CN115563656A - Electronic accounting archive security management system - Google Patents

Electronic accounting archive security management system Download PDF

Info

Publication number
CN115563656A
CN115563656A CN202211248452.2A CN202211248452A CN115563656A CN 115563656 A CN115563656 A CN 115563656A CN 202211248452 A CN202211248452 A CN 202211248452A CN 115563656 A CN115563656 A CN 115563656A
Authority
CN
China
Prior art keywords
module
file
data
encrypted file
accounting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211248452.2A
Other languages
Chinese (zh)
Inventor
段锐
彭建文
杨波
文思钧
蒋贞豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Farsighted Information Industry Group Co ltd
Original Assignee
Chongqing Farsighted Information Industry Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Farsighted Information Industry Group Co ltd filed Critical Chongqing Farsighted Information Industry Group Co ltd
Priority to CN202211248452.2A priority Critical patent/CN115563656A/en
Publication of CN115563656A publication Critical patent/CN115563656A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2139Recurrent verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention relates to the technical field of file security management, and discloses an electronic accounting file security management system which comprises an identity authentication module, a file entry module and a file management module, wherein the identity authentication module is used for performing identity authentication on file entry personnel and entering accounting documents and original documents after the identity authentication is passed; the data encryption module is used for encrypting the data of the input accounting document and the original document to obtain a corresponding encrypted file; the tetrad detection module is used for carrying out tetrad detection on the encrypted file; and the storage module is used for carrying out uplink operation on the encrypted file passing the four-property detection through the intelligent contract and storing the encrypted file on the block chain. The scheme can solve the problem that the existing archive data storage system is poor in safety of archive data storage.

Description

Electronic accounting archive security management system
Technical Field
The invention relates to the technical field of file security management, in particular to an electronic accounting file security management system.
Background
In recent years, the informatization process of each industry is accelerated continuously, the digital work progress of paper archives of various archives departments at all levels is accelerated continuously, and the development of digital archives is accelerated more and more rapidly.
In digital archives development process, archival data's storage is vital, wherein just includes accounting archival data, and current accounting archival data storage system is direct to be stored accounting archival data in CD or storage hard disk usually, and this kind of storage mode not only corresponds accounting archival data's storage security can not obtain the guarantee, and stolen and the condition of being tampered of accounting archival data easily appears simultaneously.
Based on this, an electronic accounting archive security management system is urgently needed, and the problem that the existing archive data storage system is poor in security of storage of archive data can be solved.
Disclosure of Invention
The invention aims to provide an electronic accounting file security management system which can solve the problem that the existing file data storage system is poor in storage security of file data.
In order to achieve the purpose, the invention adopts the following technical scheme: an electronic accounting archive security management system comprising:
the identity authentication module is used for carrying out identity authentication on the file entry personnel, and entering the accounting document and the original document after the identity authentication is passed;
the data encryption module is used for encrypting data of the input accounting document and the original document to obtain a corresponding encrypted file;
the tetrad detection module is used for carrying out tetrad detection on the encrypted file;
and the storage module is used for carrying out uplink operation on the encrypted file passing the four-property detection through an intelligent contract and storing the encrypted file on the block chain.
The principle and the advantages of the scheme are as follows: in the scheme, in the process of entering the accounting voucher and the original voucher, the two data can be firstly encrypted to enable the two data to become corresponding encrypted files, so that the safety of the voucher can be ensured, when the voucher is stolen by other people, the two data cannot be intuitively known by the other party, then the four-property detection can be carried out on the encrypted files, the completeness and the reliability of the encrypted files are greatly improved, through the detection, the problem that corresponding data entry is omitted or lost when corresponding data entry is carried out can be avoided, meanwhile, the encrypted files detected through the four-property detection can be stored on a block chain, and due to the fact that the block chain has the advantages of decentralization and information falsification, the encrypted files are stored through the block chain, the information corresponding to the encrypted files can be effectively prevented from being falsified, and the problem that the existing archive data storage system is poor in storage safety of archive data can be solved.
Meanwhile, before the archive data, namely the corresponding accounting voucher and the original voucher, are entered, the identity of an archive entry person to be entered is verified, only the accounting voucher and the original voucher which correspond to each other through identity verification can be entered, the reliability of the archive entry person is greatly improved, the original archive entry person can perform strict identity verification, the fact that irrelevant persons enter data is avoided, error data which do not meet requirements appear in the system is caused, and then the data occupies a large storage space, and the problem of waste of the storage space is caused.
Preferably, as an improvement, the quadriversal detection module includes:
the system comprises a four-characteristic detection rule definition module, a four-characteristic detection rule generation module and a four-characteristic detection rule selection module, wherein the four-characteristic detection rule definition module is used for self-defining a rule of four-characteristic detection and generating a corresponding four-characteristic detection scheme;
and the filing detection module is used for carrying out corresponding four-property detection on the encrypted file according to the four-property detection scheme.
Has the advantages that: when the quadriversal detection is carried out on the encrypted file, firstly, the self-definition of the quadriversal detection rule can be realized, so that the detection applicability is greatly improved, the application range and the scene of the whole quadriversal detection are wider, and meanwhile, the security and the reliability of the encrypted file can be ensured through the quadriversal detection.
Preferably, as an improvement, the tetrad detection module further includes a periodic detection module, configured to perform periodic tetrad retesting on the encrypted files stored in the block chain, and isolate the encrypted files that do not pass the tetrad retesting.
Has the advantages that: by periodically detecting the four-property of the encrypted file stored on the blockchain, the archived encrypted file can be ensured to be more reliable, and the encrypted file is prevented from being tampered by people.
Preferably, as an improvement, the method further comprises: the authority identification module is used for carrying out authority identification on the identity information of the current file entry personnel after the identity authentication passes, and identifying the authority levels of the file entry personnel, wherein the authority levels comprise a first level, a second level, a third level and a fourth level;
the file authority identification module is used for judging whether the encrypted file extracted by the file entry personnel meets the authority requirement or not according to the authority level of the current file entry personnel, if so, the encrypted file can be informed in advance, otherwise, the encrypted file is informed that the authority is insufficient; the authority requirement is that the authority level of the current file entry personnel is greater than or equal to the authority level of the file entry personnel entering the encrypted file;
and the file analyzing and extracting module is used for extracting the corresponding encrypted file after the permission requirement is met, decrypting the encrypted file and outputting the corresponding accounting document and the original document.
Has the advantages that: carry out the authority affirmation through entering personnel to every archives, make every archives enter personnel all have the authority that corresponds separately, just so make every archives enter personnel all corresponding an authority when carrying out archives and logging, when the archives entering personnel who corresponds will carry out the extraction of encryption file like this, just can be according to the authority that the archives entering personnel that the encryption file that will extract corresponds, see whether the authority of depositing the encryption file is greater than the authority of drawing the encryption file, whether this encryption file can be extracted out so just so can be more accurate quick judgement this encryption file, just also realized the multiple protection to the encryption file.
Preferably, as an improvement, the archive parsing and extracting module is further configured to extract and decrypt the isolated encrypted file, and output a corresponding accounting document and an original document;
the four-property detection module further comprises a comparison module for comparing and judging the output accounting document and the original document, judging whether the corresponding accounting document and the original document are imperfect or wrong, if so, deleting the accounting document and the original document, informing corresponding archive entry personnel, and otherwise, judging that the corresponding isolated encrypted file is the encrypted file passing the four-property detection.
Has the advantages that: when judging that the encryption file does not accord with the quadriversal detection, in order to ensure the exactness of judgement, the encryption file that will correspond to keep apart carries out the deciphering, accounting document and original voucher wherein contrast, see whether wherein there is imperfectly or wrong, if some, will delete, and inform the archives entering personnel who corresponds at the very first time, archives entering personnel just so can be timely carry out the data that corresponds upload again, thereby the data that corresponds has been updated, the data accuracy of past archives has been improved greatly.
Preferably, as an improvement, the system further comprises a data in-place backup module, configured to backup the encrypted file passing through the four-property detection, and store corresponding backup data on the current carrier device;
and the data remote backup module is used for carrying out remote data transmission and backup on the encrypted file passing the four-property detection and storing corresponding backup data to other carrier equipment.
Has the beneficial effects that: the method and the device have the advantages that the in-situ backup and the far-end backup of the data are realized, so that the safety of the data is greatly guaranteed, the corresponding data can be safer in a far-end backup mode, and the problem that the corresponding data are lost along with the current carrier equipment after the current carrier equipment is damaged or lost is avoided.
Further, the identity authentication module includes:
the information acquisition module is used for sequentially acquiring the facial image information and the gesture information of the file entry personnel;
the face recognition module is used for comparing the face image information of the file entry personnel with each face image information pre-stored in a face database to obtain corresponding similarity, comparing each similarity with a preset similarity threshold, if one similarity is greater than or equal to the preset similarity threshold, judging that the identity of the file entry personnel passes the preliminary verification, otherwise, judging that the preliminary verification does not pass;
the gesture recognition module is used for comparing the acquired gesture information with preset gesture information associated with corresponding similar face image information which is larger than or equal to a preset similarity threshold value, judging whether the acquired gesture information and the preset gesture information are consistent, if so, judging that the identity of the file entry personnel is finally verified to pass, otherwise, judging that the identity is finally verified not to pass;
and the file entry module is used for passing the final authentication of the identity of the file entry personnel at the corresponding judgment result and entering the accounting document and the original document.
Has the advantages that: when verifying archives entry personnel's identity, face authentication and gesture authentication have been adopted, it is the people that correspond in the face database to ensure archives entry personnel promptly, just so avoided other people to enter this archives entry personnel's archives, after face authentication succeeds, still can carry out gesture authentication, just also avoided other people to steal this archives entry personnel's face image information through this kind of mode, through multiple verification, improve whole data entry's security and reliability greatly.
Drawings
Fig. 1 is a logic block diagram of an electronic accounting file security management system according to an embodiment of the present invention.
Detailed Description
The following is further detailed by way of specific embodiments:
the embodiment is basically as shown in the attached figure 1: an electronic accounting file security management system, comprising:
the identity authentication module is used for carrying out identity authentication on the file entry personnel, and entering the accounting document and the original document after the identity authentication is passed;
the identity authentication module comprises:
the information acquisition module is used for sequentially acquiring the facial image information and the gesture information of the file entry personnel;
the face recognition module is used for comparing the face image information of the file entry personnel with each face image information pre-stored in a face database to obtain corresponding similarity, comparing each similarity with a preset similarity threshold, if one similarity is greater than or equal to the preset similarity threshold, judging that the identity of the file entry personnel passes the preliminary verification, otherwise, judging that the preliminary verification does not pass;
the gesture recognition module is used for comparing the acquired gesture information with preset gesture information associated with corresponding similar face image information which is larger than or equal to a preset similarity threshold value, judging whether the acquired gesture information and the preset gesture information are consistent, if so, judging that the identity of the file entry personnel is finally verified to be passed, otherwise, judging that the identity is finally verified to be not passed;
and the file entry module is used for passing the final authentication of the identity of the file entry personnel at the corresponding judgment result and entering the accounting document and the original document.
The corresponding system is used with a plurality of people, so that the face image information of the users can be stored in a face database in advance when the system is used, when a person needs to record, firstly, the face image information of the current file recording personnel is collected, then, the face image information of the current file recording personnel is compared with each face image information in the face database to obtain each similarity, namely, the collected face image information is respectively compared with each face image information one by one to obtain a plurality of similarities, then, the similarities are compared with a preset similarity threshold, the information which is greater than or equal to the similarity is determined to be the same, and only one similarity which is greater than or equal to the preset similarity threshold exists in the actual operation. When the person is determined to be a corresponding feasible person, the gesture information corresponding to the file entry personnel can be further collected, through the double recognition, the safety of the whole system is greatly improved, and the problems that other people steal the face image information of the feasible person to steal data and the like are avoided.
The data encryption module is used for encrypting data of the input accounting document and the original document to obtain a corresponding encrypted file;
the system comprises a four-property detection module, a four-property detection module and a data processing module, wherein the four-property detection module is used for performing four-property detection on an encrypted file;
the tetrad detection module includes:
the system comprises a four-characteristic detection rule definition module, a four-characteristic detection rule processing module and a four-characteristic detection rule processing module, wherein the four-characteristic detection rule definition module is used for self-defining a rule of four-characteristic detection and generating a corresponding four-characteristic detection scheme;
and the filing detection module is used for carrying out corresponding four-property detection on the encrypted file according to the four-property detection scheme.
And the regular detection module is used for carrying out regular quadric redetection on the encrypted files stored in the block chain and isolating the encrypted files which do not pass the quadric redetection.
And the storage module is used for carrying out uplink operation on the encrypted file passing the four-property detection through an intelligent contract and storing the encrypted file on the block chain.
The authority identification module is used for carrying out authority identification on the identity information of the current file entry personnel after the identity authentication passes, and identifying the authority levels of the file entry personnel, wherein the authority levels comprise a first level, a second level, a third level and a fourth level;
the file authority identification module is used for judging whether the encrypted file extracted by the file entry personnel meets the authority requirement or not according to the authority level of the current file entry personnel, if so, the encrypted file can be informed in advance, otherwise, the encrypted file is informed that the authority is insufficient; the authority requirement is that the authority level of the current file entry personnel is greater than or equal to the authority level of the file entry personnel entering the encrypted file;
and the file analysis and extraction module is used for extracting the corresponding encrypted file after the authority requirement is met, decrypting the encrypted file and outputting the corresponding accounting document and the original document.
The file analyzing and extracting module is also used for extracting and decrypting the isolated encrypted file and outputting a corresponding accounting document and an original document;
the four-property detection module further comprises a comparison module for comparing and judging the output accounting document and the original document, judging whether the corresponding accounting document and the original document are imperfect or wrong, if so, deleting the accounting document and the original document, informing corresponding archive entry personnel, and otherwise, judging that the corresponding isolated encrypted file is the encrypted file passing the four-property detection.
In an embodiment, the file entry personnel can not only enter the accounting document and the original document, but also check and acquire and utilize the accounting document and the original document entered into the system, specifically, after the identification of the corresponding file entry personnel is completed, the data in the block chain can be accessed, in the process of data extraction, firstly, the authority of the current file entry personnel can be identified, the authority level of the current file entry personnel is identified, then, when the file entry personnel performs corresponding data extraction, the data can be compared, namely, when the corresponding data is entered, the authority level of the file entry personnel corresponding to the data is compared, whether the level difference between the two accords with the authority requirement is judged, namely, whether the authority level of the corresponding current file entry personnel is greater than or equal to the level authority of the file entry personnel entering the encrypted file is judged, and only if the requirement is met, the current file entry personnel can acquire the encrypted file. By the method, the limitation on personnel at each authority level can be realized, and the reliability and the data protection degree of the system are greatly improved.
The system also comprises a data in-situ backup module, a data storage module and a data backup module, wherein the data in-situ backup module is used for backing up the encrypted files passing the quadriversal detection and storing corresponding backup data to current carrier equipment;
and the data remote backup module is used for carrying out remote data transmission and backup on the encrypted file passing the four-property detection and storing corresponding backup data to other carrier equipment. In this embodiment, in order to avoid data loss, the backup processing is performed on the local carrier device, and meanwhile, the corresponding encrypted file is stored in another carrier device for backup, so that the data security is greatly improved, and the problem that the data is lost when the current carrier device is damaged is solved.
The foregoing is merely an example of the present invention and common general knowledge in the art of designing and/or characterizing particular aspects and/or features is not described in any greater detail herein. It should be noted that, for those skilled in the art, without departing from the technical solution of the present invention, several variations and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (7)

1. The utility model provides an electronic accounting archives safety control system which characterized in that: the method comprises the following steps:
the identity authentication module is used for performing identity authentication on file entry personnel and entering the accounting document and the original document after the identity authentication is passed;
the data encryption module is used for encrypting data of the input accounting document and the original document to obtain a corresponding encrypted file;
the system comprises a four-property detection module, a four-property detection module and a data processing module, wherein the four-property detection module is used for performing four-property detection on an encrypted file;
and the storage module is used for carrying out uplink operation on the encrypted file passing the four-property detection through the intelligent contract and storing the encrypted file on the block chain.
2. The electronic accounting archive security management system of claim 1, wherein: the tetrad detection module includes:
the system comprises a four-characteristic detection rule definition module, a four-characteristic detection rule generation module and a four-characteristic detection rule selection module, wherein the four-characteristic detection rule definition module is used for self-defining a rule of four-characteristic detection and generating a corresponding four-characteristic detection scheme;
and the filing detection module is used for carrying out corresponding four-property detection on the encrypted file according to the four-property detection scheme.
3. The electronic accounting archive security management system of claim 2, wherein: the tetrad detection module also comprises a regular detection module which is used for carrying out regular tetrad retest on the encrypted files stored in the block chain and isolating the encrypted files which do not pass the tetrad retest.
4. The electronic accounting archive security management system of claim 1, wherein: further comprising: the authority identification module is used for carrying out authority identification on the identity information of the current file entry personnel after the identity authentication passes, and identifying the authority levels of the file entry personnel, wherein the authority levels comprise a first level, a second level, a third level and a fourth level;
the file authority identification module is used for judging whether the encrypted file extracted by the file entry personnel meets the authority requirement or not according to the authority level of the current file entry personnel, if so, the encrypted file can be informed in advance, otherwise, the encrypted file is informed that the authority is insufficient; the authority requirement is that the authority level of the current file entry personnel is greater than or equal to the authority level of the file entry personnel entering the encrypted file;
and the file analyzing and extracting module is used for extracting the corresponding encrypted file after the permission requirement is met, decrypting the encrypted file and outputting the corresponding accounting document and the original document.
5. The electronic accounting file security management system of claim 4, wherein: the file analyzing and extracting module is also used for extracting and decrypting the isolated encrypted file and outputting a corresponding accounting document and an original document;
the four-property detection module further comprises a comparison module for comparing and judging the output accounting document and the original document, judging whether the corresponding accounting document and the original document are imperfect or wrong, if so, deleting the accounting document and the original document, informing corresponding archive entry personnel, and otherwise, judging that the corresponding isolated encrypted file is the encrypted file passing the four-property detection.
6. The electronic accounting file security management system of claim 5, wherein: the system also comprises a data in-situ backup module, a data in-situ backup module and a data backup module, wherein the data in-situ backup module is used for backing up the encrypted file passing the four-property detection and storing corresponding backup data to the current carrier equipment;
and the data remote backup module is used for carrying out remote data transmission and backup on the encrypted file passing the four-characteristic detection and storing the corresponding backup data to other carrier equipment.
7. The electronic accounting file security management system of claim 1, wherein: the identity authentication module comprises:
the information acquisition module is used for sequentially acquiring the facial image information and the gesture information of the file entry personnel;
the face recognition module is used for comparing the face image information of the file entry personnel with each face image information pre-stored in a face database to obtain corresponding similarity, comparing each similarity with a preset similarity threshold, if one similarity is greater than or equal to the preset similarity threshold, judging that the identity of the file entry personnel passes the preliminary verification, otherwise, judging that the preliminary verification does not pass;
the gesture recognition module is used for comparing the acquired gesture information with preset gesture information associated with corresponding similar face image information which is larger than or equal to a preset similarity threshold value, judging whether the acquired gesture information and the preset gesture information are consistent, if so, judging that the identity of the file entry personnel is finally verified to pass, otherwise, judging that the identity is finally verified not to pass;
and the file entry module is used for passing the final verification of the identity of the file entry personnel at the corresponding judgment result and entering the accounting document and the original document.
CN202211248452.2A 2022-10-12 2022-10-12 Electronic accounting archive security management system Pending CN115563656A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211248452.2A CN115563656A (en) 2022-10-12 2022-10-12 Electronic accounting archive security management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211248452.2A CN115563656A (en) 2022-10-12 2022-10-12 Electronic accounting archive security management system

Publications (1)

Publication Number Publication Date
CN115563656A true CN115563656A (en) 2023-01-03

Family

ID=84744879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211248452.2A Pending CN115563656A (en) 2022-10-12 2022-10-12 Electronic accounting archive security management system

Country Status (1)

Country Link
CN (1) CN115563656A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116992108A (en) * 2023-09-25 2023-11-03 杭州易康信科技有限公司 Government administration electronic archive processing method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116992108A (en) * 2023-09-25 2023-11-03 杭州易康信科技有限公司 Government administration electronic archive processing method and system
CN116992108B (en) * 2023-09-25 2023-12-19 杭州易康信科技有限公司 Government administration electronic archive processing method and system

Similar Documents

Publication Publication Date Title
JP6464338B2 (en) Evidence to protect privacy in ALPR applications
CN106899409A (en) Identity identifying method and device
CN112329042A (en) Big data secure storage system and method
CN115563656A (en) Electronic accounting archive security management system
CN104361494A (en) Bank counter authorization and certification method and system based on fingerprint recognition
CN112084474A (en) Enterprise archive management method, system, storage medium and electronic equipment
CN103368736A (en) Business information encryption and decryption method and device
CN111611460A (en) File management method based on block chain
CN102013088A (en) Digital watermark generation and embedding method based on comprehensive characteristics of digital archival resources
CN112328975A (en) Product software authorization management method, terminal device and medium
CN111639355A (en) Data security management method and system
CN111611459B (en) File data protection method based on block chain
EP3545453A1 (en) Method for generating an access for an entity to identification data of a person, associated generation device and authentication method
CN113840178A (en) Method for preventing timestamp in monitoring video stream from being tampered
Toraskar et al. Efficient computer forensic analysis using machine learning approaches
CN112863652A (en) Medical image data storage system
JPH05290149A (en) System and device for fingerprint collation and certification
CN108491712B (en) Method and device for safely reading and writing hospital confidential documents
CN106529214A (en) Electronic evidence collection device and electronic evidence collection method employing same
CN111753829A (en) Vehicle comprehensive information acquisition device based on trusted computing
Busch Facing the future of biometrics: Demand for safety and security in the public and private sectors is driving research in this rapidly growing field
CN117390679B (en) Intelligent monitoring method for secret-related information carrier
CN116956346B (en) Transaction data safety supervision system and method based on big data
KR101055890B1 (en) Time and attendance management system for registration of finger print after the fact and method thereof
CN117565815A (en) Method for unlocking instrument by digital car key and biological recognition technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination