CN110674532A - Tamper-proof method and device for evidence file - Google Patents

Tamper-proof method and device for evidence file Download PDF

Info

Publication number
CN110674532A
CN110674532A CN201910866445.0A CN201910866445A CN110674532A CN 110674532 A CN110674532 A CN 110674532A CN 201910866445 A CN201910866445 A CN 201910866445A CN 110674532 A CN110674532 A CN 110674532A
Authority
CN
China
Prior art keywords
evidence
called
evidence file
verification
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910866445.0A
Other languages
Chinese (zh)
Other versions
CN110674532B (en
Inventor
梁继良
逯瑶
许进
贾昆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING UXSINO SOFTWARE Co Ltd
Original Assignee
BEIJING UXSINO SOFTWARE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING UXSINO SOFTWARE Co Ltd filed Critical BEIJING UXSINO SOFTWARE Co Ltd
Priority to CN201910866445.0A priority Critical patent/CN110674532B/en
Publication of CN110674532A publication Critical patent/CN110674532A/en
Application granted granted Critical
Publication of CN110674532B publication Critical patent/CN110674532B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The embodiment of the invention provides an evidence file tamper-proofing method and device, wherein the method comprises the following steps: determining a hash value corresponding to the evidence file to be called; carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result; and determining whether the evidence file to be called is tampered according to the verification result, storing the hash value of the evidence file in a block chain, and performing consensus matching verification on the hash value of the evidence file to be called in the block chain when the evidence file is called, so that whether the evidence file to be called is tampered can be determined according to the verification result, the actual condition of the evidence file can be timely known, and the subsequent processing action of the evidence file can be timely arranged.

Description

Tamper-proof method and device for evidence file
Technical Field
The invention relates to the technical field of file processing, in particular to an evidence file tamper-proofing method and device.
Background
The evidence file is a data file, which is usually used as record information of an event (such as a contract, a transaction record, a plan book and the like), and the evidence file has the possibility of being tampered from any stage from establishment to destruction, and once the evidence file is tampered, the evidence file has a great influence on the event. However, sometimes, after the evidence file is tampered, it is impossible to know whether the evidence file has been tampered in time, and therefore, when the called evidence file is a tampered file, a situation that is unfavorable to an owner of the evidence file often occurs, and therefore, the actual situation of the evidence file needs to be known in time.
Disclosure of Invention
Aiming at the problems in the prior art, the embodiment of the invention provides an evidence file tamper-proofing method and device.
The embodiment of the invention provides an evidence file tamper-proofing method, which comprises the following steps:
determining a hash value corresponding to the evidence file to be called;
carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result;
and determining whether the evidence file to be called is tampered or not according to the verification result.
Optionally, before the evidence file to be called is called, a step of storing the evidence file is further included, where the step includes:
determining a hash value corresponding to the evidence file;
and carrying out consensus storage verification on the hash value of the evidence file in the block chain node, and synchronously storing the hash value after the verification is passed.
Optionally, before performing consensus storage verification on the hash value of the evidence file, an identity verification step is further included, where the identity verification step includes: and carrying out consensus identity verification on the node certificate in the block chain node, and carrying out Hash value consensus storage on the evidence file after the verification is passed.
Optionally, the method further comprises the step of counting the storage number of the evidence files and the verification number of the evidence files to be called.
An embodiment of the present invention provides an evidence file tamper-proofing device, including:
the scanning module is used for determining a hash value corresponding to the evidence file to be called;
the matching module is used for carrying out consensus matching verification on the hash value of the evidence file to be called in the block chain node to obtain a verification result;
and the determining module is used for determining whether the evidence file to be called is tampered according to the verification result.
Optionally, the system further comprises a storage module, configured to perform consensus storage verification on the hash value of the evidence file in the blockchain node, and store the hash value of the evidence file synchronously after the verification passes;
correspondingly, the scanning module is further configured to determine a hash value corresponding to the evidence file before the evidence file to be called is called.
Optionally, the system further includes an identity verification module, configured to perform consensus identity verification on the node certificate in the blockchain node before performing consensus storage verification on the hash values of the evidence files, and notify the storage module to perform hash value consensus storage of the evidence files after the verification is passed.
Optionally, the system further comprises a counting module, configured to count the storage number of the evidence files and the verification number of the evidence files to be called.
The embodiment of the invention provides electronic equipment, which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to realize the steps of the evidence file tamper-proofing method.
Embodiments of the present invention provide a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the above-mentioned evidence file tamper-proofing method.
According to the tamper-proof method and device for the evidence file, the hash value of the evidence file is stored in the block chain, and when the evidence file is called, the hash value of the evidence file to be called is subjected to consensus matching verification in the block chain, so that whether the evidence file to be called is tampered or not can be determined according to the verification result, the actual condition of the evidence file can be timely known, and the subsequent processing action of the evidence file can be timely arranged.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flowchart of an embodiment of a tamper-proofing method for an evidence document according to the present invention;
FIG. 2 is a flowchart of an embodiment of a tamper-proofing method for an evidence document according to the present invention;
FIG. 3 is a flowchart of an embodiment of a tamper-proofing method for evidence files according to the present invention;
FIG. 4 is a block diagram of an embodiment of an apparatus for tamper-proofing an evidence document according to the present invention;
FIG. 5 is a block diagram of an embodiment of an apparatus for tamper-proofing an evidence document according to the present invention;
FIG. 6 is a block diagram of an embodiment of an apparatus for tamper-proofing an evidence document according to the present invention;
FIG. 7 is a block diagram of an embodiment of an electronic device according to the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 shows an evidence file tamper-proofing method provided by an embodiment of the present invention, which includes:
s11, determining a hash value corresponding to the evidence file to be called;
s12, carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result;
and S13, determining whether the evidence file to be called is tampered or not according to the verification result.
With respect to the above steps S11-S13, it should be noted that, in the embodiment of the present invention, the hash value is a unique and extremely compact numerical representation of a piece of data file, i.e., the hash value may correspond to a unique identifier of a piece of data file. The evidence file is the basis of an event, and the event itself is greatly influenced once the evidence file is tampered. Therefore, when one of the evidence files needs to be called, it is necessary to know whether the called evidence file is tampered. In the embodiment of the invention, the evidence file which is to be called and is not verified whether the evidence file is tampered or not is used as the evidence file to be called.
In the embodiment of the invention, the consensus technology of the block chain is adopted to verify whether the evidence file is tampered. In a blockchain system, each blockchain node may be a server platform capable of service handling. The collection, storage, modification and the like of the evidence files can be realized from the server platform.
When an evidence file to be called needs to be called, the server platform firstly scans and determines the hash value corresponding to the evidence file to be called. Confirming the hash value is prior art and the detailed process is not described here.
After the hash value of the evidence file to be called is confirmed, the hash value is sent to each node of the block chain, and all nodes in the block chain perform a consensus matching verification processing process on the hash value. Here, the consensus matching verification is to match the hash value of the evidence file to be called with the hash value stored by the node by adopting a consensus algorithm. And all nodes in the block chain are matched with the hash value of the evidence file to be called according to the stored hash value to obtain a verification result, namely a result of whether the evidence file is matched or not, and the verification result is fed back to the server platform. When the verification result is that all nodes in the block chain store the hash value of the evidence file to be called, that is to say, all nodes in the block chain agree on the fact that the hash value of the evidence file to be called is stored. At this point, the server platform can know that the evidence file to be called has not been tampered. On the contrary, that is, the fact that all nodes in the blockchain do not agree on storing the hash value of the evidence file to be called, the server platform may know that the evidence file to be called is tampered or may know that the evidence file to be called is a new evidence file.
According to the tamper-proof method for the evidence file, the hash value of the evidence file is stored in the block chain, and when the evidence file is called, the hash value of the evidence file to be called is subjected to consensus matching verification in the block chain, so that whether the evidence file to be called is tampered or not can be determined according to the verification result, the actual condition of the evidence file can be timely known, and the subsequent processing action of the evidence file can be timely arranged.
Fig. 2 shows an evidence file tamper-proofing method provided by an embodiment of the present invention, including:
s21, determining a hash value corresponding to the evidence file;
s22, carrying out consensus storage verification on the hash value of the evidence file in the block chain node, and synchronously storing after the verification is passed;
s23, determining a hash value corresponding to the evidence file to be called;
s24, carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result;
and S25, determining whether the evidence file to be called is tampered or not according to the verification result.
With respect to the above step S21 and step S22, it should be noted that, in the embodiment of the present invention, to know whether the evidence file already existing on the server platform is tampered with, the hash value of the evidence file is necessarily stored on the block chain first. If the hash value of the evidence file to be called does not exist on the block chain, the judgment lacks practical significance, and in this case, the called evidence file may be used as a new evidence file or a non-important evidence file.
In a blockchain system, each blockchain node may be a server platform capable of service handling. The collection, storage, modification and the like of the evidence files can be realized from the server platform. When an evidence file needs to be stored, the server platform scans and determines the hash value corresponding to the evidence file. The tamper-proof method for the evidence file only stores the hash value of the evidence file on the block chain actually, so that the storage resource space of the block on the chain can be reduced. The server platform sends the hash value of the evidence file to each node of the block chain, and performs a consensus storage verification processing process on the hash value. In the consensus storage verification, a consensus algorithm is adopted to enable all nodes on the block chain to agree on the event of storing the hash value of the evidence file, namely, the stored hash value of the evidence file can be determined to be legal. After consensus is achieved, each node on the blockchain stores a hash value of the evidence file.
Regarding the above steps S23-S25, it should be noted that these steps are the same as the above steps S11-S13 in principle, and are not described again here.
In addition, in a further embodiment based on the embodiment of the invention, the server platform can also count the storage number of the evidence files and the verification number of the evidence files to be called, and the actual situation of the evidence files in a period of time is counted.
According to the tamper-proof method for the evidence file, the hash value of the evidence file is stored in the block chain, and when the evidence file is called, the hash value of the evidence file to be called is subjected to consensus matching verification in the block chain, so that whether the evidence file to be called is tampered or not can be determined according to the verification result, the actual condition of the evidence file can be timely known, and the subsequent processing action of the evidence file can be timely arranged.
Fig. 3 shows an evidence file tamper-proofing method provided by an embodiment of the present invention, including:
s31, carrying out consensus identity authentication on the node certificate in the block chain node, and carrying out Hash value consensus storage on the evidence file after the authentication is passed;
s32, determining a hash value corresponding to the evidence file;
s33, carrying out consensus storage verification on the hash value of the evidence file in the block chain node, and synchronously storing after the verification is passed;
s34, determining a hash value corresponding to the evidence file to be called;
s35, carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result;
and S36, determining whether the evidence file to be called is tampered or not according to the verification result.
With respect to the step S31, it should be noted that, in the embodiment of the present invention, in the blockchain, the data to be stored needs to be legal and authentic. Therefore, the node which needs to upload data can pass identity authentication, wherein the identity authentication comprises user identity, equipment identity, program identity and the like, and all information of valid identity can be verified. In the embodiment of the invention, the server platform sends the node certificate to the block chain, and performs the process of consensus identity authentication on the node certificate. In the consensus identity verification, a consensus algorithm is adopted to enable all nodes in the block chain to agree on the event that the node identity is acknowledged according to the node certificate, and after the agreement, the server platform can perform hash value consensus storage on the evidence file.
Regarding the above steps S32-S36, it should be noted that these steps are the same as the steps S21-S25 in principle, and are not described again here.
According to the tamper-proof method for the evidence file, the hash value of the evidence file is stored in the block chain, and when the evidence file is called, the hash value of the evidence file to be called is subjected to consensus matching verification in the block chain, so that whether the evidence file to be called is tampered or not can be determined according to the verification result, the actual condition of the evidence file can be timely known, and the subsequent processing action of the evidence file can be timely arranged.
Fig. 4 shows an apparatus for preventing tamper of evidence document provided by an embodiment of the present invention, which includes a scanning module 41, a matching module 42, and a determining module 43, wherein:
the scanning module 41 is configured to determine a hash value corresponding to the evidence file to be called;
the matching module 42 is configured to perform consensus matching verification on the hash value of the to-be-called evidence file in a block chain node to obtain a verification result;
and the determining module 43 is configured to determine whether the evidence file to be called is tampered according to the verification result.
Since the principle of the apparatus according to the embodiment of the present invention is the same as that of the method according to the above embodiment, further details are not described herein for further explanation.
It should be noted that, in the embodiment of the present invention, the relevant functional unit may be implemented by a hardware processor (hardware processor).
According to the tamper-proof device for the evidence files, the hash values of the evidence files are stored in the block chain, and when the evidence files are called, the hash values of the evidence files to be called are subjected to consensus matching verification in the block chain, so that whether the evidence files to be called are tampered or not can be determined according to the verification result, the actual conditions of the evidence files can be timely known, and the follow-up processing actions of the evidence files can be timely arranged.
Fig. 5 shows an apparatus for tamper-proofing an evidence document, which includes a scanning module, a matching module 42, a determining module 43, and a storage module 44, where the scanning module includes a first scanning module 411 and a second scanning module 412, where:
the first scanning module 411 is configured to determine a hash value corresponding to the evidence file before the evidence file to be called is called;
the storage module 44 is configured to perform consensus storage verification on the hash values of the evidence files in the blockchain nodes, and store the hash values synchronously after the verification is passed;
the second scanning module 412 is further configured to determine a hash value corresponding to the evidence file to be called;
the matching module 42 is configured to perform consensus matching verification on the hash value of the to-be-called evidence file in a block chain node to obtain a verification result;
and the determining module 43 is configured to determine whether the evidence file to be called is tampered according to the verification result.
Furthermore, the system also comprises a counting module which is used for counting the storage number of the evidence files and the verification number of the evidence files to be called.
Since the principle of the apparatus according to the embodiment of the present invention is the same as that of the method according to the above embodiment, further details are not described herein for further explanation.
It should be noted that, in the embodiment of the present invention, the relevant functional unit may be implemented by a hardware processor (hardware processor).
According to the tamper-proof device for the evidence files, the hash values of the evidence files are stored in the block chain, and when the evidence files are called, the hash values of the evidence files to be called are subjected to consensus matching verification in the block chain, so that whether the evidence files to be called are tampered or not can be determined according to the verification result, the actual conditions of the evidence files can be timely known, and the follow-up processing actions of the evidence files can be timely arranged.
Fig. 6 shows an apparatus for preventing evidence document from being tampered, which includes an identity verification module 45, a scanning module, a matching module 42, a determination module 43, and a storage module 44, where the scanning module includes a first scanning module 411 and a second scanning module 412, where:
the identity authentication module 45 is configured to perform consensus identity authentication on the node certificate in the block chain node before performing consensus storage authentication on the hash value of the evidence file, and inform the storage module of performing hash value consensus storage on the evidence file after the authentication is passed;
the first scanning module 411 is configured to determine a hash value corresponding to the evidence file before the evidence file to be called is called;
the storage module 44 is configured to perform consensus storage verification on the hash values of the evidence files in the blockchain nodes, and store the hash values synchronously after the verification is passed;
the second scanning module 412 is further configured to determine a hash value corresponding to the evidence file to be called;
the matching module 42 is configured to perform consensus matching verification on the hash value of the to-be-called evidence file in a block chain node to obtain a verification result;
and the determining module 43 is configured to determine whether the evidence file to be called is tampered according to the verification result.
Since the principle of the apparatus according to the embodiment of the present invention is the same as that of the method according to the above embodiment, further details are not described herein for further explanation.
It should be noted that, in the embodiment of the present invention, the relevant functional unit may be implemented by a hardware processor (hardware processor).
According to the tamper-proof device for the evidence files, the hash values of the evidence files are stored in the block chain, and when the evidence files are called, the hash values of the evidence files to be called are subjected to consensus matching verification in the block chain, so that whether the evidence files to be called are tampered or not can be determined according to the verification result, the actual conditions of the evidence files can be timely known, and the follow-up processing actions of the evidence files can be timely arranged.
Fig. 7 illustrates a physical structure diagram of an electronic device, and as shown in fig. 7, the electronic device may include: a processor (processor)71, a communication Interface (Communications Interface)72, a memory (memory)73 and a communication bus 74, wherein the processor 71, the communication Interface 72 and the memory 73 are communicated with each other via the communication bus 74. Processor 71 may call logic instructions in memory 73 to perform the following method: determining a hash value corresponding to the evidence file to be called; carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result; and determining whether the evidence file to be called is tampered or not according to the verification result.
In addition, the logic instructions in the memory 73 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
An embodiment of the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the tamper-proofing method for an evidence file provided in the foregoing embodiments when executed by a processor, and the tamper-proofing method includes: determining a hash value corresponding to the evidence file to be called; carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result; and determining whether the evidence file to be called is tampered or not according to the verification result.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. An evidence document tamper-proofing method, comprising:
determining a hash value corresponding to the evidence file to be called;
carrying out consensus matching verification on the hash value of the evidence file to be called in a block chain node to obtain a verification result;
and determining whether the evidence file to be called is tampered or not according to the verification result.
2. The tamper-proof method for the evidence file according to claim 1, further comprising a step of storing the evidence file before the evidence file to be called is called, the step comprising:
determining a hash value corresponding to the evidence file;
and carrying out consensus storage verification on the hash value of the evidence file in the block chain node, and synchronously storing the hash value after the verification is passed.
3. The tamper-proofing method for the evidence file according to claim 2, further comprising an identity verification step before the common storage verification of the hash value of the evidence file, the step comprising: and carrying out consensus identity verification on the node certificate in the block chain node, and carrying out Hash value consensus storage on the evidence file after the verification is passed.
4. The tamper-proofing method for the evidence files according to claim 1, further comprising the step of counting the number of stored evidence files and the number of verifications of the evidence files to be called.
5. An apparatus for tamper-proofing an evidence document, comprising:
the scanning module is used for determining a hash value corresponding to the evidence file to be called;
the matching module is used for carrying out consensus matching verification on the hash value of the evidence file to be called in the block chain node to obtain a verification result;
and the determining module is used for determining whether the evidence file to be called is tampered according to the verification result.
6. The tamper-resistant device for the evidence files according to claim 5, further comprising a storage module, configured to perform consensus storage verification on the hash values of the evidence files in the blockchain nodes, and store the hash values synchronously after the verification is passed;
correspondingly, the scanning module is further configured to determine a hash value corresponding to the evidence file before the evidence file to be called is called.
7. The tamper-resistant device for the evidence file according to claim 6, further comprising an identity verification module, configured to perform consensus identity verification on the node certificate in the blockchain node before performing consensus storage verification on the hash value of the evidence file, and notify the storage module to perform hash value consensus storage of the evidence file after the verification is passed.
8. The tamper-resistant device for the evidence files according to claim 5, further comprising a statistic module for counting the storage number of the evidence files and the verification number of the evidence files to be called.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program implements the steps of the method of tamper-proofing an evidence file according to any one of claims 1 to 4.
10. A non-transitory computer readable storage medium, on which a computer program is stored, which, when executed by a processor, performs the steps of the method for tamper-proofing an evidence document according to any one of claims 1 to 4.
CN201910866445.0A 2019-09-12 2019-09-12 Tamper-proof method and device for evidence file Active CN110674532B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910866445.0A CN110674532B (en) 2019-09-12 2019-09-12 Tamper-proof method and device for evidence file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910866445.0A CN110674532B (en) 2019-09-12 2019-09-12 Tamper-proof method and device for evidence file

Publications (2)

Publication Number Publication Date
CN110674532A true CN110674532A (en) 2020-01-10
CN110674532B CN110674532B (en) 2021-08-03

Family

ID=69076767

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910866445.0A Active CN110674532B (en) 2019-09-12 2019-09-12 Tamper-proof method and device for evidence file

Country Status (1)

Country Link
CN (1) CN110674532B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113312326A (en) * 2020-02-26 2021-08-27 伊姆西Ip控股有限责任公司 Method, electronic device and computer program product for storage management

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018026727A1 (en) * 2016-08-01 2018-02-08 Cryptowerk Corp. Computer-implemented method and system of tamper-evident recording of a plurality of service data items
CN109067543A (en) * 2018-07-24 2018-12-21 腾讯科技(深圳)有限公司 Digital certificate management method, device, computer equipment and storage medium
CN109766390A (en) * 2019-01-16 2019-05-17 杭州趣链科技有限公司 A kind of tamper-evident means diploma system based on block chain
CN110061851A (en) * 2019-04-28 2019-07-26 广州大学 A kind of across trust domain authentication method and system of decentralization

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018026727A1 (en) * 2016-08-01 2018-02-08 Cryptowerk Corp. Computer-implemented method and system of tamper-evident recording of a plurality of service data items
CN109067543A (en) * 2018-07-24 2018-12-21 腾讯科技(深圳)有限公司 Digital certificate management method, device, computer equipment and storage medium
CN109766390A (en) * 2019-01-16 2019-05-17 杭州趣链科技有限公司 A kind of tamper-evident means diploma system based on block chain
CN110061851A (en) * 2019-04-28 2019-07-26 广州大学 A kind of across trust domain authentication method and system of decentralization

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113312326A (en) * 2020-02-26 2021-08-27 伊姆西Ip控股有限责任公司 Method, electronic device and computer program product for storage management
US11947427B2 (en) 2020-02-26 2024-04-02 EMC IP Holding Company LLC Method, electronic device, and computer program product for storage management using blockchain
CN113312326B (en) * 2020-02-26 2024-04-16 伊姆西Ip控股有限责任公司 Method, electronic device and computer program product for storage management

Also Published As

Publication number Publication date
CN110674532B (en) 2021-08-03

Similar Documents

Publication Publication Date Title
US11610019B2 (en) Information management method, apparatus, and information management system
JP2021507339A5 (en)
CN113574838A (en) System and method for filtering internet traffic through client fingerprints
CN109784870B (en) Contract management method, contract management device, computer equipment and computer readable storage medium
CN109684878B (en) Privacy information tamper-proofing method and system based on block chain technology
CN112800404B (en) Cross-link access control method and device
CN109543457B (en) Method and device for controlling calling between intelligent contracts
CN106327140B (en) Method and device for monitoring data modification
CN110599207A (en) Invoice verification method, invoice verification device, invoice verification server and storage medium
CN113743833B (en) Production control method and system based on identification analysis
CN112184436B (en) Data synchronization method, electronic device and readable storage medium
CN111028077B (en) Intelligent contract protection method and system based on input filter
CN110266765B (en) Real-time updating method and device for Internet of things online consensus node based on block chain
CN110223075B (en) Identity authentication method and device, computer equipment and storage medium
CN110674532B (en) Tamper-proof method and device for evidence file
CN115242434A (en) Application program interface API identification method and device
CN111585978A (en) Method, client, server and system for intercepting false requests
CN112751807B (en) Secure communication method, device, system and storage medium
CN109960919B (en) Contract signing method and block link point equipment
CN114491653A (en) Data content tamper-proof system, method and device
CN112765588B (en) Identity recognition method and device, electronic equipment and storage medium
CN108304728A (en) A kind of method, apparatus and computer-readable medium of TERMINAL DEFENSE
CN114553563B (en) Verification method and device without back display loopholes, electronic equipment and readable storage medium
CN117349867B (en) Intelligent contract deployment method, system, equipment and medium
CN112685496B (en) Distributed system and data processing method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant