CN112613062B - Judicial auxiliary case data encryption protection method - Google Patents
Judicial auxiliary case data encryption protection method Download PDFInfo
- Publication number
- CN112613062B CN112613062B CN202110130946.XA CN202110130946A CN112613062B CN 112613062 B CN112613062 B CN 112613062B CN 202110130946 A CN202110130946 A CN 202110130946A CN 112613062 B CN112613062 B CN 112613062B
- Authority
- CN
- China
- Prior art keywords
- data
- case data
- case
- information
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000013523 data management Methods 0.000 claims abstract description 12
- 238000013524 data verification Methods 0.000 claims abstract description 10
- 238000012795 verification Methods 0.000 claims description 15
- 238000013500 data storage Methods 0.000 claims description 3
- 230000006872 improvement Effects 0.000 abstract description 2
- 230000008569 process Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Abstract
The invention relates to a judicial auxiliary case data encryption protection method, belonging to the technical field of judicial auxiliary case data encryption protection; the technical problems to be solved are as follows: an improvement of a judicial auxiliary case data encryption protection method is provided; the technical scheme adopted for solving the technical problems is as follows: installing a case data encryption system at a server end, and respectively setting a data verification service and a data management service; adding a time stamp into the original data, keeping the original data intact and unchanged, then starting a data verification service, controlling an encryption system to receive electronic case data information in judicial auxiliary work, verifying the received electronic case data information to form a new data value, and generating a data fingerprint of the original file; starting a data management service, controlling an encryption system to encrypt and store electronic case data conforming to the working rule according to the corresponding working rule; decrypting and reading the encrypted and stored electronic case data; the invention is applied to judicial auxiliary case data protection.
Description
Technical Field
The invention discloses a judicial auxiliary case data encryption protection method, and belongs to the technical field of judicial auxiliary case data encryption protection.
Background
The national governance system and the promotion of modernization construction of governance capability can be truly realized into the management standard of the notarization industry through the participation of notarization in the construction of an informatization standard system in the judicial auxiliary business work of the national institutes; at present, the protection of data generated, transmitted and processed in the judicial auxiliary working process is important, the personal information of citizens is lost, and the confidential files and internal meeting files of judicial departments are lost; at present, more and more modern data processing and communication devices are used in the process of case handling and case examination, and the devices have risks of unstable data transmission, lost data, easy theft and tampering during work, and the risks should be avoided during judicial auxiliary informatization work, so a set of reliable informatization data protection methods are needed to overcome the defects, and the corresponding data management application flow is optimized.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, and solves the technical problems that: an improvement of a judicial auxiliary case data encryption protection method is provided.
In order to solve the technical problems, the invention adopts the following technical scheme: a judicial auxiliary case data encryption protection method comprises the following protection steps:
step one: installing a case data encryption system at a server end, and respectively setting a data verification service and a data management service;
step two: adding a time stamp into the original data, keeping the original data intact and unchanged, starting a data verification service, controlling an encryption system to receive electronic case data information in judicial auxiliary work, and verifying the received electronic case data information to form a new data value; when the verification is completed, generating a data fingerprint of the original file of the electronic case data;
step three: starting a data management service, controlling an encryption system to encrypt electronic case data conforming to a working rule according to the corresponding working rule, encrypting after each reading and returning of new data storage, and checking the electronic case data by adopting a regular verification method;
step four: and carrying out corresponding encryption and storage operation on the electronic case data:
step 4.1: encrypting an element A in case data X information by using a regular verification method, generating case ciphertext data A+ of the element A after encryption, and storing the data A+ into original case data X information;
step 4.2: encrypting the B element in the case data X information by using a regular verification method, and simultaneously storing the B element and the ciphertext data A+ generated in the step 4.1;
step 4.3: encrypting and storing the rest elements in the case data X information according to the contents of the step 4.1 and the step 4.2 repeatedly;
step five: reading the encrypted and stored electronic case data, performing multiple decryption on the encrypted fixed case data to obtain the fixed electronic case data, verifying the MD5 value and the timestamp of the data, and taking the data as new data for reading and using after verification.
And step two, the generated data fingerprint marks the corresponding case data original file, and the storage address of the case data original file, the corresponding user information and the generated data fingerprint are stored.
And in the third step, the data management service encrypts and stores different types of elements of the same case information according to the elements stored in the case.
Compared with the prior art, the invention has the following beneficial effects: the data encryption protection method provided by the invention applies multiple asymmetric encryption technologies to judicial informatization work, effectively improves and stabilizes the security of case data through multiple encryption when important case data is transmitted, builds an intensive judicial data application service based on an encryption mechanism of judicial auxiliary case data, optimizes a traditional case-handling data transmission mode, and improves the efficiency and the security of case-handling related information transmission.
Drawings
The invention is further described below with reference to the accompanying drawings:
fig. 1 is a flow chart of the steps of the judicial auxiliary case data encryption protection method of the present invention.
Detailed Description
As shown in fig. 1, the present invention provides a judicial auxiliary case data encryption protection method, and the implementation of the protection method is based on the data verification service processing and the data management service processing functions set in a management system;
the data verification service process is used for receiving electronic case data information in judicial auxiliary work, verifying the received electronic case data information and then forming a new data value;
and the data management service process checks the case data according to a specific working rule by using a regular verification method. Encryption is carried out after the rule is met, and encryption is carried out after each time reading and new data storage return occur, so that data is prevented from being tampered halfway.
The data verification service processing adds a time stamp to the original data before data verification, and keeps the data complete and unchanged; and when the verification is finished, generating data fingerprints of the case data original file, wherein one data fingerprint identifies the corresponding case data file, and storing the storage address of the case data original file, the corresponding user information and the generated data fingerprints.
And the data management service processes and encrypts and stores different types of elements of the same case information according to the elements stored in the case.
The encryption and storage method comprises the following steps:
(1) And encrypting the element A in the case data X information by using a regular verification method, generating case ciphertext data A+ of the element A after encryption, and storing the case ciphertext data A+ into the original case data X information.
(2) B elements in the case data X information are encrypted by a regular verification method, and the encrypted case data X information and the ciphertext data A+ generated in the last step are stored simultaneously.
(3) The other elements in the case data information X are repeatedly encrypted and stored according to the previous two steps.
According to the judicial auxiliary information working method provided by the invention, the case data reading method based on the multiple asymmetric encryption technology sequentially and respectively carries out multiple decryption on the fixed case data subjected to multiple asymmetric encryption to obtain the fixed case data, verify the MD5 value and the timestamp, and can carry out new data reading and use after verification is correct.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.
Claims (3)
1. A judicial auxiliary case data encryption protection method is characterized in that: the method comprises the following protection steps:
step one: installing a case data encryption system at a server end, and respectively setting a data verification service and a data management service;
step two: adding a time stamp into the original data, keeping the original data intact and unchanged, starting a data verification service, controlling an encryption system to receive electronic case data information in judicial auxiliary work, and verifying the received electronic case data information to form a new data value; when the verification is completed, generating a data fingerprint of the original file of the electronic case data;
step three: starting a data management service, controlling an encryption system to encrypt electronic case data conforming to a working rule according to the corresponding working rule, encrypting after each reading and returning of new data storage, and checking the electronic case data by adopting a regular verification method;
step four: and carrying out corresponding encryption and storage operation on the electronic case data:
step 4.1: encrypting an element A in case data X information by using a regular verification method, generating case ciphertext data A+ of the element A after encryption, and storing the data A+ into original case data X information;
step 4.2: encrypting the B element in the case data X information by using a regular verification method, and simultaneously storing the B element and the ciphertext data A+ generated in the step 4.1;
step 4.3: encrypting and storing the rest elements in the case data X information according to the contents of the step 4.1 and the step 4.2 repeatedly;
step five: reading the encrypted and stored electronic case data, performing multiple decryption on the encrypted fixed case data to obtain the fixed electronic case data, verifying the MD5 value and the timestamp of the data, and taking the data as new data for reading and using after verification.
2. The judicial auxiliary case data encryption protection method according to claim 1, wherein: and step two, the generated data fingerprint marks the corresponding case data original file, and the storage address of the case data original file, the corresponding user information and the generated data fingerprint are stored.
3. The judicial auxiliary case data encryption protection method according to claim 1, wherein: and in the third step, the data management service encrypts and stores different types of elements of the same case information according to the elements stored in the case.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110130946.XA CN112613062B (en) | 2021-01-30 | 2021-01-30 | Judicial auxiliary case data encryption protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110130946.XA CN112613062B (en) | 2021-01-30 | 2021-01-30 | Judicial auxiliary case data encryption protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112613062A CN112613062A (en) | 2021-04-06 |
CN112613062B true CN112613062B (en) | 2024-02-09 |
Family
ID=75254665
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110130946.XA Active CN112613062B (en) | 2021-01-30 | 2021-01-30 | Judicial auxiliary case data encryption protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112613062B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106713336A (en) * | 2017-01-03 | 2017-05-24 | 厦门法信公证云科技有限公司 | Electronic data safekeeping system and method based on double and asymmetric encryption technology |
CN108090851A (en) * | 2018-02-07 | 2018-05-29 | 武汉上点点信息有限公司 | A kind of network arbitration movement confirms batch case operation system |
CN207753794U (en) * | 2018-01-31 | 2018-08-21 | 成都世纪智慧科技有限公司 | Electronic evidence-collecting equipment with remote collaboration function |
CN110109864A (en) * | 2019-04-17 | 2019-08-09 | 湖北瑞特威网络工程有限公司 | Folder document management method based on invisible two-dimensional codes as mark |
CN110392043A (en) * | 2019-06-21 | 2019-10-29 | 法信公证云(厦门)科技有限公司 | A kind of method and system for assigning electronic contract notarization and enforcing effect |
CN111275399A (en) * | 2020-01-20 | 2020-06-12 | 北京合信力科技有限公司 | Method and device for processing litigation case data |
CN111708658A (en) * | 2020-06-09 | 2020-09-25 | 孟磊 | Judicial-assisted case data risk management system and application method thereof |
CN111932413A (en) * | 2020-09-14 | 2020-11-13 | 平安国际智慧城市科技股份有限公司 | Case element extraction method, case element extraction device, case element extraction equipment and case element extraction medium |
CN111984989A (en) * | 2020-09-01 | 2020-11-24 | 上海梅斯医药科技有限公司 | Method, device, system and medium for verifying, issuing and accessing URL (uniform resource locator) |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100211484A1 (en) * | 2009-02-13 | 2010-08-19 | Centergistic Solutions, Inc. | Electronic bankruptcy claims filing system |
-
2021
- 2021-01-30 CN CN202110130946.XA patent/CN112613062B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106713336A (en) * | 2017-01-03 | 2017-05-24 | 厦门法信公证云科技有限公司 | Electronic data safekeeping system and method based on double and asymmetric encryption technology |
CN207753794U (en) * | 2018-01-31 | 2018-08-21 | 成都世纪智慧科技有限公司 | Electronic evidence-collecting equipment with remote collaboration function |
CN108090851A (en) * | 2018-02-07 | 2018-05-29 | 武汉上点点信息有限公司 | A kind of network arbitration movement confirms batch case operation system |
CN110109864A (en) * | 2019-04-17 | 2019-08-09 | 湖北瑞特威网络工程有限公司 | Folder document management method based on invisible two-dimensional codes as mark |
CN110392043A (en) * | 2019-06-21 | 2019-10-29 | 法信公证云(厦门)科技有限公司 | A kind of method and system for assigning electronic contract notarization and enforcing effect |
CN111275399A (en) * | 2020-01-20 | 2020-06-12 | 北京合信力科技有限公司 | Method and device for processing litigation case data |
CN111708658A (en) * | 2020-06-09 | 2020-09-25 | 孟磊 | Judicial-assisted case data risk management system and application method thereof |
CN111984989A (en) * | 2020-09-01 | 2020-11-24 | 上海梅斯医药科技有限公司 | Method, device, system and medium for verifying, issuing and accessing URL (uniform resource locator) |
CN111932413A (en) * | 2020-09-14 | 2020-11-13 | 平安国际智慧城市科技股份有限公司 | Case element extraction method, case element extraction device, case element extraction equipment and case element extraction medium |
Non-Patent Citations (1)
Title |
---|
司法鉴定报告多人签名技术研究;李勋 等;;电脑知识与技术;第6卷(第25期);第6959-6962页 * |
Also Published As
Publication number | Publication date |
---|---|
CN112613062A (en) | 2021-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112929172B (en) | System, method and device for dynamically encrypting data based on key bank | |
WO2020244070A1 (en) | Digital information encryption method and apparatus, computer device, and storage medium | |
US10904231B2 (en) | Encryption using multi-level encryption key derivation | |
CN107766741A (en) | Data desensitization system and method | |
CN103530201A (en) | Safety data repetition removing method and system applicable to backup system | |
US20160344553A1 (en) | Storing and retrieving ciphertext in data storage | |
CN106067874B (en) | It is a kind of by the method for data record to server end, terminal and server | |
WO2021217939A1 (en) | Data processing method and apparatus for blockchain, and readable storage medium | |
CN111061798A (en) | Configurable data transmission and monitoring method, equipment and medium | |
CN110555310A (en) | private data secure storage and sharing method and device thereof | |
CN102236767B (en) | In conjunction with the file encrypting method of cryptographic hash | |
CN112613062B (en) | Judicial auxiliary case data encryption protection method | |
CN113420049A (en) | Data circulation method and device, electronic equipment and storage medium | |
CN105989482A (en) | Data encryption method | |
US20230041862A1 (en) | Cloud-side collaborative multi-mode private data circulation method based on smart contract | |
CN112686648B (en) | Electronic signature management method and system for auditing signature file | |
CN113660205B (en) | Encryption method for software authorization code | |
CN112187909B (en) | Financing information generation system and method based on block chain | |
CN114154185A (en) | Data encryption storage method based on national cryptographic algorithm | |
CN113810421A (en) | Block chain-based PRE Internet of things data sharing method and system | |
CN112329066A (en) | Data file encryption method and system | |
US20070192589A1 (en) | System and method for encrypting webpage logs | |
CN106779645B (en) | Information encryption method and device | |
CN202309732U (en) | Device for executing digital signature of symmetric key | |
CN114185649A (en) | Virtual cipher machine container mirror image protection method based on cryptographic technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |