CN110084032B - Time stamp, time verification, data processing method, apparatus, medium - Google Patents

Time stamp, time verification, data processing method, apparatus, medium Download PDF

Info

Publication number
CN110084032B
CN110084032B CN201810079307.3A CN201810079307A CN110084032B CN 110084032 B CN110084032 B CN 110084032B CN 201810079307 A CN201810079307 A CN 201810079307A CN 110084032 B CN110084032 B CN 110084032B
Authority
CN
China
Prior art keywords
current time
time
data object
data
generated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810079307.3A
Other languages
Chinese (zh)
Other versions
CN110084032A (en
Inventor
王康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810079307.3A priority Critical patent/CN110084032B/en
Publication of CN110084032A publication Critical patent/CN110084032A/en
Application granted granted Critical
Publication of CN110084032B publication Critical patent/CN110084032B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a time marking method. The method comprises the following steps: the method comprises the steps of obtaining a first current time, marking a data object by adopting the first current time, obtaining a second current time generated for the data object, marking the data object by adopting the second current time, finishing time marking of the data object, obtaining the first current time and the second current time of the data object, comparing whether the first current time and the second current time are consistent, finishing time verification, proving whether the data object is generated between the first current time and the second current time, overcoming the problem that the generation time of the data object cannot be proved, avoiding the problem of high storage cost caused by centralized storage of the data object, and avoiding the risk that user data is easy to leak.

Description

Time stamp, time verification, data processing method, apparatus, medium
Technical Field
The present application relates to the field of data processing technology, and in particular, to a time stamping method, a time verification method, a data processing method, a computer device, and a computer readable storage medium.
Background
Disputes are difficult to avoid in electronic commerce transactions, and electronic commerce platforms are very strict in dispute handling. It is generally required that the purchaser take a photograph of the goods after receiving the goods to obtain evidence, and the photograph is taken as an important evidence, and the moment of taking the photograph becomes very important.
The applicant has found through research that the creation time of photos, documents, videos, etc. may be tampered with, and the authenticity cannot be verified. And the evidence is uploaded to a trusted third party notarization storage and is kept, so that the problem of high storage cost exists, and the risk of leakage of user data exists.
Disclosure of Invention
The present application has been made in view of the above problems, and has as its object to provide a time stamping method, a time verification method, a data processing method, and a computer device, a computer readable storage medium, which overcome or at least partially solve the above problems.
According to one aspect of the present application, there is provided a time stamping method comprising:
acquiring a first current time and marking a data object by adopting the first current time;
and acquiring a second current time generated for the data object, and marking the data object with the second current time.
Optionally, the acquiring the first current time includes:
and acquiring a random number representing the first current time from a cloud server, wherein the random number is generated according to the first current time of the cloud server.
Optionally, the obtaining the second current time generated for the data object includes:
acquiring a second current time set for the data object;
and carrying out accuracy check on the second current time and determining that the check passes.
Optionally, the performing the accuracy check on the second current time includes:
uploading the second current time to a cloud server;
and receiving feedback information which is obtained by the cloud server and passes the accuracy check on the second current time according to the local time.
Optionally, the feedback message includes authentication information generated according to the second current time, and after the checking of accuracy of the second current time, the method further includes:
and correspondingly storing the authentication information and the data object to determine that the second current time is subjected to accuracy verification according to the authentication information.
Optionally, said employing said first current time stamp data object comprises at least one of:
Adding the first current time to attribute information of the data object;
adding the first current time to the display content corresponding to the data object;
record data comprising the first current time and the data object is generated.
Optionally, said marking said data object with said second current time stamp includes at least one of:
adding the second current time to attribute information of the data object;
and adding the second current time to the display content corresponding to the data object.
Optionally, the method further comprises:
and acquiring the data object generated in real time.
Optionally, the acquiring the instantly generated data object includes:
the data object is acquired and it is confirmed that the data object originates from the set data object generation program.
According to another aspect of the present application, there is provided a time stamping method comprising:
generating a first current time and transmitting the first current time to a client for the client to adopt the first current time marking data object;
and receiving a second current time generated by the client for the data object, performing accuracy check on the second current time, and feeding back a feedback message, so that the client marks the data object according to the second current time passing the check.
According to another aspect of the present application, there is provided a time stamping method comprising:
generating a first current time and transmitting the first current time to a client for the client to adopt the first current time marking data object;
generating a second current time and marking the data object with the second current time.
According to another aspect of the present application, there is provided a time verification method, including:
acquiring a first current time and a second current time of a data object, wherein the first current time is marked to the data object after acquisition, and the second current time is generated for the data object and marked to the data object;
and comparing whether the first current time and the second current time are consistent.
Optionally, the acquiring the first current time and the second current time of the data object includes:
the first current time and the second current time are obtained from associated content of the data object, wherein the associated content comprises at least one of attribute information of the data object, display content corresponding to the data object and record data.
Optionally, before the acquiring the first current time and the second current time from the associated content of the data object, the acquiring the first current time and the second current time of the data object further includes:
And determining that the associated content accords with the set content format rule.
Optionally, the acquiring the first current time and the second current time of the data object includes:
a first current time and a second current time submitted for the data object are received.
Optionally, the acquiring the first current time and the second current time of the data object includes:
receiving a first current time submitted for the data object;
and searching a second current time recorded by the cloud server aiming at the data object.
Optionally, the comparing whether the first current time and the second current time are consistent includes:
and comparing whether the difference value between the first current time and the second current time is in a set range or not.
Optionally, the acquiring the first current time of the data object includes:
a random number characterizing the first current time is obtained.
Optionally, the comparing whether the first current time and the second current time are consistent includes:
generating a random number corresponding to the second current time according to the second current time and a random number generation rule;
and determining whether the first current time is consistent with the second current time according to whether the random number representing the first current time is consistent with the random number corresponding to the second current time.
Optionally, the comparing whether the first current time and the second current time are consistent includes:
and sending the first current time and the second current time to a cloud server so as to carry out consistency verification by the cloud server.
Optionally, before said comparing whether the first current time and the second current time coincide, the method further comprises:
and carrying out accuracy check on the second current time.
Optionally, the performing the accuracy check on the second current time includes:
the second current time is sent to a cloud server;
and if a verification result which is fed back by the cloud server and has passed the accuracy verification is received, confirming that the second current time has accuracy.
Optionally, the performing the accuracy check on the second current time includes:
searching authentication information corresponding to the data object, wherein the authentication information is generated after the cloud server performs accuracy check on the second current time;
and if the authentication information is judged to be legal, confirming that the second current time has accuracy.
According to another aspect of the present application, there is provided a data processing method, comprising:
Receiving commit data, wherein the commit data includes first time data;
generating second time data for the submitted data according to the receiving time;
and if the first time data is smaller than the second time data and the time period between the first time data and the second time data meets a preset condition, determining that the submitted data is valid data.
Optionally, determining that the time period meets the preset condition includes:
if the time period is less than a first preset threshold.
Optionally, the method further comprises:
storing the commit data and the second time data.
According to another aspect of the present application, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements a method of one or more of the above when executing the computer program.
According to another aspect of the present application there is provided a computer readable storage medium having stored thereon a computer program, characterized in that the program when executed by a processor implements a method as described above for one or more.
According to the embodiment of the application, the first current time is acquired, the first current time is adopted to mark the data object, the second current time generated for the data object is acquired, the second current time is adopted to mark the data object, the time marking of the data object is completed, then the first current time and the second current time of the data object are acquired, whether the first current time and the second current time are consistent or not is compared, the time verification is completed, whether the data object is generated between the first current time and the second current time or not can be proved, the problem that the generation time of the data object cannot be proved is solved, the problem of high storage cost caused by centralized storage of the data object is avoided, and the risk that the user data is easy to leak is avoided.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
FIG. 1 shows a schematic diagram of a time stamping process;
FIG. 2 shows a schematic diagram of another time stamping process;
FIG. 3 shows a schematic diagram of a time validation process;
FIG. 4 shows a schematic diagram of a time stamp of a data object;
FIG. 5 illustrates a schematic diagram of time validation of a data object;
FIG. 6 shows a flowchart of one embodiment of a time stamping method according to one embodiment of the present application;
FIG. 7 shows a flowchart of an embodiment of a time stamping method according to a second embodiment of the present application;
FIG. 8 shows a flowchart of one time stamping method embodiment according to a third embodiment of the present application;
FIG. 9 shows a flowchart of one time stamping method embodiment according to a fourth embodiment of the present application;
FIG. 10 is a flow chart of an embodiment of a time validation method according to a fifth embodiment of the present application;
FIG. 11 is a flowchart showing an embodiment of a data processing method according to a sixth embodiment of the present application;
FIG. 12 shows a block diagram of an embodiment of a time stamping apparatus according to a seventh embodiment of the present application;
FIG. 13 shows a block diagram of an embodiment of a time stamping device according to an eighth embodiment of the present application;
FIG. 14 shows a block diagram of an embodiment of a time stamping apparatus according to a ninth embodiment of the present application;
FIG. 15 shows a block diagram of an embodiment of a time verification device according to an embodiment ten of the application;
FIG. 16 is a block diagram illustrating an embodiment of a data processing apparatus according to an eleventh embodiment of the present application;
FIG. 17 illustrates an exemplary system that can be used to implement various embodiments described in this disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
For a better understanding of the present application, the following description is given to illustrate the concepts related to the present application to those skilled in the art:
the data objects, for example, include at least photographs, documents, videos, etc., or any other suitable form, to which embodiments of the application are not limited. For example, photographs taken of the merchandise after receipt. The data object may be in any suitable file format, for example, an image file format EXIF (Exchangeable Image File ), where the EXIF file contains metadata specifically tailored for the digital photo, and may record shooting parameters, thumbnail images, and other attribute information of the digital photo.
The time for marking the data object is noted as a first current time and a second current time.
The first current time includes a first current time represented by data obtained from a cloud server, a first current time represented by public newspaper, a first current time represented by a color number in a lottery, a first current time represented by a stock price within 30 seconds of a marketing company or a stock index, or the like, or other unpredictable but retrospective applicable public information may represent the first current time, which is not limited in this embodiment of the present application. The first current time may be used to prove that the data object was generated after the first current time, e.g., a group of merchandise together with a newspaper published on day 15 of 2017 may prove that the photograph was taken on or after day 15 of 2017 12.
The second current time includes a time verified by the cloud server, a time of the cloud server, or other time generated for the data object, which is not limited in the embodiment of the present application. The second current time may be used to prove that the data object was generated before the second current time, for example, uploading a Hash value of the photo file to a cloud server, submitting the alleged photo generation time 2017, 12, 15, 12, and the cloud server verifies that the alleged time is not more than 30 seconds away from the cloud server, and takes the alleged time as the second current time, which may prove that the photo was taken at or before 2017, 12, 15, 12.
In One embodiment of the present application, optionally, the first current Time may be characterized by a random number obtained from the cloud server, and the random number may be generated according to the first current Time of the cloud server, for example, a TOTP (Time-Based One-Time Password, also called a Time-synchronized dynamic Password) is a random number that may characterize the Time. The TOTP value may be calculated using the TOTP algorithm based on a time-based parameter, a key, and a random number, where the TOTP value is also a random number.
In one embodiment of the application, optionally, a second current time is set for the data object, and an accuracy check is required for the second current time. The accuracy check is a process of comparing the second current time with the known verifiable time point, if the time difference between the second current time and the known verifiable time point is within a set range, determining that the check passes, otherwise, determining that the check fails.
In an embodiment of the present application, optionally, when the accuracy check is performed on the second current time, the second current time may be uploaded to the cloud server, and after the accuracy check is performed on the second current time by the cloud server according to the local time of the server, a feedback message is returned to the client, where the feedback message includes a result of whether the check is passed.
In one embodiment of the present application, the feedback message optionally includes authentication information generated according to the second current time, the authentication information including a digital certificate or digital signature, or any other suitable information, and the embodiment of the present application is not limited in this respect. For example, uploading the Hash value of the photo file and the set second current time to a cloud server, signing the Hash value and the second current time by using a private key, obtaining a digital signature, returning the digital signature to a client, and storing the digital signature in a file name of the photo file by the client.
In one embodiment of the present application, optionally, the first current time may be added to attribute information of the data object, or added to the presentation content corresponding to the data object, or record data including the first current time and the data object is generated, or any other applicable manner, which is not limited in this embodiment of the present application. And recording at least one of attribute information of the data object, display content corresponding to the data object and record data as associated content of the data object.
The attribute information of the data object may be attached to the data object file, including information about the photographing device, information about the image processing software, or any other applicable information, which is not limited in the embodiment of the present application. For example EXIF information. The presentation content of the data object may include a watermark, an image, etc. on a photograph, or any other suitable content, and embodiments of the present application are not limited in this respect. The record data includes data generated based on the first current time and the data object, and may include any suitable data format, which is not limited in this embodiment of the present application.
In one embodiment of the present application, optionally, in performing the time verification, acquiring the first current time and the second current time of the data object further includes determining that the associated content complies with a set content format rule. The content format rules include content rules and/or format rules set for attribute information, presentation content, record data, such as the number of watermarks, positions of watermarks, etc., or any other applicable content format rules, which the embodiments of the present application do not limit.
In one embodiment of the present application, the acquired data object may optionally need to be confirmed to originate from a set data object generation program, for example, a shopping application program providing a photographing portal or a video portal, a payment application program, or any other applicable program, which the embodiment of the present application is not limited to.
In an embodiment of the present application, optionally, the second current time may also be represented by a random number, specifically, a corresponding random number may be generated according to the second current time and a random number generation rule, and when time verification is performed, whether the first current time and the second current time are consistent is determined according to whether the random number representing the first current time is consistent with the random number corresponding to the second current time.
The time stamp and time verification process of the photo file will be described as an example.
A schematic of a time stamping process is shown in fig. 1.
Step 11, a user (e.g., a buyer) takes a photograph, e.g., a purchased item is photographed after receiving the goods. And initiates a time notarization request.
In step 12, the client requests to obtain the TOTP value at this time through a trusted channel (e.g., HTTP channel HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer, hypertext transfer protocol over secure socket layer) targeted for security).
In step 13, the time event notarizer calculates the TOTP value, i.e., the random number characterizing the first current time, based on the key k and the time at the local time (i.e., the first current time). And reach the client with the TOTP value (i.e., random number).
In step 14, the client appends the TOTP value to EXIF information of the photo file, and optionally, generating a watermark of a random number in the photo, or putting the TOTP value and the photo together to perform group photo, so as to complete marking of the photo file with the first current time and obtain a new photo file.
Step 15, calculating the Hash value of the photo file with the TOTP value attached. And uploading the timestamp t and the Hash value to a time event notarization party.
An alternative way may be to include the step 16 of the user entering the purported timestamp t of the photo file (i.e. the second current time) before calculating the Hash value, attaching the timestamp t to the EXIF information of the photo file, or generating a watermark of the timestamp t in the photo, after which the Hash value of the photo file is calculated.
And step 17, the time event notarizing party performs accuracy check on the time stamp t. And if the verification is passed, correspondingly recording the Hash value and the timestamp t of the photo file in a public third party database (for example, a database of a public log or a log alliance) for verification, and finishing marking the photo file by adopting the second current time.
A schematic of another time stamping process is shown in fig. 2.
Step 21, the user takes a picture and initiates a time notarization request.
In step 22, the client requests to obtain the TOTP value at this time through a trusted channel. After the time event notarization party receives the request, the time event notarization party acquires the TOTP key k with the use validity period of the same day.
In step 23, the time event notarizer calculates the TOTP value, i.e., the random number characterizing the first current time, based on the key k and the time at the local time. And reach the client with the value of TOTP.
In step 24, the client appends the TOTP value to EXIF information of the photo file, and optionally, generating a watermark of a random number in the photo, or putting the TOTP value and the photo together to perform group photo, so as to complete marking of the photo file with the first current time and obtain a new photo file.
Step 25, calculating the Hash value of the photo file to which the TOTP value is added. And uploading the timestamp t and the Hash value to a time event notarization party.
An alternative way may be to include the step 26 of the user entering the purported timestamp t of the photo file, appending the timestamp t to the EXIF information of the photo file, or generating a watermark of the timestamp t in the photo before calculating the Hash value, after which the Hash value of the photo file is calculated.
And step 27, the time event notarizing party performs accuracy check on the time stamp t. If, unlike step 17, the verification passes, the Hash value and the timestamp t are signed with a private key. And returning the signature result to the client.
And 28, the client stores the signature result in the file name of the photo file, and marks the photo file by adopting the second current time.
A schematic diagram of the time verification process is shown in fig. 3.
At step 31, the prover (e.g., buyer) of the data object submits a photo file with attached TOTP value characterizing the first current time to a verifier (e.g., seller) with a timestamp t.
In step 32, the verifier extracts the TOTP value from the photo file, for example, the TOTP value from EXIF information, and optionally further includes step 33, of first confirming that there is and only one group of watermarks in the photo, then extracting the TOTP value in the photo, and comparing the value with the TOTP value submitted by the prover. If the time stamp t is also added to the photo file, step 34 may be included to extract the time stamp t from the photo and compare it with the time stamp t submitted by the prover.
In step 35, a Hash value of the photo file is calculated, and the verifier submits a verification request on the client, wherein the request carries the Hash value, the TOTP value and the timestamp t of the photo file.
In step 36, the client submits a time verification request to the time event notarizer, where the request carries the Hash value, the TOTP value and the timestamp t of the photo file.
After the time event notarizer receives the request, in step 37, in one implementation, it is checked in the third party database whether the Hash value and the timestamp t of the photo file are present.
If it is confirmed that there is a corresponding record, the TOTP value of the time stamp t is calculated, step 38.
Step 39, determining whether the TOTP value of the timestamp t is consistent with the TOTP value representing the first current time, so as to complete time verification.
It should be noted that, in another implementation manner, if the signature result characterizing the timestamp t can be obtained from the signature result by using the public key, the timestamp t is determined to be checked for accuracy by the cloud server during the time stamping, and then the time verification is completed according to whether the TOTP value of the timestamp t is consistent with the TOTP value characterizing the first current time.
According to one embodiment of the application, both parties to a transaction need to convince proof of the time of generation of the data object as evidence when generating a transaction dispute. The application provides a time marking and time verification mechanism, such as a time marking schematic diagram of a data object shown in fig. 4 and a time verification schematic diagram of the data object shown in fig. 5, wherein the process can be applied to a security service platform formed by a client and a cloud server, the security service platform can acquire a first current time, adopts the first current time marking data object to acquire a second current time generated for the data object, adopts the second current time marking data object to finish time marking of the data object, acquires the first current time and the second current time of the data object, compares whether the first current time and the second current time are consistent or not to finish time verification, can prove whether the data object is generated between the first current time and the second current time, overcomes the problem that the generation time of the data object cannot be proved, avoids the problem of high storage cost caused by centralized storage of the data object, and the risk that user data is easy to leak. The application is applicable but not limited to the above application scenario.
Referring to fig. 6, a flowchart of an embodiment of a time stamping method according to a first embodiment of the present application is shown, and the method may specifically include the steps of:
step 101, obtaining a first current time, and marking a data object by adopting the first current time.
In the embodiment of the present application, in order to mark the generation time of the data object, the first current time needs to be acquired. The manner of obtaining the first current time may include directly obtaining the first current time from the cloud server, or obtaining data that may represent the first current time, or any other applicable manner, which is not limited in this embodiment of the present application.
In the embodiment of the present application, the marking the data object with the first current time includes adding the first current time to attribute information of the data object, or adding the first current time to display content corresponding to the data object, or generating record data including the first current time and the data object, or any other suitable marking manner, which is not limited in this embodiment of the present application. Since there is a possibility that the data object is generated after the first current time is acquired, it can be proved that the data object is generated at the first current time or at a time after the first current time by marking the data object with the first current time, even though the real generation time of the data object is before the first current time, it cannot be proved.
Step 102, obtaining a second current time generated for the data object, and marking the data object with the second current time.
In the embodiment of the present application, the second current time is generated for the data object, so the data object needs to be generated first to obtain the second current time, that is, the generation time of the data object is earlier than the second current time.
In one implementation, the second current time may be set for the data object, and then the accuracy of the set time is checked, and the time after the verification is passed, that is, the second current time, is determined, otherwise, the set time is invalid. In another implementation manner, the second current time may be a local time of the cloud server, and after the Hash value of the data object is uploaded to the cloud server, the cloud server returns the local time, that is, the second current time.
In the embodiment of the present application, the step of marking the data object with the second current time includes adding the second current time to attribute information of the data object, or adding the second current time to display content corresponding to the data object, or any other suitable marking method, which is not limited in the embodiment of the present application.
According to the embodiment of the application, the first current time is acquired, the first current time is adopted to mark the data object, the second current time generated for the data object is acquired, the second current time is adopted to mark the data object, and the time marked can be used for proving whether the data object is generated between the first current time and the second current time, so that the problem that the generation time of the data object cannot be demonstrated is solved, the problem of high storage cost caused by centralized storage of the data object is avoided, and the risk that the user data is easy to leak is avoided.
Referring to fig. 7, a flowchart of an embodiment of a time stamping method according to a second embodiment of the present application is shown, and the method may specifically include the following steps:
in step 201, an instantaneously generated data object is acquired.
In the embodiment of the application, when the time of the data object is marked on the client, the data object is required to be generated in real time, and the first current time is acquired immediately after the data object generated in real time is acquired, so that the problem that the first current time is acquired after the data object is generated for a long time is avoided, the data object is marked, and the problem that the actual generation time of the data object is earlier than the first current time by more than the set time is solved.
In one embodiment of the present application, optionally, one implementation of obtaining the instantly generated data object comprises: the data object is acquired and it is confirmed that the data object originates from the set data object generation program.
The data object carries an identifier or a user name of a program generating the data object and a corresponding password thereof, and the like, and whether the data object is derived from a set data object generating program is judged according to the identifier or the user name of the program and the corresponding password thereof, and the set data object generating program comprises at least one trusted data object generating program, such as a shopping application program or a payment application program which only provides a photo shooting entrance but does not provide an album entrance. It is determined that the data object originates from the set data object generation program, i.e. it is determined that the data object is generated instantaneously.
Step 202, obtaining a random number representing a first current time from a cloud server, and marking a data object with the first current time.
In the embodiment of the application, the client can acquire the random number from the cloud server, and the random number is generated according to the first current time of the cloud server, namely the random number can represent the first current time.
For example, the cloud server generates a random number representing the time from a key string and a number generated based on the current local time using the TOTP algorithm, and the random number is used to represent the first current time.
In one embodiment of the present application, optionally, the implementation of employing the first current time stamp data object includes at least one of:
adding the first current time to attribute information of the data object;
adding the first current time to the display content corresponding to the data object;
record data comprising the first current time and the data object is generated.
Adding the first current time to the attribute information of the data object may include directly adding the first current time to the attribute information, or adding a random number characterizing the first current time to the attribute information, or any other suitable adding manner, which is not limited in this embodiment of the present application. For example, a random number characterizing the first current time is added to EXIF information of the photograph.
The step of adding the first current time to the display content corresponding to the data object includes generating a watermark of the first current time or a random number representing the first current time on the display content of the data object, or adding public information capable of representing the first current time to the display content, or any other applicable adding manner, which is not limited in this embodiment of the present application. For example, a watermark of the TOTP value of the first current time is added to the photographed photo, or a real-time trend chart of stocks of a marketing company is photographed into the photo at the time of photographing.
Generating the logging data comprising the first current time and the data object comprises bringing together the first current time or the random number characterizing the first current time and the data of the data object itself to form a new file, i.e. the logging data. Specifically, two kinds of data are placed into a file in a non-disordered order, or one kind of data can be added into the other kind of data according to a set algorithm, so that the order of the data is disordered. However, the generated record data can be subjected to the inverse process to obtain the original first current time and the original data object according to the mode of the generation.
Step 203, obtaining a second current time set for the data object.
In the embodiment of the application, the second current time can be obtained through the submitting entrance, and the input time of the submitting entrance is the set second current time.
And 204, performing accuracy check on the second current time and determining that the check passes.
In the embodiment of the application, since the authenticity of the set second current time is in doubt, the second current time needs to be checked for accuracy, only the second current time passing the verification is valid, otherwise, the set second current time is invalid.
In an embodiment of the present application, optionally, an implementation manner of the checking accuracy of the second current time may include: uploading the second current time to a cloud server; and receiving feedback information which is obtained by the cloud server and passes the accuracy check on the second current time according to the local time.
The local time of the cloud server can be considered to be accurate, the uploaded second current time is checked for accuracy according to the local time, the local time and the second current time are compared, if the difference value of the local time and the second current time is within a set difference value range, the check is passed, and otherwise, the check is not passed. The cloud server sends the feedback message to the client, and the client receives the verification structure sent by the cloud server and confirms whether the accuracy verification of the second current time passes or not according to the feedback message.
In one implementation, when uploading the set second current time, the Hash value of the data object is also uploaded, and after the cloud server passes the verification, the Hash value of the data object and the second current time are correspondingly stored in the database, so that the record corresponding to the data object can be retrieved according to the Hash value through subsequent verification.
In one embodiment of the present application, optionally, the feedback message includes authentication information generated according to the second current time, and after the accuracy check is performed on the second current time, the method may further include: and correspondingly storing the authentication information and the data object to determine that the second current time passes through the accuracy check according to the authentication information.
If the accuracy check is performed on the second current time, after the check is passed, authentication information can be generated according to the second current time, so that the authentication information can characterize the second current time. The authentication information is stored in association with the data object, for example, in a file name of the data object. When time verification is carried out later, the cloud server does not need to store the second current time of the data object in the database, and can determine that the second current time is subjected to accuracy verification according to the authentication information, so that the storage cost caused by data storage is reduced.
Step 205, marking the data object with the second current time.
In one embodiment of the present application, optionally, the implementation of using the second current time stamp data object may include at least one of:
Adding the second current time to attribute information of the data object;
and adding the second current time into the display content corresponding to the data object.
The specific implementation of this step may be referred to the description in the foregoing embodiments, and will not be repeated here.
According to the embodiment of the application, the random number representing the first current time is obtained from the cloud server by obtaining the data object generated in real time, the first current time is adopted to mark the data object, the second current time set for the data object is obtained, the second current time is subjected to accuracy check and the check is confirmed to pass, the data object is marked by adopting the second current time, the time marked data object can be used for proving whether the data object is generated between the first current time and the second current time, the problem that the generation time of the data object cannot be demonstrated is solved, the problem of high storage cost caused by centralized storage of the data object is avoided, and the risk that the user data is easy to leak is avoided.
Referring to fig. 8, a flowchart of an embodiment of a time stamping method according to a third embodiment of the present application is shown, and the method may specifically include the steps of:
step 301, generating a first current time and transmitting the first current time to the client for the client to adopt the first current time-stamp data object.
In the embodiment of the application, the cloud server can generate the first current time or the random number representing the first current time and send the random number to the client.
Step 302, receiving a second current time generated by the client for the data object, performing accuracy check on the second current time, and feeding back a feedback message, so that the client marks the data object according to the second current time passing the check.
In the embodiment of the application, the second current time generated by the client for the data object needs to be subjected to accuracy check through the cloud server, the second current time is received, the accuracy check is performed, and then a feedback message is fed back for the client. If the verification passes, the client may employ the second current time-stamped data object that passed the verification.
According to the embodiment of the application, the first current time is generated and issued to the client side, so that the client side marks the data object by adopting the first current time, the second current time generated by the client side aiming at the data object is received, the accuracy check is carried out on the second current time, and the feedback information is fed back, so that the client side marks the data object according to the second current time passing through the check, after the time marking, the client side can be used for proving whether the data object is generated between the first current time and the second current time, the problem that the generation time of the data object cannot be demonstrated is solved, the problem of high storage cost caused by centralized storage of the data object is avoided, and the risk that the user data is easy to leak is avoided.
Referring to fig. 9, a flowchart of an embodiment of a time stamping method according to a fourth embodiment of the present application is shown, and the method may specifically include the steps of:
step 401, generating a first current time and transmitting the first current time to the client, so that the client can use the first current time to mark the data object.
Step 402, generating a second current time, and marking the data object with the second current time.
In the embodiment of the application, the adoption of the second current time stamp data object can be performed in the cloud server, and the cloud server generates the second current time and adopts the second current time stamp data object. The specific implementation method comprises the following steps: after the client sends the unique identifier such as the Hash value of the data object to the cloud server, the cloud server correspondingly stores the unique identifier such as the Hash value of the data object and the second current time in the data, or the cloud server signs the unique identifier such as the Hash value of the data object and the second current time by using the private key to obtain a signature result, and returns the signature result to the client as a time stamp of the data object, or any other applicable marking mode.
According to the embodiment of the application, the first current time is generated and issued to the client side, so that the client side adopts the first current time to mark the data object, the second current time is generated, and the second current time is adopted to mark the data object, so that the time marked can be used for proving whether the data object is generated between the first current time and the second current time, the problem that the generation time of the data object cannot be demonstrated is solved, the problem of high storage cost caused by centralized storage of the data object is avoided, and the risk that the user data is easy to leak is avoided.
Referring to fig. 10, a flowchart of an embodiment of a time verification method according to a fifth embodiment of the present application is shown, and the method may specifically include the following steps:
step 501, a first current time and a second current time of a data object are obtained.
In an embodiment of the present application, a first current time is marked to the data object after acquisition, and a second current time is generated for the data object and marked to the data object.
In the embodiment of the present application, the manner in which the first current time is added to the associated content of the data object and the first current time is obtained may include obtaining the first current time from the associated content of the data object, or receiving the first current time submitted for the data object, or any other applicable manner, which is not limited in this embodiment of the present application.
In the embodiment of the present application, when the second current time is added to the associated content of the data object, the manner of obtaining the second current time may include obtaining the second current time from the associated content of the data object, or receiving the second current time submitted for the data object, or any other applicable manner, which is not limited in this embodiment of the present application.
In the embodiment of the present application, when the second current time is stored on the cloud server, the method of obtaining the second current time may include searching the second current time recorded by the cloud server for the data object, or any other applicable method, which is not limited in the embodiment of the present application.
In one embodiment of the present application, optionally, an implementation of the acquiring the first current time and the second current time of the data object may include: the first current time and the second current time are obtained from associated content of the data object. The associated content comprises at least one of attribute information of the data object, display content corresponding to the data object and record data. The first current time can be obtained by analyzing attribute information, or display content and recorded data, and the second current time can be obtained by analyzing attribute information, or display content.
In one embodiment of the present application, optionally, before the acquiring the first current time and the second current time from the associated content of the data object, the acquiring the first current time and the second current time of the data object further includes: and determining that the associated content accords with the set content format rule.
Before the first current time and the second current time are obtained from the associated content, the associated content needs to be determined to accord with the set content format rule, so that no other information is added in the associated content of the data object, and if the other information is added, the data object cannot be determined to be the marked data object. For example, when time marking, a digital watermark representing the first current time is generated in a photographed photo, a Hash value of the photo added with the watermark and the second current time are uploaded to a cloud server, the Hash value and the second current time are correspondingly stored in the cloud server, when time verification is performed, if the number of the watermarks in the photo exceeds one, the fact that the photo is newly added with the watermark is indicated, the Hash value of the photo added with the watermark cannot be calculated according to the photo, and therefore the time marking record of the photo cannot be found in the cloud server.
In one embodiment of the present application, optionally, an implementation of the acquiring the first current time and the second current time of the data object may include: a first current time and a second current time submitted for a data object are received.
The first current time and the second current time can be submitted for the data object, and a client is provided with a submitting inlet for the first current time and the second current time. For example, the watermark of the photo has a first current time and the file name of the photo has a second current time, and the first current time and the second current time are directly filled in the submitting entrance.
In one embodiment of the present application, optionally, an implementation of the acquiring the first current time and the second current time of the data object may include: and receiving the first current time submitted for the data object, and searching the second current time recorded by the cloud server for the data object.
And the second current time is stored in a cloud server or a third party database, and the data object is searched to obtain the recorded second current time. The cloud server receives the first current time uploaded by the client and unique identifiers such as Hash values of the data objects, and searches the second current time according to the unique identifiers such as the Hash values. Or the client receives the first current time on the submission at the submitting entrance and searches the second current time generated by the locally stored cloud server.
Step 502, comparing whether the first current time and the second current time are consistent.
In the embodiment of the application, the completion time verification needs to be compared with whether the first current time is consistent with the second current time, if so, the time verification is passed, and if not, the time verification is not passed. The comparison of whether the first current time and the second current time are consistent may be performed on the client, or may be performed on the server, or may be performed separately on the client and the server in multiple sub-steps, or may be performed in any other suitable manner, which is not limited in this embodiment of the present application.
If the first current time and the second current time are the same, or the difference value between the first current time and the second current time should be within a set range, the first current time and the second current time are confirmed to be consistent, otherwise, the first current time and the second current time are not consistent.
In the embodiment of the present application, the manner of comparing the first current time and the second current time may include directly comparing the first current time and the second current time, or comparing a random number representing the first current time and a random number representing the second current time, or any other applicable comparison method, which is not limited in this embodiment of the present application.
In an embodiment of the present application, optionally, an implementation of the comparing whether the first current time and the second current time are consistent may include: and comparing whether the difference value between the first current time and the second current time is in a set range. If the first current time is within the set range, the first current time is consistent with the second current time, otherwise, the first current time is inconsistent with the second current time.
In one embodiment of the present application, optionally, an implementation of the obtaining the first current time of the data object may include: the random number characterizing the first current time is obtained, in particular from the associated content of the data object.
In an embodiment of the present application, optionally, an implementation of the comparing whether the first current time and the second current time are consistent may include: generating a random number corresponding to the second current time according to the second current time and the random number generation rule; and determining whether the first current time is consistent with the second current time according to whether the random number representing the first current time is consistent with the random number corresponding to the second current time.
And generating a random number corresponding to the second current time according to the second current time and a random number generation rule, wherein the random number generation rule is the same as the generation rule for generating the random number representing the first current time. It is determined whether the first current time corresponds to the second current time based on the random number representing the first current time and the random number corresponding to the second current time.
In particular, the random number generation rule may be that the generated random number is constant within a set time range, for example, the random number generated according to time is changed every 60 seconds. Then if the random number characterizing the first current time is the same as the random number corresponding to the second current time, or if the random number characterizing the first current time differs from the random number corresponding to the second current time by no more than a set range, then determining that the first current time is consistent with the second current time, otherwise, not consistent.
In another implementation, the first current time may be generated based on a random number characterizing the first current time, and then a comparison of the first current time and the second current time may determine whether the first current time and the second current time are consistent.
In an embodiment of the present application, optionally, an implementation of the comparing whether the first current time and the second current time are consistent may include: and sending the first current time and the second current time to a cloud server so as to carry out consistency verification by the cloud server.
The client may send the first current time or the random number representing the first current time and the second current time or the random number corresponding to the second current time to the cloud server, so as to perform consistency verification by the cloud server.
In an embodiment of the present application, optionally, before the comparing whether the first current time and the second current time are consistent, the method may further include: and carrying out accuracy check on the second current time.
The accuracy of the obtained second current time needs to be checked, and the problem of forging the second current time consistent with the first current time to perform consistency verification is avoided. The accuracy of the second current time may be sent to the cloud server, and verified by the cloud server.
In an embodiment of the present application, optionally, an implementation manner of the checking accuracy of the second current time may include: the second current time is sent to a cloud server; and if a verification result which is fed back by the cloud server and has passed the accuracy verification is received, confirming that the second current time has accuracy.
And sending the second current time or the random number corresponding to the second current time to a cloud server, searching whether the record of the second current time or the random number corresponding to the second current time exists or not by the cloud server, feeding back a verification result with the record to the client, and if the record of the second current time is confirmed, confirming that the second current time has accuracy. For example, the client uploads the second current time and the Hash value of the data object to the cloud server, and the cloud server searches the database for the corresponding record of the second current time and the Hash value of the data object, and if the record exists, the cloud server indicates that the acquired second current time has accuracy.
In an embodiment of the present application, optionally, an implementation manner of the checking accuracy of the second current time may include: searching authentication information corresponding to the data object; and if the authentication information is judged to be legal, confirming that the second current time has accuracy.
The authentication information is generated after the cloud server performs accuracy verification on the second current time, the authentication information is returned to the client, when verification is needed, the authentication information corresponding to the data object is searched, whether the authentication information is legal or not is judged by an algorithm for verifying the validity of the authentication information, and if the authentication information is legal, the second current time is confirmed to have accuracy. For example, the authentication information is a signature result obtained by signing the second current time with the private key, and when the authentication information is legal, the public key corresponding to the private key is used for signing the signature result, if the signature verification result is legal, the second current time is indicated to have accuracy, otherwise, the second current time is not accurate.
According to the embodiment of the application, the first current time and the second current time of the data object are acquired and compared to determine whether the first current time and the second current time are consistent, and the first current time is marked to the data object after the first current time is acquired, and the second current time is generated for the data object and marked to the data object, so that time verification can prove whether the data object is generated between the first current time and the second current time, the problem that the generation time of the data object cannot be proved is solved, the problem of high storage cost caused by centralized storage of the data object is avoided, and the risk that user data is easy to leak is avoided.
The application also provides a data processing scheme. When complaints, warranty applications or disputes occur in transactions, data objects serving as evidence need to be submitted, but the generation time or uploading time of the submitted data objects may not be in compliance with regulations, and the data objects belong to invalid evidence and cannot be used as a basis for further processing problems, so that storage space is wasted and unnecessary processing amount is increased.
Referring to fig. 11, a flowchart of an embodiment of a data processing method according to a sixth embodiment of the present application is shown, and the method may specifically include the following steps:
at step 601, commit data is received.
In an embodiment of the present application, the first time data includes a generation time of the data object, a time of marking the data object after the data object is generated, or any other applicable time data, which is not limited in this embodiment of the present application. For example, the first time data is first time data corresponding to a server local time acquired from the server when a photograph is taken by the client.
The first time data is used to mark the data object, and the first time data may be extracted from the data object, or the first time data may be found from a database according to the identification of the data object, or may be obtained in any other suitable manner, which is not limited in this embodiment of the present application. The first time data may be characterized by a random number obtained from the cloud server, which may be generated from a local time of the cloud server, e.g., a TOTP value.
In the embodiment of the present application, the submitted data includes first time data, may also include a data object, or any other applicable submitted data, which the embodiment of the present application does not limit. For example, when a buyer initiates a complaint, the submitted data includes a photograph of the commodity, first time data of the photograph, and reason for the complaint, etc.
In the embodiment of the application, the server receives the submitted data sent by the client to acquire the first time data.
Step 602, generating second time data for the submitted data according to the receiving time.
In the embodiment of the application, the cloud server receives the submitted data and then generates second time data for the submitted data according to the receiving time. The second time data is used to characterize the time at which the commit data was received.
Step 603, if the first time data is smaller than the second time data, and a time period between the first time data and the second time data meets a preset condition, determining that the submitted data is valid data.
In the embodiment of the application, the first time data and the second time data are compared, and if the first time data is smaller than the second time data, the generation time of the data object is indicated to be earlier than the time of the server receiving the submitted data. And taking the first time data and the second time data as endpoints, and the time period between the first time data and the second time data. For example, the photographing time of the photo is 12 hours, 15 hours, and 8 hours, and the time of the server receiving the photo is 2017, 12 months, 16 days, and 8 hours.
In the embodiment of the present application, the preset conditions are used to determine whether the submitted data is valid data, including conditions such as a time point, a time length, or any other applicable conditions, which is not limited in the embodiment of the present application. The relationship between the time period and the preset condition can be obtained through comparison, calculation and the like, and the obtained relationship can comprise a front-back relationship between an end point of the time period and a preset time point, a length relationship between a time length of the time period and a preset time length, or any other applicable relationship, which is not limited in the embodiment of the application.
For example, the preset conditions include a complaint valid period, a warranty period, a dispute time, and the like, the complaint valid period refers to the latest time at which a customer can be complained after receiving a shipment, the warranty period refers to the latest time at which a commodity warranties, and the dispute time refers to the latest time at which a dispute is made after receiving a shipment. After receiving the goods, the buyer takes a picture of the goods, and when the buyer needs to initiate complaints, or give a warranty, or raise a dispute, the buyer submits the taken picture to the server. The server acquires the first time data of the photo, generates the second time data and obtains the time period. When the complaints are initiated, if the second time data is later than the valid period of the complaints, the complaints are invalid, the photos are invalid data, and otherwise, the photos are valid data and the complaints are further processed; when the warranty is provided, if the second time data is later than the warranty period, the warranty request is not accepted, the photo is invalid data, otherwise, the photo is valid data and the warranty request is further processed; when the dispute is lifted, if the second time data is later than the dispute time, the dispute is lifted and invalid, the photo is invalid data, and otherwise, the photo is valid data and the dispute is further processed.
According to the embodiment of the application, the second time data is generated for the submitted data according to the receiving time, if the first time data is smaller than the second time data and the time period between the first time data and the second time data meets the preset condition, the submitted data is determined to be the effective data, so that whether the submitted data can be used for the next processing is determined according to whether the submitted data is generated or uploaded in the specified time or not, the processing amount of the submitted data which does not meet the specification is reduced, and the processing efficiency of the submitted data is improved.
In one embodiment of the present application, optionally, an implementation manner of determining that the time period meets the preset condition includes: and if the time period is less than a preset threshold time period.
According to the time period, two time endpoints, namely, first time data and second time data, can be obtained, and the time length between the first time data and the second time data can also be obtained. Correspondingly, if the time length of the time period is smaller than the time length specified by the preset condition, the submitted data is valid data, or if the time endpoint is smaller than the time node specified by the preset condition, the submitted data is valid data.
For example, the shooting time of the first time data representing the photo and the uploading time of the second time data representing the photo are preset conditions that the shooting time is not later than 3 days after the receiving time and the uploading time is not later than 365 days after the receiving time, if the time period meets the preset conditions, the photo can be used for applying for complaints or applying for warranty, the photo is effective data and can be processed, otherwise, the photo is ineffective data and the complaints or warranty requests of the application are refused.
In the embodiment of the present application, optionally, the time period is less than the second preset threshold, which indicates that the data object may not be uploaded by a manual operation, but is a program executed by a machine, so that the data object is not stored. For example, after taking a photo, the photo needs to be uploaded after the verification code is manually input, if the time period is less than 0.05 seconds, the verification code is not manually input, the photo belongs to malicious complaints, and the photo is not stored.
In the embodiment of the present application, optionally, the submitted data may be valid data, and may be further processed, and then the submitted data and the second time data may be stored.
Referring to fig. 12, there is shown a block diagram of an embodiment of a time stamping device according to a seventh embodiment of the present application, which may specifically include:
A first marking module 701, configured to obtain a first current time, and mark a data object with the first current time;
a second marking module 702, configured to obtain a second current time generated for the data object, and mark the data object with the second current time.
In one embodiment of the present application, optionally, the first marking module includes:
the random number acquisition sub-module is used for acquiring a random number representing the first current time from the cloud server, and the random number is generated according to the first current time of the cloud server.
In one embodiment of the present application, optionally, the second marking module includes:
a second time obtaining sub-module, configured to obtain a second current time set for the data object;
and the verification sub-module is used for carrying out accuracy verification on the second current time and determining that the verification passes.
In one embodiment of the present application, optionally, the verification sub-module includes:
the uploading unit is used for uploading the second current time to the cloud server;
and the message receiving unit is used for receiving feedback messages which are used for carrying out accuracy check on the second current time according to the local time by the cloud server and confirming that the check passes.
In one embodiment of the present application, optionally, the feedback message includes authentication information generated according to the second current time, and the apparatus further includes:
and the corresponding storage module is used for correspondingly storing the authentication information and the data object after the accuracy check is carried out on the second current time so as to determine that the accuracy check is carried out on the second current time according to the authentication information.
In one embodiment of the present application, optionally, the first marking module includes at least one of:
a first attribute adding sub-module, configured to add the first current time to attribute information of the data object;
the first content adding sub-module is used for adding the first current time into the display content corresponding to the data object;
and the generation sub-module is used for generating record data comprising the first current time and the data object.
In one embodiment of the present application, optionally, the second marking module includes at least one of:
a second attribute adding sub-module, configured to add the second current time to attribute information of the data object;
And the second content adding sub-module is used for adding the second current time into the display content corresponding to the data object.
In one embodiment of the present application, optionally, the apparatus further comprises:
and the object acquisition module is used for acquiring the data object generated in real time.
In one embodiment of the present application, optionally, the object acquisition module includes:
and the program confirming sub-module is used for acquiring the data object and confirming that the data object is derived from the set data object generating program.
According to the embodiment of the application, the first current time is acquired, the first current time is adopted to mark the data object, the second current time generated for the data object is acquired, the second current time is adopted to mark the data object, and the time marked can be used for proving whether the data object is generated between the first current time and the second current time, so that the problem that the generation time of the data object cannot be demonstrated is solved, the problem of high storage cost caused by centralized storage of the data object is avoided, and the risk that the user data is easy to leak is avoided.
Referring to fig. 13, there is shown a block diagram of an embodiment of a time stamping device according to an eighth embodiment of the present application, which may specifically include:
A time issuing module 801, configured to generate a first current time and issue the first current time to a client, so that the client adopts the first current time stamp data object;
the time message receiving module 802 is configured to receive a second current time generated by the client for the data object, perform accuracy check on the second current time, and feed back a feedback message, so that the client marks the data object according to the second current time that passes the check.
According to the embodiment of the application, the first current time is generated and issued to the client side, so that the client side marks the data object by adopting the first current time, the second current time generated by the client side aiming at the data object is received, the accuracy check is carried out on the second current time, and the feedback information is fed back, so that the client side marks the data object according to the second current time passing through the check, after the time marking, the client side can be used for proving whether the data object is generated between the first current time and the second current time, the problem that the generation time of the data object cannot be demonstrated is solved, the problem of high storage cost caused by centralized storage of the data object is avoided, and the risk that the user data is easy to leak is avoided.
Referring to fig. 14, there is shown a block diagram of an embodiment of a time stamping apparatus according to a ninth embodiment of the present application, which may specifically include:
the time issuing module 901 is configured to generate a first current time and issue the first current time to a client, so that the client adopts the first current time to mark a data object;
a time stamping module 902, configured to generate a second current time, and stamp the data object with the second current time.
According to the embodiment of the application, the first current time is generated and issued to the client side, so that the client side adopts the first current time to mark the data object, the second current time is generated, and the second current time is adopted to mark the data object, so that the time marked can be used for proving whether the data object is generated between the first current time and the second current time, the problem that the generation time of the data object cannot be demonstrated is solved, the problem of high storage cost caused by centralized storage of the data object is avoided, and the risk that the user data is easy to leak is avoided.
Referring to fig. 15, there is shown a block diagram of an embodiment of a time verification apparatus according to an embodiment of the application, which may include:
a time acquisition module 1001, configured to acquire a first current time and a second current time of a data object, where the first current time is marked to the data object after the first current time is acquired, and the second current time is generated for the data object and marked to the data object;
And a time comparison module 1002, configured to compare whether the first current time and the second current time are consistent.
In one embodiment of the present application, optionally, the time acquisition module includes:
the time acquisition sub-module is used for acquiring the first current time and the second current time from the associated content of the data object, wherein the associated content comprises at least one of attribute information of the data object, display content corresponding to the data object and record data.
In one embodiment of the present application, optionally, the time acquisition module further includes:
and the rule determining submodule is used for determining that the associated content accords with a set content format rule before the first current time and the second current time are acquired from the associated content of the data object.
In one embodiment of the present application, optionally, the time acquisition module includes:
and the first time receiving sub-module is used for receiving the first current time and the second current time submitted for the data object.
In one embodiment of the present application, optionally, the time acquisition module includes:
a second time receiving sub-module for receiving a first current time submitted for the data object;
And the time searching sub-module is used for searching the second current time recorded by the cloud server aiming at the data object.
In one embodiment of the present application, optionally, the time alignment module includes:
and the difference value comparison sub-module is used for comparing whether the difference value between the first current time and the second current time is in a set range or not.
In one embodiment of the present application, optionally, the time acquisition module includes:
and the random number acquisition sub-module is used for acquiring the random number representing the first current time.
In one embodiment of the present application, optionally, the time alignment module includes:
the random number generation sub-module is used for generating a random number corresponding to the second current time according to the second current time and the random number generation rule;
and the random number comparison sub-module is used for determining whether the first current time is consistent with the second current time according to whether the random number representing the first current time is consistent with the random number corresponding to the second current time.
In one embodiment of the present application, optionally, the time alignment module includes:
the first time sending sub-module is used for sending the first current time and the second current time to the cloud server so as to carry out consistency verification by the cloud server.
In one embodiment of the present application, optionally, the apparatus further comprises:
and the verification module is used for carrying out accuracy verification on the second current time before the comparison of whether the first current time and the second current time are consistent.
In one embodiment of the present application, optionally, the verification module includes:
the second time sending submodule is used for sending the second current time to the cloud server;
and the accuracy confirming sub-module is used for confirming that the second current time has accuracy if a verification result which is fed back by the cloud server and has been subjected to accuracy verification is received.
In one embodiment of the present application, optionally, the verification module includes:
the information searching sub-module is used for searching authentication information corresponding to the data object, and the authentication information is generated after the cloud server performs accuracy check on the second current time;
and the legal judgment sub-module is used for judging that the authentication information is legal, and confirming that the second current time has accuracy.
According to the embodiment of the application, the first current time and the second current time of the data object are acquired and compared to determine whether the first current time and the second current time are consistent, and the first current time is marked to the data object after the first current time is acquired, and the second current time is generated for the data object and marked to the data object, so that time verification can prove whether the data object is generated between the first current time and the second current time, the problem that the generation time of the data object cannot be proved is solved, the problem of high storage cost caused by centralized storage of the data object is avoided, and the risk that user data is easy to leak is avoided.
With reference to FIG. 16, there is shown a block diagram of an embodiment of a data processing apparatus according to an eleventh implementation of the present application, which may specifically include:
a first data receiving module 1101 for receiving commit data, wherein the commit data includes first time data;
a second data generating module 1102, configured to generate second time data for the submitted data according to the receiving time;
the validity determining module 1103 is configured to determine that the submitted data is valid data if the first time data is smaller than the second time data and a time period between the first time data and the second time data satisfies a preset condition.
In one embodiment of the present application, optionally, determining that the time period satisfies the preset condition includes:
if the time period is less than a first preset threshold.
In one embodiment of the present application, optionally, the method further includes:
and the storage module is used for storing the submitted data and the second time data.
According to the embodiment of the application, the second time data is generated for the submitted data according to the receiving time, if the first time data is smaller than the second time data and the time period between the first time data and the second time data meets the preset condition, the submitted data is determined to be the effective data, so that whether the submitted data can be used for the next processing is determined according to whether the submitted data is generated or uploaded in the specified time or not, the processing amount of the submitted data which does not meet the specification is reduced, and the processing efficiency of the submitted data is improved.
For the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points.
Embodiments of the present disclosure may be implemented as a system configured as desired using any suitable hardware, firmware, software, or any combination thereof. Fig. 17 schematically illustrates an example system (or apparatus) 1200 that can be used to implement various embodiments described in this disclosure.
For one embodiment, FIG. 17 illustrates an exemplary system 1200 having one or more processors 1202, a system control module (chipset) 1204 coupled to at least one of the processor(s) 1202, a system memory 1206 coupled to the system control module 1204, a non-volatile memory (NVM)/storage device 1208 coupled to the system control module 1204, one or more input/output devices 1210 coupled to the system control module 1204, and a network interface 1212 coupled to the system control module 1204.
The processor 1202 may include one or more single-core or multi-core processors, and the processor 1202 may include any combination of general-purpose or special-purpose processors (e.g., graphics processors, application processors, baseband processors, etc.). In some embodiments, system 1200 can function as a browser as described in embodiments of the present application.
In some embodiments, the system 1200 can include one or more computer-readable media (e.g., system memory 1206 or NVM/storage 1208) having instructions and one or more processors 1202, in combination with the one or more computer-readable media, configured to execute the instructions to implement the modules to perform the actions described in this disclosure.
For one embodiment, the system control module 1204 may include any suitable interface controller to provide any suitable interface to at least one of the processor(s) 1202 and/or any suitable device or component in communication with the system control module 1204.
The system control module 1204 may include a memory controller module to provide an interface to the system memory 1206. The memory controller modules may be hardware modules, software modules, and/or firmware modules.
The system memory 1206 may be used to load and store data and/or instructions for the system 1200, for example. For one embodiment, the system memory 1206 may comprise any suitable volatile memory, such as, for example, a suitable DRAM. In some embodiments, the system memory 1206 may comprise a double data rate type four synchronous dynamic random access memory (DDR 4 SDRAM).
For one embodiment, the system control module 1204 may include one or more input/output controllers to provide interfaces to the NVM/storage 1208 and the input/output device(s) 1210.
For example, NVM/storage 1208 may be used to store data and/or instructions. NVM/storage 1208 may include any suitable nonvolatile memory (e.g., flash memory) and/or may include any suitable nonvolatile storage device(s) (e.g., hard Disk Drive (HDD) s, compact disk drive (CD) s, and/or digital versatile disk drive (DVD)).
NVM/storage 1208 may include storage resources that are physically part of the device on which system 1200 is installed or which may be accessed by the device without being part of the device. For example, NVM/storage 1208 may be accessed over a network via input/output device(s) 1210.
Input/output device(s) 1210 may provide an interface for system 1200 to communicate with any other suitable devices, and input/output device 1210 may include communication components, audio components, sensor components, and the like. The network interface 1212 may provide an interface for the system 1200 to communicate over one or more networks, and the system 1200 may communicate wirelessly with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols, such as accessing a wireless network based on a communication standard, such as WiFi,2G, or 3G, or a combination thereof.
For one embodiment, at least one of the processor(s) 1202 may be packaged together with logic of one or more controllers (e.g., memory controller modules) of the system control module 1204. For one embodiment, at least one of the processor(s) 1202 may be packaged together with logic of one or more controllers of the system control module 1204 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 1202 may be integrated on the same die as logic of one or more controllers of the system control module 1204. For one embodiment, at least one of the processor(s) 1202 may be integrated on the same die as logic of one or more controllers of the system control module 1204 to form a system on chip (SoC).
In various embodiments, system 1200 may be, but is not limited to being: a browser, workstation, desktop computing device, or mobile computing device (e.g., a laptop computing device, handheld computing device, tablet, netbook, etc.). In various embodiments, system 1200 may have more or fewer components and/or different architectures. For example, in some embodiments, system 1200 includes one or more cameras, keyboards, liquid Crystal Display (LCD) screens (including touch screen displays), non-volatile memory ports, multiple antennas, graphics chips, application Specific Integrated Circuits (ASICs), and speakers.
Wherein if the display comprises a touch panel, the display screen may be implemented as a touch screen display to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation.
The embodiment of the application also provides a non-volatile readable storage medium, wherein one or more modules (programs) are stored in the storage medium, and when the one or more modules are applied to terminal equipment, the terminal equipment can execute instructions (instructions) of each method step in the embodiment of the application.
In one example, a computer device is provided comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements a method according to an embodiment of the application when executing the computer program.
There is also provided in one example a computer readable storage medium having stored thereon a computer program, characterized in that the program when executed by a processor implements a method as in one or more of the embodiments of the application.
The embodiment of the application discloses a time marking method and a device, and an example 1 comprises a time marking method, which comprises the following steps:
acquiring a first current time and marking a data object by adopting the first current time;
and acquiring a second current time generated for the data object, and marking the data object with the second current time.
Example 2 includes the method of example 1, wherein the obtaining the first current time includes:
and acquiring a random number representing the first current time from a cloud server, wherein the random number is generated according to the first current time of the cloud server.
Example 3 includes the method of example 1 and/or 2, wherein the obtaining the second current time generated for the data object comprises:
acquiring a second current time set for the data object;
and carrying out accuracy check on the second current time and determining that the check passes.
Example 4 may include the method of one or more of examples 1-3, wherein the performing an accuracy check on the second current time comprises:
uploading the second current time to a cloud server;
and receiving feedback information which is obtained by the cloud server and passes the accuracy check on the second current time according to the local time.
Example 5 may include the method of one or more of examples 1-4, wherein the feedback message includes authentication information generated from the second current time, the method further comprising, after the checking of the accuracy of the second current time:
and correspondingly storing the authentication information and the data object to determine that the second current time is subjected to accuracy verification according to the authentication information.
Example 6 may include the method of one or more of examples 1-5, wherein the employing the first current timestamp data object comprises at least one of:
adding the first current time to attribute information of the data object;
adding the first current time to the display content corresponding to the data object;
record data comprising the first current time and the data object is generated.
Example 7 may include the method of one or more of examples 1-6, wherein said tagging the data object with the second current time stamp comprises at least one of:
adding the second current time to attribute information of the data object;
and adding the second current time to the display content corresponding to the data object.
Example 8 may include the method of one or more of examples 1-7, wherein the method further comprises:
and acquiring the data object generated in real time.
Example 9 may include the method of one or more of examples 1-8, wherein the obtaining the instantly generated data object comprises:
the data object is acquired and it is confirmed that the data object originates from the set data object generation program.
Example 10 includes a time stamping method, comprising:
generating a first current time and transmitting the first current time to a client for the client to adopt the first current time marking data object;
and receiving a second current time generated by the client for the data object, performing accuracy check on the second current time, and feeding back a feedback message, so that the client marks the data object according to the second current time passing the check.
Example 11 includes a time stamping method, comprising:
generating a first current time and transmitting the first current time to a client for the client to adopt the first current time marking data object;
generating a second current time and marking the data object with the second current time.
Example 12 includes a time validation method, comprising:
Acquiring a first current time and a second current time of a data object, wherein the first current time is marked to the data object after acquisition, and the second current time is generated for the data object and marked to the data object;
and comparing whether the first current time and the second current time are consistent.
Example 13 includes the method of example 12, wherein the obtaining the first current time and the second current time of the data object comprises:
the first current time and the second current time are obtained from associated content of the data object, wherein the associated content comprises at least one of attribute information of the data object, display content corresponding to the data object and record data.
Example 14 includes the method of example 12 and/or example 13, wherein, prior to the obtaining the first current time and the second current time from the associated content of the data object, the obtaining the first current time and the second current time of the data object further comprises:
and determining that the associated content accords with the set content format rule.
Example 15 may include the method of one or more of examples 12-14, wherein the obtaining the first current time and the second current time of the data object comprises:
A first current time and a second current time submitted for the data object are received.
Example 16 may include the method of one or more of examples 12-15, wherein the obtaining the first current time and the second current time of the data object comprises:
receiving a first current time submitted for the data object;
and searching a second current time recorded by the cloud server aiming at the data object.
Example 17 may include the method of one or more of examples 12-16, wherein the comparing whether the first current time and the second current time are consistent comprises:
and comparing whether the difference value between the first current time and the second current time is in a set range or not.
Example 18 may include the method of one or more of examples 12-17, wherein the obtaining the first current time of the data object comprises:
a random number characterizing the first current time is obtained.
Example 19 may include the method of one or more of examples 12-18, wherein the comparing whether the first current time and the second current time are consistent comprises:
generating a random number corresponding to the second current time according to the second current time and a random number generation rule;
And determining whether the first current time is consistent with the second current time according to whether the random number representing the first current time is consistent with the random number corresponding to the second current time.
Example 20 may include the method of one or more of examples 12-19, wherein the comparing whether the first current time and the second current time are consistent comprises:
and sending the first current time and the second current time to a cloud server so as to carry out consistency verification by the cloud server.
Example 21 may include the method of one or more of examples 12-20, wherein prior to the comparing whether the first current time and second current time agree, the method further comprises:
and carrying out accuracy check on the second current time.
Example 22 may include the method of one or more of examples 12-21, wherein the performing an accuracy check on the second current time comprises:
the second current time is sent to a cloud server;
and if a verification result which is fed back by the cloud server and has passed the accuracy verification is received, confirming that the second current time has accuracy.
Example 23 may include the method of one or more of examples 12-22, wherein the performing an accuracy check on the second current time comprises:
Searching authentication information corresponding to the data object, wherein the authentication information is generated after the cloud server performs accuracy check on the second current time;
and if the authentication information is judged to be legal, confirming that the second current time has accuracy.
Example 24 includes a data processing method, comprising:
receiving commit data, wherein the commit data includes first time data;
generating second time data for the submitted data according to the receiving time;
and if the first time data is smaller than the second time data and the time period between the first time data and the second time data meets a preset condition, determining that the submitted data is valid data.
Example 25 includes the method of example 24, wherein determining that the time period satisfies a preset condition comprises:
if the time period is less than a first preset threshold.
Example 26 includes the method of example 24 and/or example 25, wherein further comprising:
storing the commit data and the second time data.
Example 27 includes a time-stamping apparatus, comprising:
the first marking module is used for acquiring a first current time and marking a data object by adopting the first current time;
And the second marking module is used for acquiring a second current time generated for the data object and marking the data object by adopting the second current time.
Example 28 includes the method of example 27, wherein the first marking module comprises:
the random number acquisition sub-module is used for acquiring a random number representing the first current time from the cloud server, and the random number is generated according to the first current time of the cloud server.
Example 29 includes the method of example 27 and/or example 28, wherein the second marking module comprises:
a second time obtaining sub-module, configured to obtain a second current time set for the data object;
and the verification sub-module is used for carrying out accuracy verification on the second current time and determining that the verification passes.
Example 30 may include the method of one or more of examples 27-29, wherein the verification sub-module comprises:
the uploading unit is used for uploading the second current time to the cloud server;
and the message receiving unit is used for receiving feedback messages which are used for carrying out accuracy check on the second current time according to the local time by the cloud server and confirming that the check passes.
Example 31 may include the method of one or more of examples 27-30, wherein the feedback message includes authentication information generated from the second current time, the apparatus further comprising:
and the corresponding storage module is used for correspondingly storing the authentication information and the data object after the accuracy check is carried out on the second current time so as to determine that the accuracy check is carried out on the second current time according to the authentication information.
Example 32 may include the method of one or more of examples 27-31, wherein the first marking module includes at least one of:
a first attribute adding sub-module, configured to add the first current time to attribute information of the data object;
the first content adding sub-module is used for adding the first current time into the display content corresponding to the data object;
and the generation sub-module is used for generating record data comprising the first current time and the data object.
Example 33 may include the method of one or more of examples 27-32, wherein the second marking module comprises at least one of:
a second attribute adding sub-module, configured to add the second current time to attribute information of the data object;
And the second content adding sub-module is used for adding the second current time into the display content corresponding to the data object.
Example 34 may include the method of one or more of examples 27-33, wherein the apparatus further comprises:
and the object acquisition module is used for acquiring the data object generated in real time.
Example 35 may include the method of one or more of examples 27-34, wherein the object acquisition module comprises:
and the program confirming sub-module is used for acquiring the data object and confirming that the data object is derived from the set data object generating program.
Example 36 includes a time-stamping apparatus, comprising:
the time issuing module is used for generating a first current time and issuing the first current time to the client so that the client can use the first current time to mark the data object;
and the time message receiving module is used for receiving a second current time generated by the client for the data object, carrying out accuracy check on the second current time and feeding back a feedback message so that the client marks the data object according to the second current time passing the check.
Example 37 includes a time-stamping apparatus, comprising:
the time issuing module is used for generating a first current time and issuing the first current time to the client so that the client can use the first current time to mark the data object;
And the time marking module is used for generating a second current time and marking the data object by adopting the second current time.
Example 38 includes a time validation apparatus, comprising:
the time acquisition module is used for acquiring a first current time and a second current time of a data object, wherein the first current time is marked to the data object after being acquired, and the second current time is generated for the data object and marked to the data object;
and the time comparison module is used for comparing whether the first current time and the second current time are consistent.
Example 39 includes the apparatus of example 38, wherein the time acquisition module comprises:
the time acquisition sub-module is used for acquiring the first current time and the second current time from the associated content of the data object, wherein the associated content comprises at least one of attribute information of the data object, display content corresponding to the data object and record data.
Example 40 includes the apparatus of example 38 and/or example 39, wherein the time acquisition module further comprises:
and the rule determining submodule is used for determining that the associated content accords with a set content format rule before the first current time and the second current time are acquired from the associated content of the data object.
Example 41 may include the apparatus of one or more of examples 38-40, wherein the time acquisition module comprises:
and the first time receiving sub-module is used for receiving the first current time and the second current time submitted for the data object.
Example 42 may include the apparatus of one or more of examples 38-41, wherein the time acquisition module comprises:
a second time receiving sub-module for receiving a first current time submitted for the data object;
and the time searching sub-module is used for searching the second current time recorded by the cloud server aiming at the data object.
Example 43 may include the apparatus of one or more of examples 38-42, wherein the time alignment module comprises:
and the difference value comparison sub-module is used for comparing whether the difference value between the first current time and the second current time is in a set range or not.
Example 44 may include the apparatus of one or more of examples 38-43, wherein the time acquisition module comprises:
and the random number acquisition sub-module is used for acquiring the random number representing the first current time.
Example 45 may include the apparatus of one or more of examples 38-44, wherein the time alignment module comprises:
The random number generation sub-module is used for generating a random number corresponding to the second current time according to the second current time and the random number generation rule;
and the random number comparison sub-module is used for determining whether the first current time is consistent with the second current time according to whether the random number representing the first current time is consistent with the random number corresponding to the second current time.
Example 46 may include the apparatus of one or more of examples 38-45, wherein the time alignment module comprises:
the first time sending sub-module is used for sending the first current time and the second current time to the cloud server so as to carry out consistency verification by the cloud server.
Example 47 may include the apparatus of one or more of examples 38-46, wherein the apparatus further comprises:
and the verification module is used for carrying out accuracy verification on the second current time before the comparison of whether the first current time and the second current time are consistent.
Example 48 may include the apparatus of one or more of examples 38-47, wherein the verification module comprises:
the second time sending submodule is used for sending the second current time to the cloud server;
And the accuracy confirming sub-module is used for confirming that the second current time has accuracy if a verification result which is fed back by the cloud server and has been subjected to accuracy verification is received.
Example 49 may include the apparatus of one or more of examples 38-48, wherein the verification module comprises:
the information searching sub-module is used for searching authentication information corresponding to the data object, and the authentication information is generated after the cloud server performs accuracy check on the second current time;
and the legal judgment sub-module is used for judging that the authentication information is legal, and confirming that the second current time has accuracy.
Example 50 includes a data processing apparatus, comprising:
the first data receiving module is used for receiving the submitted data, wherein the submitted data comprises first time data;
the second data generation module is used for generating second time data for the submitted data according to the receiving time;
and the validity determining module is used for determining that the submitted data is valid data if the first time data is smaller than the second time data and the time period between the first time data and the second time data meets a preset condition.
Example 51 includes the apparatus of example 50, wherein determining that the time period satisfies a preset condition comprises:
if the time period is less than a first preset threshold.
Example 52 includes the apparatus of example 50 and/or example 51, wherein further comprising:
and the storage module is used for storing the submitted data and the second time data.
Example 53 includes a computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the method as in one or more of examples 1-26 when the computer program is executed.
Examples 54 include: a computer readable storage medium having stored thereon a computer program, characterized in that the program when executed by a processor implements a method as in one or more of examples 1-26.
While certain embodiments have been illustrated and described for purposes of description, various alternative, and/or equivalent embodiments, or implementations calculated to achieve the same purposes are shown and described without departing from the scope of the embodiments of the present application. This disclosure is intended to cover any adaptations or variations of the embodiments discussed herein. It is manifestly, therefore, that the embodiments described herein are limited only by the claims and the equivalents thereof.

Claims (28)

1. A method of time stamping comprising:
acquiring a first current time and marking a data object by adopting the first current time;
acquiring a second current time generated for the data object, and marking the data object by adopting the second current time; the second current time passes through the accuracy check of the cloud server;
wherein the first current time comprises a time characterized by unpredictable but retrospective public information; the first current time and the second current time are used for verifying the generation time of the data object; the first current time is used to prove that the data object was generated after the first current time, and the second current time is used to prove that the data object was generated before the second current time.
2. The method of claim 1, wherein the obtaining the first current time comprises:
and acquiring a random number representing the first current time from a cloud server, wherein the random number is generated according to the first current time of the cloud server.
3. The method of claim 1, wherein the obtaining the second current time generated for the data object comprises:
Acquiring a second current time set for the data object;
and carrying out accuracy check on the second current time and determining that the check passes.
4. A method according to claim 3, wherein said checking the accuracy of said second current time comprises:
uploading the second current time to a cloud server;
and receiving feedback information which is obtained by the cloud server and passes the accuracy check on the second current time according to the local time.
5. The method of claim 4, wherein the feedback message includes authentication information generated from the second current time, and wherein after the checking of the accuracy of the second current time, the method further comprises:
and correspondingly storing the authentication information and the data object to determine that the second current time is subjected to accuracy verification according to the authentication information.
6. The method of claim 1, wherein said employing said first current time-stamped data object comprises at least one of:
adding the first current time to attribute information of the data object;
adding the first current time to the display content corresponding to the data object;
Record data comprising the first current time and the data object is generated.
7. The method of claim 1, wherein said employing said second current time stamp said data object comprises at least one of:
adding the second current time to attribute information of the data object;
and adding the second current time to the display content corresponding to the data object.
8. The method according to claim 1, wherein the method further comprises:
and acquiring the data object generated in real time.
9. The method of claim 8, wherein the obtaining the instantly generated data object comprises:
the data object is acquired and it is confirmed that the data object originates from the set data object generation program.
10. A method of time stamping comprising:
generating a first current time and transmitting the first current time to a client for the client to adopt the first current time marking data object;
receiving a second current time generated by a client for a data object, performing accuracy check on the second current time, and feeding back a feedback message, so that the client marks the data object according to the second current time passing the check;
Wherein the first current time comprises a time characterized by unpredictable but retrospective public information; the first current time and the second current time are used for verifying the generation time of the data object; the first current time is used to prove that the data object was generated after the first current time, and the second current time is used to prove that the data object was generated before the second current time.
11. A method of time stamping comprising:
generating a first current time and transmitting the first current time to a client for the client to adopt the first current time marking data object;
generating a second current time and marking the data object with the second current time; the second current time passes through the accuracy check of the cloud server;
wherein the first current time comprises a time characterized by unpredictable but retrospective public information; the first current time and the second current time are used for verifying the generation time of the data object; the first current time is used to prove that the data object was generated after the first current time, and the second current time is used to prove that the data object was generated before the second current time.
12. A time verification method, comprising:
acquiring a first current time and a second current time of a data object, wherein the first current time is marked to the data object after acquisition, and the second current time is generated for the data object and marked to the data object; the second current time passes through the accuracy check of the cloud server;
comparing whether the first current time is consistent with the second current time;
wherein the first current time comprises a time characterized by unpredictable but retrospective public information; the first current time and the second current time are used for verifying the generation time of the data object; the first current time is used to prove that the data object was generated after the first current time, and the second current time is used to prove that the data object was generated before the second current time.
13. The method of claim 12, wherein the obtaining the first current time and the second current time of the data object comprises:
the first current time and the second current time are obtained from associated content of the data object, wherein the associated content comprises at least one of attribute information of the data object, display content corresponding to the data object and record data.
14. The method of claim 13, wherein prior to the acquiring the first and second current times from the associated content of the data object, the acquiring the first and second current times of the data object further comprises:
and determining that the associated content accords with the set content format rule.
15. The method of claim 12, wherein the obtaining the first current time and the second current time of the data object comprises:
a first current time and a second current time submitted for the data object are received.
16. The method of claim 12, wherein the obtaining the first current time and the second current time of the data object comprises:
receiving a first current time submitted for the data object;
and searching a second current time recorded by the cloud server aiming at the data object.
17. The method of claim 12, wherein said comparing whether the first current time and the second current time are consistent comprises:
and comparing whether the difference value between the first current time and the second current time is in a set range or not.
18. The method of claim 12, wherein the obtaining the first current time of the data object comprises:
a random number characterizing the first current time is obtained.
19. The method of claim 18, wherein said comparing whether the first current time and the second current time are consistent comprises:
generating a random number corresponding to the second current time according to the second current time and a random number generation rule;
and determining whether the first current time is consistent with the second current time according to whether the random number representing the first current time is consistent with the random number corresponding to the second current time.
20. The method of claim 12, wherein said comparing whether the first current time and the second current time are consistent comprises:
and sending the first current time and the second current time to a cloud server so as to carry out consistency verification by the cloud server.
21. The method of claim 12, wherein prior to said comparing whether the first current time and the second current time are consistent, the method further comprises:
and carrying out accuracy check on the second current time.
22. The method of claim 21, wherein the checking the second current time for accuracy comprises:
the second current time is sent to a cloud server;
and if a verification result which is fed back by the cloud server and has passed the accuracy verification is received, confirming that the second current time has accuracy.
23. The method of claim 21, wherein the checking the second current time for accuracy comprises:
searching authentication information corresponding to the data object, wherein the authentication information is generated after the cloud server performs accuracy check on the second current time;
and if the authentication information is judged to be legal, confirming that the second current time has accuracy.
24. A method of data processing, comprising:
receiving commit data, wherein the commit data includes first time data;
generating second time data for the submitted data according to the receiving time; the second time data passes through the accuracy check of the cloud server;
if the first time data is smaller than the second time data and the time period between the first time data and the second time data meets a preset condition, determining that the submitted data is valid data;
Wherein the commit data further includes a data object, the first time data and the second time data being used to verify a time of generation of the data object; the first time data is used to prove that the data object was generated after the first time data and the second time data is used to prove that the data object was generated before the second time data.
25. The method of claim 24, wherein determining that the time period satisfies a preset condition comprises:
if the time period is less than a first preset threshold.
26. The method of claim 24, further comprising:
storing the commit data and the second time data.
27. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1-26 when the computer program is executed.
28. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any one of claims 1-26.
CN201810079307.3A 2018-01-26 2018-01-26 Time stamp, time verification, data processing method, apparatus, medium Active CN110084032B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810079307.3A CN110084032B (en) 2018-01-26 2018-01-26 Time stamp, time verification, data processing method, apparatus, medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810079307.3A CN110084032B (en) 2018-01-26 2018-01-26 Time stamp, time verification, data processing method, apparatus, medium

Publications (2)

Publication Number Publication Date
CN110084032A CN110084032A (en) 2019-08-02
CN110084032B true CN110084032B (en) 2023-08-22

Family

ID=67412746

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810079307.3A Active CN110084032B (en) 2018-01-26 2018-01-26 Time stamp, time verification, data processing method, apparatus, medium

Country Status (1)

Country Link
CN (1) CN110084032B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1319290A (en) * 1998-08-18 2001-10-24 Rlj时标公司 Time-stamping with binary linking schemes
CN101640693A (en) * 2008-07-31 2010-02-03 乐金电子(中国)研究开发中心有限公司 System and method for testifying recording time of mobile phone
CN103927462B (en) * 2014-03-27 2017-06-09 北京深思数盾科技股份有限公司 The remote calibration method of real-time time in software protecting equipment

Also Published As

Publication number Publication date
CN110084032A (en) 2019-08-02

Similar Documents

Publication Publication Date Title
WO2020001105A1 (en) Blockchain-based data verification method and apparatus, and electronic device
WO2019085699A1 (en) Data sharing method, client, server, computing device, and storage medium
US10402784B2 (en) Dynamic notary system
WO2020134653A1 (en) Method and device for uploading electronic certificate
WO2019052226A1 (en) Processing method and apparatus for self-service claim settlement application, computer device and storage medium
CN109784922B (en) Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
CN107992759B (en) Apparatus, method and computer readable storage medium for implementing electronic seal
CN110958319B (en) Method and device for managing infringement and evidence-based block chain
US20200336907A1 (en) Authenticating digital evidence
WO2021218166A1 (en) Contract signing method and apparatus, device and computer-readable storage medium
US10733178B2 (en) Electronic document workflow
CN111815308A (en) Trade data processing method based on block chain and related equipment thereof
US20200057871A1 (en) Apparatuses and methods for signing a legal document
CN110084032B (en) Time stamp, time verification, data processing method, apparatus, medium
US20200296253A1 (en) Information processing apparatus, information processing system, and non-transitory computer readable medium storing information processing program for verifying an electronic signature
US20220230263A1 (en) Document fraud prevention server and system
TWI673626B (en) Method for verifying electronic files using biometrics, terminal electronic device and computer readable recording medium
US20230214502A1 (en) Systems and methods for electronic document execution, authentication, and forensic review
WO2023087704A1 (en) Traceable picture authorization method and apparatus
Igarashi et al. Photrace: A blockchain-based traceability system for photographs on the internet
TWI595380B (en) Device for generating or verifying authenticate electronic document with electronic and paper certification and method thereof
US9565197B1 (en) Secure verification of website claims
US20170373842A1 (en) System and Method for Authenticating Public Artworks and Providing Associated Information
CN112766755A (en) Service processing method, device, equipment and medium
KR20220126463A (en) Method for proving original of data, and apparatus therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant