A (en) * | 2019-04-30 | 2019-08-02 | 北京智签科技有限公司 | A kind of electronic contract online verification method based on block chain network |
WO2021012499A1 (en) * | 2019-07-23 | 2021-01-28 | 平安科技(深圳)有限公司 | File comparison method and apparatus, computer device and storage medium |
CN111934851A (en) * | 2020-07-26 | 2020-11-13 | 中国人民解放军93209部队 | Flight plan verification method and device based on Hash algorithm |
CN113378234A (en) * | 2021-05-27 | 2021-09-10 | 浙江贝才之神网络科技有限公司 | Data tampering detection method, system, computer device and storage medium |
CN113343313A (en) * | 2021-06-30 | 2021-09-03 | 中金金融认证中心有限公司 | Verification report validity identification method, legal service system and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108921552B (en) | 2021-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108921552A (en) | A kind of method and device of experimental evidence | |
CN107886306B (en) | File approval method, medium, device and computing equipment | |
US9542461B2 (en) | Enhancing performance of extract, transform, and load (ETL) jobs | |
WO2022007438A1 (en) | Emotional voice data conversion method, apparatus, computer device, and storage medium | |
CN110825363B (en) | Intelligent contract acquisition method and device, electronic equipment and storage medium | |
CN112256275B (en) | Code confusion method, device, electronic equipment and medium | |
CN112417178B (en) | Document template definition-based on-chain contract processing method and device and electronic equipment | |
CN111198945A (en) | Data processing method, device, medium and electronic equipment | |
CN111161085B (en) | Service request processing method, device, electronic equipment and computer readable medium | |
CN109947431A (en) | A kind of code generating method, device, equipment and storage medium | |
WO2021196935A1 (en) | Data checking method and apparatus, electronic device, and storage medium | |
CN109901987A (en) | A kind of method and apparatus generating test data | |
CN105556533A (en) | Automatically generating certification documents | |
CN113806794A (en) | Processing method and device for electronic signature of file, computer equipment and storage medium | |
CN109769010A (en) | Method, apparatus, equipment and storage medium based on SDK access CloudStack server | |
CN112966304B (en) | Tamper-proof method and device for flow document, computer equipment and medium | |
US20150120682A1 (en) | Automated recognition of patterns in a log file having unknown grammar | |
CN107193249A (en) | Program development servicing unit and program development householder method | |
CN110545542A (en) | Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment | |
CN109636460A (en) | A kind of method for processing business, device, equipment and storage medium | |
CN113283222A (en) | Automatic report generation method and device, computer equipment and storage medium | |
CN110457318A (en) | The update method of data field, device, medium, electronic equipment in block chain | |
CN115130130A (en) | Network disk file unlocking method and device, network disk and storage medium | |
CN114218166A (en) | Data processing method and device, electronic equipment and readable storage medium | |
CN112036775A (en) | Resource access classification authorization method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |