CN113343313A - Verification report validity identification method, legal service system and readable storage medium - Google Patents

Verification report validity identification method, legal service system and readable storage medium Download PDF

Info

Publication number
CN113343313A
CN113343313A CN202110735618.2A CN202110735618A CN113343313A CN 113343313 A CN113343313 A CN 113343313A CN 202110735618 A CN202110735618 A CN 202110735618A CN 113343313 A CN113343313 A CN 113343313A
Authority
CN
China
Prior art keywords
verification
verification report
report
electronic
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110735618.2A
Other languages
Chinese (zh)
Inventor
刘军娥
赵余萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Financial Certification Authority Co ltd
Original Assignee
China Financial Certification Authority Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Financial Certification Authority Co ltd filed Critical China Financial Certification Authority Co ltd
Priority to CN202110735618.2A priority Critical patent/CN113343313A/en
Publication of CN113343313A publication Critical patent/CN113343313A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/194Calculation of difference between files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Tourism & Hospitality (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Primary Health Care (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a verification report validity identification method, a legal service system and a readable storage medium, wherein the method comprises the following steps: receiving an electronic file and a corresponding verification report thereof; determining a verification unit corresponding to the verification report according to the digital signature in the verification report; collecting a first hash value recorded in the verification report; selecting a corresponding hash algorithm according to the verification unit to calculate the electronic file to obtain a second hash value; and judging whether the first hash value and the second hash value are matched, if so, judging that the electronic file is not tampered, and solving the problems of low efficiency and poor accuracy existing in the verification of the validity of the verification report by manual work at present.

Description

Verification report validity identification method, legal service system and readable storage medium
Technical Field
The invention relates to the technical field of information. In particular, the present invention relates to a verification report validity authentication method, a legal service system, and a readable storage medium.
Background
With the development of electronic technology, the contract signing form is gradually changed from paper contract to electronic contract, and the signature mode is also changed from traditional hand-written signature or stamping to electronic signature. The Electronic contract is a contract established in an Electronic manner, and processes such as signing, negotiation and the like of the Electronic contract can be carried out through Electronic mail, Electronic data interchange (abbreviated as EDI) and the like, and the processes are all carried out paperlessly, so the Electronic contract has the advantages of convenience in transmission, saving and the like. In an electronic contract, however, the electronic signature may indicate the source of the document, constituting proof that the signer of the contract is responsible for the correctness and integrity of the document. In order to provide assurance of the security, reliability of electronic transactions and the integrity of signed documents, services are also proposed in the art to verify the authenticity of electronic signatures and their signers. The third party organization verifies the electronic signature and the authenticity of the electronic signature and generates a corresponding verification report by a certain method so as to prove whether the electronic contract is falsified after self-signing, thereby ensuring the safety and reliability of the electronic transaction. And the verification report can be submitted together with the electronic evidence as the basis for confirming the case fact when disputes occur.
After submitting the electronic contract and the verification report to the court as evidence, the judge needs to check the integrity of the verification report and the corresponding relationship between the verification report and the electronic contract. Currently, a judge usually verifies the correspondence between the electronic contract and the verification report by verifying the electronic contract name or the hash value. This approach has the following problems: first, if the electronic contract name is tampered with, the judge can not completely verify the corresponding relationship between the electronic contract and the verification report by only verifying the electronic contract name, and thus, correct judgment cannot be made. And secondly, except for name verification, judgment can be carried out through the hash value, and since the hash value is an irregular character string with a certain length, if the hash value is judged manually, the auditing process is not convenient and efficient enough. Moreover, if the authentication report is forged and falsified, the forgery and the falsification can not be verified, and the difficulty is increased for the justice of the case.
Disclosure of Invention
To solve at least the technical problems described in the background section above, the present invention proposes a solution for validation report validity verification for legal services. By utilizing the scheme of the invention, the corresponding relation between the verification report and the electronic file can be effectively determined in some scenes, thereby being beneficial to realizing the quick and correct affirmation of case facts. In view of this, the present invention provides solutions in the following aspects.
In a first aspect, the present invention provides a validation report validity identification method for legal services, comprising: receiving an electronic file and a corresponding verification report thereof; determining a verification unit corresponding to the verification report according to the digital signature in the verification report; collecting a first hash value recorded in the verification report; selecting a corresponding hash algorithm according to the verification unit to calculate the electronic file to obtain a second hash value; and judging whether the first hash value and the second hash value are matched, and if so, judging that the electronic file is not tampered.
In one embodiment, the electronic document includes one or more of an electronic contract, an electronic proof, and an electronic proof deposit.
In one embodiment, the electronic proof deposit comprises one or more of a copyright protection deposit, an electronic proof deposit, a web page deposit, and a business deposit.
In one embodiment, the method further comprises the step of verifying the integrity of the verification report.
In one embodiment, said verifying the integrity of the verification report comprises: decrypting the digital signature of the verification report to obtain a first digital digest; calculating the verification report to obtain a second digital abstract; and comparing the first digital abstract with the second digital abstract, and if the first digital abstract and the second digital abstract are the same, completing the verification report.
In one embodiment, wherein determining the verification unit corresponding to the verification report according to the digital signature in the verification report comprises: acquiring a digital certificate corresponding to the verification report; and matching the digital certificate with the digital certificates of all verification units to determine the verification units which are successfully matched.
In one embodiment, the digital certificate includes one or more of a certificate serial number, a subject, and an issuer.
In one embodiment, further comprising: if not, all non-matching entries are listed.
In a second aspect, the invention provides a legal service system comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the methods of the first aspect and embodiments described above when executing the computer program.
In a third aspect, the present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method of the first aspect and embodiments described above.
According to the invention, the first hash value recorded in the verification report is collected, the verification unit is determined according to the digital signature in the verification report, and the corresponding hash algorithm is selected according to the verification unit to calculate the electronic file to obtain the second hash value. In this way, on the one hand, the validity of the verification report is simply verified, and on the other hand, the hash value of the electronic file can be calculated according to the hash algorithm corresponding to the verification unit. And then judging whether the first hash value and the second hash value are matched or not, and judging whether the first hash value and the second hash value are tampered or not according to a matching result. Through the process, the corresponding relation between the verification report and the electronic file can be judged, so that the validity of the verification report can be rapidly and intuitively identified by a user (judge). When any one of the electronic file or the verification report is tampered, the method can obtain the identification result that the electronic file and the verification report do not correspond (are not matched) with each other, so that at the evidence acceptance stage, a judicial authority can accurately judge the authenticity of the electronic file and the verification report, and fair legal service is provided.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present invention will become readily apparent from the following detailed description read in conjunction with the accompanying drawings. Several embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar or corresponding parts and in which:
fig. 1 is a partial schematic view schematically showing an electronic contract validation report in a validation report validity authentication method for legal services to which the present invention is applied;
FIG. 2 is a partial schematic view schematically showing a validation report of an electronic contract and electronic proof in which the validation report validity authentication method for legal services of the present invention is applied;
FIG. 3 is a flow chart that schematically illustrates a validation report validity evaluation method for legal services in accordance with the present invention;
FIG. 4 is a flow diagram that schematically illustrates verifying the integrity of a verification report using a digital signature that includes a hashing algorithm, in accordance with an embodiment of the present invention;
FIG. 5 is a flow diagram schematically illustrating a method for verifying the integrity of a report based on digital signature detection of an asymmetric key cryptosystem according to an embodiment of the present invention;
FIG. 6 is a flow diagram that schematically illustrates a method of determining a verification unit to which a verification report corresponds, in accordance with an embodiment of the present invention;
fig. 7 is a schematic diagram schematically illustrating a legal service system deployed at a service end according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be understood that the terms "first", "second", "third" and "fourth", etc. in the claims, the description and the drawings of the present invention are used for distinguishing different objects and are not used for describing a particular order. The terms "comprises" and "comprising," when used in the specification and claims of this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification and claims of this application, the singular form of "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should be further understood that the term "and/or" as used in the specification and claims of this specification refers to any and all possible combinations of one or more of the associated listed items and includes such combinations.
The following detailed description of embodiments of the invention refers to the accompanying drawings.
Fig. 1 and 2 are schematic diagrams schematically showing different application scenarios (different types of verification reports) to which the verification report validity authentication method 100 for legal services of the present invention is applied. In the context of the present invention, the foregoing scenario may include validity verification for the electronic contract and the verification report (signature verification report), may also include validity verification for the electronic contract and its scenario evidence and the corresponding verification report, and may also include validity verification for the evidence preservation report and the electronic evidence.
Before describing the technical solution of the present invention in detail, first, the contents of the verification report issued by each verification unit (certification authority) will be described. The verification report contains the digital signature of the verification unit, and also contains the original text (at least including the original document name) of the electronic file and the corresponding hash value. Specifically, taking the example of verifying an electronic contract and generating a corresponding verification report, the issuance of the verification report requires the following procedure. The verification unit generates a verification report corresponding to the electronic contract after verifying the integrity and authenticity of the digital signature in the electronic contract. Whether the electronic contract is tampered with or not is described in the verification report, information of a digital certificate in the electronic contract and the like are described, then appendix one is added to the verification report, and the hash value of the electronic contract is recorded in an agreed format, as shown in fig. 1, wherein the hash value of the electronic contract can be recorded in the second column of the second row, which is identified by "[ hash value ]. The verification unit then uses digital signature technology to sign the verification report by using a special electronic signature (containing a digital certificate) for the verification, so that the verification report comprises a digital signature for proving the identity information of the verification unit.
The foregoing describes in detail a verification report corresponding to an electronic contract, and the verification report may also issue a verification report for a plurality of scenario evidences together with the electronic contract, where in addition to recording the hash value of the electronic contract, the verification report may also record the hash values of the plurality of scenario evidences according to an agreed format. Specifically, in addition to the appendix one, appendix two may be added to the verification report, and hash values of a plurality of scene evidence files may be recorded in a default format. In one implementation scenario, as shown in FIG. 2 for appendix one and appendix two, the hash value may be identified in appendix two by a convention delimiter, which may be denoted, for example, by "({ hash value })".
While the application scenarios of the present invention have been briefly described above in conjunction with fig. 1 and 2, it is to be understood that the above description is intended to be illustrative and not restrictive and that variations may be made in the scenarios illustrated in fig. 1 and 2 in accordance with the teachings of the present invention by those skilled in the art without departing from the spirit and the spirit of the present invention. For example, the scenario is suitable for validity verification of electronic contracts and verification reports (signature verification reports) by a court at the evidence acceptance stage. The scene is also suitable for evidence preservation reports and verification of the validity of electronic evidence in an evidence collection stage.
FIG. 3 is a flow chart that schematically illustrates a validation report validation method 100 for legal services in accordance with the present invention.
As shown in fig. 3, at step S101, an electronic file and its corresponding verification report are received. In some application scenarios, the type of the electronic file may include an electronic contract, electronic evidence deposit, and the like. The electronic evidence may include one or more of copyright protection evidence, electronic evidence, webpage evidence and business evidence. The type of verification report may include a digitally signed verification report, an evidence preservation report, and the like. In one implementation scenario, a user (e.g., a judge) may be prompted to upload an electronic file (e.g., an electronic contract) of a certain type of the aforementioned electronic file types and a corresponding verification report thereof, and then after acquiring the electronic file and the verification report, a validity verification process of the verification report described below is performed. Multiple electronic file types (such as electronic contracts, scene evidences and corresponding verification reports) can also be acquired at the same time, and validity verification is performed on the multiple electronic files and the corresponding verification reports at the same time.
Next, at step S102, the verification unit corresponding to the verification report is determined according to the digital signature in the verification report. Because the algorithms (encryption mode, hash algorithm, etc.) used by different certification authorities (verification units) are not completely the same, before the validity of the verification report is verified, the electronic signature in the verification report can be collected and confirmed to determine the verification unit corresponding to the verification report, so as to obtain the algorithm (such as hash algorithm, etc.) used by the verification unit.
Next, according to the verification file form described above, at step S103, a first hash value recorded in the verification report is collected, and the first hash value may be, for example, a hash value as shown in fig. 1:
“93a856f4a1fc0cea27066c8c1fcfb14a2cdb44696d3a142c19c92bbe50912896”
and records the first hash value. Further, the first hash value may include a combination of a plurality of different hash values, for example, the aforementioned verification report may be issued for a plurality of electronic evidences (scene evidences), in which the hash values of a plurality of scene evidence files are recorded in a promissory format. As shown in fig. 2, the hash value corresponding to the electronic contract is included:
“93a856f4a1fc0cea27066c8c1fcfb14a2cdb44696d3a142c19c92bbe50912896”
and hash values respectively corresponding to scene evidence files MultiData.txt and MultiDataPicture.txt corresponding to the electronic contract:
"1C 65131EED52A0255CE548DDF5F4140239271D 3A" and "C81A 266FB6425150A452374DFE8DD49677DB6FE 6".
After the first hash value is obtained, in step S104, a hash algorithm corresponding to the verification unit is selected according to the determined verification unit to calculate the electronic file, so as to obtain a second hash value. After the first hash value and the second hash value are obtained in the various manners described above, the flow advances to step S105. At step S105, it is determined whether the first hash value and the second hash value match, and if so, it is determined that the electronic file is not tampered.
The verification report validity determination method 100 is briefly described above, and will be described in detail below. In the foregoing solution, after determining the verification unit to which the verification report belongs, the method 200 for verifying the integrity of the verification report is further included. The detection of the integrity of the verification report may select an appropriate method depending on the form of the electronic signature in the verification report. For example, if the verification report uses a digital signature including a hash algorithm, the determination may be made in a manner of calculating a hash value according to the hash algorithm. Or the verification report adopts a digital signature based on an asymmetric key encryption system, so that the integrity of the verification report can be judged according to an original text comparison mode. Two ways of detecting the integrity of the verification report will be described separately below.
Fig. 4 is a flow diagram that schematically illustrates a method 200 of verifying the integrity of a verification report, in accordance with an embodiment of the present invention. It will be appreciated that the method flow illustrated in fig. 4 may be implemented in the exemplary scenario illustrated in fig. 3, and thus what is described with respect to fig. 3 also applies to fig. 4.
As shown in fig. 4, at step S201, the digital signature of the verification report obtained in the foregoing is decrypted to obtain a first digital digest. Next, in step S202, a second digital digest is calculated from the verification report. Then, at step S203, the first digital digest is compared with the second digital digest, and if the two digests are the same, the aforementioned verification report is complete, i.e., the verification report has not been tampered with. It is understood that the digital digest is a hash value, and therefore, when the second digital digest is calculated, the calculation is performed by using a hash algorithm corresponding to the verification unit.
The above describes in detail the way of verifying the integrity of the verification report using a digital signature including a hash algorithm, and next, the way of detecting the integrity of the verification report based on the digital signature of the asymmetric key cryptosystem will be described.
Fig. 5 is a flow chart schematically illustrating a method for verifying report integrity based on digital signature detection of asymmetric key cryptosystem according to an embodiment of the present invention. It will be appreciated that the method flow illustrated in fig. 5 may be implemented in the exemplary scenario illustrated in fig. 3, and thus what is described with respect to fig. 3 is equally applicable to fig. 5.
As shown in fig. 5, in step S301, the digital signature of the verification report is decrypted to obtain a first original document. Next, at step S302, a second textual file of the verification report is acquired. It is to be understood that the second textual file may be a textual file of the verification report, which may include information such as a name, a hash value, etc. of the corresponding electronic contract. Then, at step S303, the first textual file is compared with the first textual file, and if the first textual file and the first textual file are the same, the aforementioned verification report is complete. That is, the above-mentioned process is a process of integrity verifying the verification report by the asymmetric decryption algorithm. Through the two tests of the integrity of the verification report by using the digital signature technology, whether the original text of the file changes in the transmission process can be accurately verified, and the integrity and the authenticity of the transmission verification report are ensured.
FIG. 6 is a flow diagram that schematically illustrates a method 400 for determining, from a digital signature in the verification report, a verification unit that corresponds to the verification report, in accordance with an embodiment of the present invention. It will be appreciated that the method flow illustrated in fig. 6 may be implemented in the exemplary scenario illustrated in fig. 3, and thus what is described with respect to fig. 3 applies equally to fig. 6.
As shown in fig. 6, the method 400 for determining the verification unit corresponding to the verification report according to the digital signature in the verification report includes the following steps: at step S401, a digital certificate corresponding to the aforementioned verification report is acquired. The digital certificate, with which the signature can be implemented, can be encrypted and decrypted using a pair of keys. Therefore, the digital signature in the present invention generally includes a digital certificate, and the digital certificate can guarantee the integrity and security of information and data in an encrypted or decrypted form. Specifically, the digital certificate may include one or more of a certificate serial number, a subject DN (unique Name of the certificate holder), and an issuer DN. Next, at step S402, the digital certificate is matched with the digital certificate of each authentication unit, and if the matching is successful, the aforementioned authentication report is issued by the authentication unit. In one implementation scenario, the digital certificate of each authentication unit may be stored in the cloud, server, or local computer for easy recall when performing the comparison. For example, digital certificates adopted by ten verification units approved by judicial authorities are stored in the cloud database, and after the digital certificate corresponding to the verification report is acquired, the digital certificate corresponding to each verification unit in the database is compared with the digital certificate corresponding to the verification unit, so that the verification unit corresponding to the verification report is determined. Then, after the verification unit successfully matched with the electronic file is obtained, the hash value of the electronic file can be calculated according to the hash algorithm adopted by the verification unit.
The method for determining the authentication unit for issuing the authentication report by using the digital certificate is described above. In order to determine the verification unit more quickly and conveniently, the verification unit may also be directly input by the user, for example, the user directly inputs the corresponding verification unit in addition to the electronic file and the corresponding verification report, and then after receiving the electronic file, the verification report and the verification unit input by the user, the user may directly call information such as a digital signature or a digital certificate of the verification unit to confirm the verification report, so that a process of matching the verification report with various types of information (such as an electronic signature, a digital certificate, and the like) of each verification unit is omitted, and thus, the efficiency of validity identification of the verification report is effectively improved.
It is explained in the foregoing that when the first hash value and the second hash value match, then the electronic file and the verification report are corresponding, i.e., the verification report matches the electronic contract and the verification report is valid. However, in performing the above-described plurality of matching processes, there may be a plurality of cases of mismatching. If no match occurs during the process of obtaining the first hash value and the second hash value and performing matching, all non-matching items may be listed correspondingly. For example, the mismatch item may include various forms that the verification report is not issued by a certain verification unit, or the verification report is issued by a certain unit at a specific time, and the verification report does not match the electronic contract, or the issuing unit of the verification report is unknown.
In another aspect of the present invention, there is also provided a legal service system 500, wherein the legal service system 500 comprises a memory and a processor, the memory stores a computer program, and the processor implements the steps of the methods in the foregoing embodiments when executing the computer program. In some possible embodiments, the aforementioned legal service system 500 may also be implemented by way of a terminal/server. In one application scenario, the legal service system 500 described above may be implemented as a terminal, which may include a memory; and a processor coupled to the memory, the processor configured to perform the foregoing method based on instructions stored in the memory. When a user (e.g., a judge) needs to judge the relationship between the electronic file and the verification report issued by the third-party certification authority, a corresponding software interface or a webpage can be opened, and the electronic file and the verification report are uploaded in an input box. Further, the software interface or web page for uploading electronic files and verification reports may be arranged in various forms. In one application scenario, for example, multiple rows of input boxes may be arranged, the electronic file and the verification report in each row corresponding, and one electronic file and the corresponding verification report are uploaded in each row, respectively. In order to realize the input of the verification unit information, an input box or a selection box can be added in each row, and the verification unit corresponding to the verification report can be input or selected in the input box or the selection box. Similarly, it is also possible to provide a multi-column input box, where the electronic file and the verification report in each column are corresponding, and upload one electronic file and the corresponding verification report in each column, respectively. Moreover, because a plurality of groups of input boxes can be deployed in the interface, a plurality of groups of electronic files can be uploaded at the same time, the electronic files and the verification report can be matched at the same time, and corresponding matching results can be correspondingly output according to the arrangement sequence.
Further, the aforementioned interface for inputting the electronic file and the corresponding verification report may also be arranged in a form of inputting the verification report first, and then inputting the corresponding electronic file into the corresponding row or column, and those skilled in the art can set the form according to actual needs. In addition, when the user uploads the corresponding file, the file may adopt a document in a PDF format, or may adopt a picture in a format such as JPEG or PNG. Furthermore, the host can store information such as digital signatures, digital certificates, hash algorithms and the like of various verification units so as to be called when hash values are calculated and matched.
In another application scenario, the legal service system 500 may be implemented as a server, which may include a memory; and a processor coupled to the aforementioned memory, the processor configured to perform the method as described above based on instructions stored in the memory. And the user (judge) interacts with the server through the terminal to realize the verification of the validity of the verification report. In particular, the server may comprise a processor, a memory, a communication interface and a communication bus as shown in fig. 7, the processor, the memory and the communication interface complete the communication with each other through the communication bus, and the processor performs the steps of the method implemented by the aforementioned legal service system. The user can input the electronic file and the verification report which need to be verified into the terminal, the terminal establishes communication with the server and sends the received electronic file and the verification report to the server, and the server judges whether the electronic file and the verification report are matched or not by using the method and generates a corresponding judgment result. And the server sends the judgment result to the terminal where the user is located and displays the result. Since the method implemented by the server has been described in detail in the foregoing, it is not repeated herein.
A server/terminal according to this embodiment of the invention is described below with reference to fig. 7. The configuration shown in fig. 7 is only an example, and this should not bring any limitation to the function and the range of use of the embodiment of the present invention. As shown in fig. 7, the server/terminal is in the form of a general purpose computing device including, but not limited to: at least one processor, at least one memory, a communication bus connecting different system components. The communication bus represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. The memory may include readable media in the form of volatile memory, such as Random Access Memory (RAM) and/or cache memory, and may further include Read Only Memory (ROM). The memory may also include program modules, including but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
The system of the present invention can be flexibly arranged according to application scenarios or requirements and is not limited to the architecture shown in the figures. Further, it should also be understood that any module, unit, component, server, computer, or device performing operations of examples of the invention may include or otherwise access a computer-readable medium, such as a storage medium, computer storage medium, or data storage device (removable) and/or non-removable) such as a magnetic disk, optical disk, or magnetic tape. Computer storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules or other data. In this regard, the present invention also discloses a computer readable storage medium having stored thereon computer readable instructions for a validation report validation method for legal services, which when executed by one or more processors, perform the method and operations previously described in connection with the figures.
As used in this specification and claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Although the embodiments of the present invention are described above, the descriptions are only examples for facilitating understanding of the present invention, and are not intended to limit the scope and application scenarios of the present invention. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A validation report validity verification method for legal services, comprising:
receiving an electronic file and a corresponding verification report thereof;
determining a verification unit corresponding to the verification report according to the digital signature in the verification report;
collecting a first hash value recorded in the verification report;
selecting a corresponding hash algorithm according to the verification unit to calculate the electronic file to obtain a second hash value;
and judging whether the first hash value and the second hash value are matched, and if so, judging that the electronic file is not tampered.
2. The method of claim 1, wherein the electronic document comprises one or more of an electronic contract, an electronic proof, and an electronic proof deposit.
3. The method of claim 2, wherein the electronic evidence includes one or more of copyright protection evidence, electronic evidence, web page evidence, and business evidence.
4. The method of claim 1, further comprising the step of verifying the integrity of the verification report.
5. The method of claim 4, wherein verifying the integrity of the verification report comprises:
decrypting the digital signature of the verification report to obtain a first digital digest;
calculating the verification report to obtain a second digital abstract;
and comparing the first digital abstract with the second digital abstract, and if the first digital abstract and the second digital abstract are the same, completing the verification report.
6. The method of claim 1, wherein determining the verification unit corresponding to the verification report according to the digital signature in the verification report comprises:
acquiring a digital certificate corresponding to the verification report;
and matching the digital certificate with the digital certificates of all verification units to determine the verification units which are successfully matched.
7. The method of claim 6, wherein the digital certificate includes one or more of a certificate serial number, a subject, and an issuer.
8. The method of claim 1, further comprising: if not, all non-matching entries are listed.
9. A legal service system comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 8 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that a processor, when executing the computer program, implements the steps of the method of any of claims 1 to 8.
CN202110735618.2A 2021-06-30 2021-06-30 Verification report validity identification method, legal service system and readable storage medium Pending CN113343313A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110735618.2A CN113343313A (en) 2021-06-30 2021-06-30 Verification report validity identification method, legal service system and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110735618.2A CN113343313A (en) 2021-06-30 2021-06-30 Verification report validity identification method, legal service system and readable storage medium

Publications (1)

Publication Number Publication Date
CN113343313A true CN113343313A (en) 2021-09-03

Family

ID=77481699

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110735618.2A Pending CN113343313A (en) 2021-06-30 2021-06-30 Verification report validity identification method, legal service system and readable storage medium

Country Status (1)

Country Link
CN (1) CN113343313A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114301643A (en) * 2021-12-17 2022-04-08 苏州市保慧智能科技有限公司 Electronic data authentication encryption transmission method
CN115115351A (en) * 2022-08-24 2022-09-27 深圳市华云中盛科技股份有限公司 Method and system for auditing environmental damage identification evaluation report
GB2610439A (en) * 2021-09-07 2023-03-08 Mastercard International Inc Image authentication

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013225938A (en) * 2013-07-24 2013-10-31 Hitachi Ltd Verification method of public key certificate and verification server
CN108921552A (en) * 2018-06-15 2018-11-30 中金金融认证中心有限公司 A kind of method and device of experimental evidence
CN110334175A (en) * 2019-04-29 2019-10-15 山东冰链网络信息科技有限公司 Zero-knowledge proof method, system and the storage medium of medical document
CN110995446A (en) * 2019-12-05 2020-04-10 腾讯科技(深圳)有限公司 Evidence verification method, device, server and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013225938A (en) * 2013-07-24 2013-10-31 Hitachi Ltd Verification method of public key certificate and verification server
CN108921552A (en) * 2018-06-15 2018-11-30 中金金融认证中心有限公司 A kind of method and device of experimental evidence
CN110334175A (en) * 2019-04-29 2019-10-15 山东冰链网络信息科技有限公司 Zero-knowledge proof method, system and the storage medium of medical document
CN110995446A (en) * 2019-12-05 2020-04-10 腾讯科技(深圳)有限公司 Evidence verification method, device, server and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
桂小林 编著: "物联网信息安全 第2版", 31 May 2021, 机械工业出版社, pages: 59 - 61 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2610439A (en) * 2021-09-07 2023-03-08 Mastercard International Inc Image authentication
CN114301643A (en) * 2021-12-17 2022-04-08 苏州市保慧智能科技有限公司 Electronic data authentication encryption transmission method
CN115115351A (en) * 2022-08-24 2022-09-27 深圳市华云中盛科技股份有限公司 Method and system for auditing environmental damage identification evaluation report

Similar Documents

Publication Publication Date Title
US8549303B2 (en) Apparatus, system and method for electronically signing electronic transcripts
CN113343313A (en) Verification report validity identification method, legal service system and readable storage medium
US7162635B2 (en) System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US7971063B2 (en) Method and device for safeguarding of a document with inserted signature image and biometric data in a computer system
US20040139327A1 (en) System and method for document-driven processing of digitally-signed electronic documents
EP1617590A2 (en) Method for electronic storage and retrieval of authenticated original documents
EP3543891B1 (en) A computer implemented method and a system for tracking of certified documents lifecycle and computer programs thereof
CN110826091B (en) File signature method and device, electronic equipment and readable storage medium
CN110909082A (en) Method and device for generating block chain certificate of works
CN110830257B (en) File signature method and device, electronic equipment and readable storage medium
US6757827B1 (en) Autonomously secured image data
US7689900B1 (en) Apparatus, system, and method for electronically signing electronic transcripts
Chaniago et al. Electronic document authenticity verification of diploma and transcript using smart contract on Ethereum blockchain
US20200057871A1 (en) Apparatuses and methods for signing a legal document
CN114329634A (en) Anti-counterfeiting method for electronic signature document
CN106559433B (en) Method and system for fixing electronic evidence and user identity by using digital certificate
US7818256B1 (en) Digital receipt for electronic data and methods and systems for generating same
KR20220126463A (en) Method for proving original of data, and apparatus therefor
CN117056899A (en) Electronic certificate generation method and device
CN115640591B (en) Contract management system and method for supply chain
CN111369364A (en) Electronic signature method and device based on super counter
CN110826034B (en) File signature method and device, electronic equipment and readable storage medium
US11971929B2 (en) Secure signing method, device and system
CN116112173A (en) Method and device for verifying image file in bank credit wind control scene
CN113515781A (en) Electronic insurance letter verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination