CN115964684A - Method, system, device and medium for detecting authenticity of metadata of electronic file - Google Patents

Method, system, device and medium for detecting authenticity of metadata of electronic file Download PDF

Info

Publication number
CN115964684A
CN115964684A CN202211674531.XA CN202211674531A CN115964684A CN 115964684 A CN115964684 A CN 115964684A CN 202211674531 A CN202211674531 A CN 202211674531A CN 115964684 A CN115964684 A CN 115964684A
Authority
CN
China
Prior art keywords
metadata
file
electronic
business
authenticity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211674531.XA
Other languages
Chinese (zh)
Inventor
吴乐琴
刘显茂
但玉琴
屈晓燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Aos Online Information Technology Co ltd
Original Assignee
Chongqing Aos Online Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Aos Online Information Technology Co ltd filed Critical Chongqing Aos Online Information Technology Co ltd
Priority to CN202211674531.XA priority Critical patent/CN115964684A/en
Publication of CN115964684A publication Critical patent/CN115964684A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses an electronic file metadata authenticity detection system.A data maintenance module acquires database data and information packets filed by a business system, generates file numbers of electronic file files of each part, marks the file numbers of all data and information reports belonging to the same part of file to form an electronic file taking the file numbers as unique identification, configures metadata of various types of electronic file files in a standardized way, files the metadata, packs and hands over the electronic file files; the business evidence storing module stores business metadata and business files generated in the business operation process of archiving the electronic files; and the authenticity detection module carries out authenticity detection on the electronic archive file according to the metadata rule and the information configured in the authenticity detection configuration module. The electronic files are stored in the filing full life cycle, and authenticity of the electronic files is guaranteed.

Description

Method, system, device and medium for detecting authenticity of metadata of electronic file
Technical Field
The invention relates to the technical field of computer information processing, in particular to a method and a system for detecting the authenticity of metadata of an electronic file.
Background
Following social development and progress, paperless offices have been widely used in many fields, and how to manage and archive various electronic documents and electronic data generated by paperless offices becomes a current problem. In order to solve the problem of keeping electronic files and electronic data, the application of an electronic file system gradually starts to be popularized and tried. For how to completely and effectively archive the contents, such as electronic files, electronic data and the like, which are generated by social activities such as business behaviors, office behaviors and the like, to the electronic archive, the contents need to be archived and stored, the contents need to be subjected to the quadriversal detection of the electronic archive: authenticity detection, integrity detection, availability detection, security detection. The authenticity of the electronic file can reflect the real conditions of social activities such as business behaviors, office behaviors and the like, and is a precondition that the electronic file has value. Therefore, a method and a system for detecting the authenticity of the metadata of the electronic file are provided for the four-characteristic detection of the electronic file filing.
The invention discloses a Chinese patent application with the publication number CN107171808A, and the invention name 'a method and a device for verifying the authenticity of an electronic file', wherein the electronic file to be verified and the metadata of the electronic file to be verified are obtained; generating a digital abstract of the electronic file to be verified; extracting core metadata of the electronic file to be verified; acquiring an identity card of the electronic file, analyzing the identity card of the electronic file, and acquiring an identity card number of the electronic file, a public key certificate of a receiving unit receiving the electronic file and a signature value from an analysis result; and based on the public key certificate of the receiving unit, the signature value, the digital abstract of the electronic file to be verified and the core metadata of the electronic file to be verified, performing digital signature verification by using an asymmetric algorithm to determine the authenticity of the electronic file to be verified.
The method only detects that the electronic file is not tampered and whether the electronic file meets the specification by means of technical means such as a digital abstract and a secret key, and the like.
The Chinese patent application with the publication number CN109858217A and the name of 'electronic file authenticity verification method and system' generates an electronic file through a sending end, a server stores the electronic file, a retrieval end retrieves the electronic file to verify authenticity, and the electronic file is consulted after verification is successful. Meanwhile, a corresponding electronic file authenticity verification system is also disclosed. The invention realizes a file authenticity verification method, which is used for performing electronic seal verification and submitting personnel fingerprint verification on an electronic file in a department before the electronic file is consulted, and effectively ensures the authenticity of the consulted electronic file through double verification.
The method focuses on how to ensure that the files operated by the file utilization personnel are not tampered, and the authenticity of the attributes of the electronic files is not effectively verified.
Disclosure of Invention
In view of this, the present invention aims at the problem that the authenticity of the electronic file needs to be detected when the electronic file and the data are filed in the electronic file, and the authenticity of the metadata of the electronic file is verified through metadata consistency detection, metadata item data length detection, metadata item data type, format detection, metadata item value field conformity detection of a set value field, and the like. The standardization of the electronic files and the four-characteristic of the electronic files are detected, the electronic files which are filed are guaranteed to meet the requirements of various filing specifications, the practical problem existing in the implementation of electronic file single set system is solved, and the real effectiveness of the whole process of the electronic files is guaranteed.
The technical solution for solving the above technical problems is to provide a system for detecting authenticity of metadata of an electronic file, comprising: the system comprises a data maintenance module, a business certificate storage module, an authenticity detection configuration module and an authenticity detection module, wherein the data maintenance module acquires database data and information packets filed by a business system, generates file numbers of files of each electronic file, marks the file numbers of all data and information reports belonging to the same file to form an electronic file taking the file numbers as unique identifiers, configures metadata of various types of electronic file files in a standardized manner, files the metadata, and packs and hands over the electronic file files; the business evidence storing module stores business metadata and business files generated in the operation process of the electronic archive filing business; the authenticity detection module analyzes metadata in the electronic file, verifies the metadata with the metadata stored in the business storage module, and detects each configuration rule according to metadata rules and information configured in the authenticity detection configuration module after verification is passed, so that the authenticity detection of the metadata of the electronic file is completed.
Further preferably, the data maintenance module includes: the system comprises a metadata management unit, a gate management unit and a matter management unit, wherein the gate management unit analyzes and acquires database data and information package type information, the matter management unit analyzes and acquires related matters of the database data and the information package, the metadata management unit configures metadata to be managed according to the filing type of the electronic archive file, binds the metadata with the matters and then binds with the gate, and the filing standard configuration of the metadata of each type of the electronic archive is completed.
Preferably, the authenticity configuration module configures metadata according to archived database data, categories of the information package and items, and configures the length of a metadata character string, data types and format configuration rules, the value field range of metadata items of the electronic file, the number of the electronic file, the file number and characters according to the categories and the items of the electronic archive file.
Further preferably, the service certificate storage module includes: the system comprises a behavior certificate storage unit, a business certificate storage unit, a signing certificate storage unit and an archive certificate storage unit, wherein the business certificate storage unit submits application, accepts, approves and signs and handles metadata and business document certificates generated in each business link in the process of filing electronic archive files; the behavior evidence storing unit stores the metadata generated by the operation behavior of the electronic archive file and the archive packaging transfer operation behavior; the signing and certificate storing unit acquires signed electronic signature files, handwritten electronic signature biological characteristics, signer identities, signing equipment information, records signing time and stores signing and signing metadata of electronic archive files; the business certificate storing unit stores the business submission and business transaction end notification information; the file certificate storing unit stores the filed electronic file and supplements the metadata of each certificate storing.
Preferably, the authenticity detection module analyzes metadata from the archived electronic archive file, compares the metadata acquired by analysis with metadata in the electronic file with the same case number in the business evidence storage module, and then compares the metadata with the character string length, the metadata item type and the format configuration rule configured in the metadata authenticity configuration unit to verify; selecting corresponding metadata special characters from a metadata management unit to carry out detection and verification; and after the business system files the electronic file, adding a metadata field, inputting the initial value and the end value of the item, analyzing the metadata by the authenticity detection module, and calling the value range of the metadata item of the metadata authenticity configuration unit for detection.
In another aspect of the present application, a method for detecting authenticity of metadata of an electronic file is provided, including: the data maintenance module acquires database data and information packets filed by a business system, generates file numbers of each electronic file, marks the file numbers of all data and information reports belonging to the same file to form an electronic file with the file numbers as unique identifiers, configures and files metadata of various types of electronic files in a standardized way, and packs and hands over the electronic file; the business evidence storing module stores business metadata and business files generated in the business operation process of archiving the electronic files; and the authenticity detection module reads the service metadata and the service file and carries out authenticity detection on the electronic archive file according to metadata rules and information configured in the authenticity detection configuration module.
Further preferably, the data maintenance module analyzes and acquires database data, package type information and related matters, configures metadata to be managed according to the filing type of the electronic archive file, binds the metadata with the matters, and then binds the items with the door, thereby completing the filing standard configuration of the metadata of each type of the electronic archive.
Preferably, the authenticity configuration module configures metadata according to archived database data, categories of the information package and items, and configures the length of a metadata character string, data types and format configuration rules, the value field range of metadata items of the electronic file, the number of the electronic file, the file number and characters according to the categories and the items of the electronic archive file.
Preferably, the business document storage module submits metadata and business documents generated in each business link of application, acceptance, approval and signing and transaction in the process of filing the electronic archive file; the behavior evidence storing unit stores the metadata generated by the operation behavior of the electronic archive file and the archive packaging transfer operation behavior; acquiring signed signature electronic files, the biological characteristics of handwritten electronic signatures, the identities of signers, signing equipment information, recording signing time, and storing the signing of electronic archive files and the metadata of signing; storing the business submission and business transaction notification information; and storing the archived electronic archive files, and supplementing the metadata of each certificate storage.
Preferably, the authenticity detection module analyzes metadata from the archived electronic archive file, compares the metadata acquired by analysis with metadata in the electronic file with the same case number in the business evidence storage module, and then compares the metadata with the character string length, the metadata item type and the format configuration rule configured in the metadata authenticity configuration unit; selecting corresponding metadata special characters from a metadata management unit to carry out detection and verification; and adding a metadata field after the business system files the electronic file, inputting a starting value and an ending value of the item, analyzing the metadata by the authenticity detection module, and calling a metadata item value domain range of the metadata authenticity configuration unit for detection.
According to another aspect of the present application, there is also provided an electronic device, including: a processor; and a memory storing a program, wherein the program comprises instructions which, when executed by the processor, cause the processor to perform the method of authenticity detection according to the electronic archive metadata described above.
According to another aspect of the present application, there is also provided a non-transitory computer-readable storage medium having stored thereon computer instructions for causing the computer to execute the electronic archive metadata authenticity detection method according to the above claims.
The application provides a method and system for detecting authenticity of metadata of electronic files, through the mode of depositing certificates and rule configuration, the authenticity of the metadata of the electronic files, the authenticity of files and the process are effectively detected, the electronic files after passing the detection are detected, the file filing specification is better met, the real situation of social activities can be reflected as real files, and the authenticity detection of the electronic files of metadata authenticity, electronic file authenticity and the like is achieved by arranging detection conditions. The electronic files are stored in the filing full life cycle, and authenticity of the electronic files is guaranteed. The detection accuracy is improved, and the working cost of archive workers is reduced.
Drawings
Further details, features and advantages of the present application are disclosed in the following description of exemplary embodiments, which is to be read in connection with the accompanying drawings, in which:
FIG. 1 is a schematic block diagram of an archival metadata authenticity detection system according to an exemplary embodiment of the present application;
FIG. 2 is a schematic block diagram illustrating a principle of a business credentialing module according to an exemplary embodiment of the present application;
FIG. 3 is a schematic diagram of an authenticity detection process according to an exemplary embodiment of the present application;
FIG. 4 is a schematic diagram illustrating the setting of a range number expression in an exemplary embodiment of the present application;
FIG. 5 is a block diagram illustrating an exemplary electronic device that can be used to implement embodiments of the present application.
Detailed Description
Embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present application. It should be understood that the drawings and embodiments of the present application are for illustration purposes only and are not intended to limit the scope of the present application.
It should be understood that the various steps recited in the method embodiments of the present application may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present application is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description. It should be noted that the terms "first", "second", and the like in the present application are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this application are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that reference to "one or more" unless the context clearly dictates otherwise.
The names of messages or information exchanged between a plurality of devices in the embodiments of the present application are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The embodiment of the invention provides a system for proving the authenticity of an electronic file based on certificate storage.
In the specific implementation process, the system can be connected with a preposed service system to receive the filing data, and the form of the filing data can be directly connected with database data or transmitted in an information packet mode, and the data is referred to as a database or an information packet for short.
Fig. 1 is a schematic block diagram of an archive metadata authenticity detection system in an exemplary embodiment of the present application, including: the system comprises an authenticity detection configuration module, an authenticity detection module, a data maintenance module, a business evidence storage module and an electronic archive metadata authenticity detection system, wherein electronic files and data submitted by the business system are sent to the archive metadata authenticity detection system after being filed to detect the authenticity of the files, the data and relevant evidence storage information. Wherein, the data maintenance module includes: metadata management unit, door class management unit, item management unit, the business deposits the card module and includes: action deposit certificate unit, business deposit certificate unit, sign deposit certificate unit, archives deposit certificate unit, authenticity detection module includes: the system comprises an electronic file analysis unit, an authenticity detection unit and a four-characteristic detection report unit.
The data maintenance module is used for finishing the filing standard configuration of the metadata of each type of the electronic archives, specifically configuring the metadata to be managed according to the filing type of the electronic archives, binding the metadata with matters and then binding the metadata with the door types.
The data maintenance module is a data maintenance management function of the system, such as metadata rule configuration in the authenticity detection configuration module, wherein metadata needs to be bound with a transaction management unit of the data maintenance module, a gate management unit and a metadata management unit, and for a single transaction, the authenticity detection rule configuration is targeted, and metadata selected in the rule configuration is also from the metadata management unit.
For example, in the administrative services, information such as social uniform credit codes and applicants is required, and the metadata configuration field in the data maintenance module includes: social unifying credit codes, applicants, etc.; and the administrative service type matters are government affair gate class files, and metadata and matters need to be bound, and then the records are bound with the gate class, so that the metadata filing specification configuration of each type of electronic files is completed.
Before the authenticity of the electronic file is detected, the business system can be connected with a business certificate storage module so as to ensure that the metadata of the electronic file is real and effective and is not falsified. And carrying out consistency detection on the authenticity of the electronic file source.
The metadata authenticity configuration unit can configure detection standards under different conditions according to different electronic file specification requirements and local actual file filing specifications, and can meet authenticity detection requirements in four-property detection. If the length and the input content of the specific metadata need to be detected, the specific metadata can be added to the metadata management unit of the data maintenance module. After the addition is completed, the rules needing to be checked are added to the metadata, and other configuration requirements are met.
The authenticity detection module comprises an electronic file analysis unit, an authenticity detection unit and a four-characteristic detection report unit. After the electronic file is filed, the metadata in the electronic file to be detected can be extracted and analyzed, and the metadata is verified with the certificate storage metadata in the business certificate storage module. If the verification is passed, each configuration rule is detected according to the configuration rule in the authenticity detection configuration module. And for the detection rules of different configuration items, the detection result is returned to the four-characteristic detection report unit for detailed display, and the passing item and the non-passing item are identified.
The evidence storing module comprises a behavior evidence storing unit, a signing evidence storing unit, a service evidence storing unit and a file evidence storing unit, the evidence storing module stores necessary metadata, electronic files, system information, entity names and other information in the service system by being connected with different service systems when an evidence storing request is generated, and the evidence storing data is synchronously linked to the block chain, so that the evidence storing data is real and effective and cannot be tampered.
Fig. 2 is a schematic block diagram illustrating a principle of a business document storage module in an exemplary embodiment of the present application, where the business document storage module includes a behavior document storage unit, a signature document storage unit, a business document storage unit, and a document storage unit, and metadata generated by confirming an operation behavior of a document, such as face recognition for confirming an applicant and identity authentication of an operator when the document is submitted is sent to the behavior document storage unit to store the document, metadata for signing and approving by an applicant and a document manager is sent to the signature document storage unit, business submission and business transaction completion notification information is stored in the business document storage unit, and an electronic document to be filed is stored in the document storage unit.
In the whole life cycle process of the electronic file, a signing and storing unit is called when the file is electronically signed, the signing and storing unit acquires signing information such as a signed electronic file, a handwritten electronic signature biological characteristic, a signer identity and signing equipment which are signed, and stores the signing information, the signing time is recorded, and the effectiveness of the signed file and the signed file cannot be tampered. If the signature and certificate-storing unit of the certificate-storing module is called to verify the certificate-storing data content at the time point generated by signature, and whether the signature is consistent with the signature currently subjected to authenticity detection or not is judged to be consistent, the detection result is authenticity detection passing through the electronic document source.
In the whole life cycle process of the electronic file, the behavior card storage unit acquires operation behavior metadata such as identity authentication, face recognition, uploading and deletion generated by a business system for storing the card, and records each step of operation in the flow of generating the electronic file. The real electronic file generation process can be restored according to the behavior storage certificate, and the authenticity of the electronic file is ensured.
In the whole life cycle process of the electronic file, the business evidence storing unit stores business metadata and business files generated in the operation process of the electronic file filing business, and each business link comprises the steps of submitting an application, accepting, examining and approving, handling and the like. Each link can be traced, and a real scene can be restored.
In the whole life cycle process of the electronic file, for the file files with generated file numbers, the file evidence storage unit carries out file evidence storage on operations such as metadata completion, file packaging handover and the like every time, so that evidence storage information with the file numbers as unique identifiers is formed, and the real and complete files are guaranteed without being tampered.
Through the mode of depositing the certificate of difference, deposit the certificate to the electronic file metadata in different stages, provide the detection foundation for authenticity detecting element.
Wherein, in the certificate storing module, the service system needing certificate storing can be directly connected, and a detection basis is provided for the authenticity detection module. If the behavior evidence storing unit stores evidence according to the following field parameter specifications, if the evidence storing fields are different in different scenes, the user-defined evidence storing fields can be transmitted.
And the authenticity detection configuration module is used for sequentially setting authenticity detection conditions.
Fig. 3 is a schematic diagram illustrating an authenticity detection process in an exemplary embodiment of the present application: the method comprises the following steps: the database data and information packets filed by the business system are sent to the authenticity detection module, the authenticity detection module reads rules and information configured by the metadata authenticity configuration unit in the authenticity detection configuration module, and metadata item length detection, data type and format detection, electronic file metadata item value range detection, electronic file number and file number detection and the like are carried out on the metadata.
The authenticity detection configuration module can configure the length of metadata, the data type of metadata items and the like according to the file of the government affair service item electronic file filing specification. The authenticity detection configuration module comprises a metadata authenticity configuration unit.
The method comprises the steps of detecting the length of a metadata item or a self-defined metadata item, configuring a detection rule for the length of the data item on the metadata item of an electronic file in a database or an information packet of an electronic file system, namely configuring the length of metadata of the file, selecting the metadata needing to be detected from a metadata management unit in the setting of the length of the metadata, and inputting the length of a character string required by detection on the metadata. Such as 18-bit data configured with a uniform social credit code in the metadata.
After the business system files the electronic file, the electronic file analyzes the electronic file of the electronic file through an electronic file analyzing unit of the authenticity detection module, and the metadata in the electronic file is captured by means of identification, key field reading and the like, so that the metadata of the electronic file is obtained, and then the metadata is compared with the business certificate storage module for verification. And after the verification is passed, the authenticity detection module calls a metadata length configuration rule of the metadata authenticity configuration unit to check whether the data of the unified social credit code meets 18 bits, if so, the item is determined to be passed, and if not, the item is determined to be failed. Similarly, for the mobile phone number, the identity card, the user-defined metadata and the like, the corresponding length rule can be used for verification.
The configuration of data types and formats of electronic file metadata items in the database requires the configuration of type detection rules, and after the metadata is selected from the metadata management unit, the type of each item of metadata is selected.
For example, unifying social credit codes, selecting String field types, after an electronic archive is filed in a service system, the electronic archive file analyzes the electronic archive of the electronic archive through an electronic archive analysis unit of an authenticity detection module, and capturing metadata in the electronic archive by means of identification, key field reading and the like, so that the metadata of the electronic archive is obtained, and then the metadata is compared and verified with a service deposit module. After the verification is passed, the authenticity detection unit calls the metadata item type and the format configuration rule of the metadata authenticity configuration unit to check the type of the field, and the verification is passed if the type of the field is in accordance with the configuration rule.
And detecting and configuring the value range of the metadata item of the electronic file in the database or the information package, and inputting the starting value and the ending value of the item after adding the metadata field. 1900 to 2022 can be input if the year of filing. After the business system files the electronic file, the electronic file analyzes the electronic file of the electronic file through an electronic file analyzing unit of the authenticity detection module, metadata in the electronic file is captured by means of identification, key field reading and the like, so that the metadata of the electronic file is obtained, and then the metadata is compared with the business evidence storage module for verification. After the verification is passed, the authenticity detection unit can call a metadata item value range detection rule of the metadata authenticity configuration unit to detect whether the value range accords with the metadata field. If the analyzed filing year field in the electronic file is 2023, the authenticity detection unit will automatically determine that the data does not conform to the actual filing specification, and the detection result is failed.
Detecting whether the data value of the metadata item of the electronic file in the database contains special characters, selecting corresponding detection metadata from the metadata management unit, and checking whether to detect the special characters, if the authenticity detection unit defaults to! @ # and (): (ii) a Carrying out verification by taking special characters such as < > - >, and the like as verification conditions; wherein, as fields not in the regular character and fields not in the special character library, the identification can be added into the special character library as the check condition.
And detecting and configuring the electronic file number, the file number and the like in the database or the information package. Referring to fig. 4, a diagram illustrating the setting of profile number expression in an exemplary embodiment of the present application, a profile generation rule can be set for a single item by calling a metadata field in a metadata management unit and an item management unit. In selecting fields, after selecting a field, the selected field may be spliced into a regular expression. And similarly, data verification is performed after filing, and then verification is performed according to rules. The electronic file analyzing unit can splice and assemble the metadata fields analyzed by the electronic file according to rules, and then compares the metadata fields with the metadata of the actual incoming file number, if the comparison is inconsistent, the file generation error is indicated, and the detection is failed.
Whether the data value of the electronic file metadata item in the database or the information package is in a reasonable range or not is detected and configured, and the length, the value range and the data reasonability of metadata can be checked according to the type of the archived file after the metadata is added in a metadata authenticity configuration unit. And selecting different checking rules for different metadata, such as a regular checking for selecting a unified social credit code for the unified social credit code, wherein the metadata detects the data reasonableness in addition to the detection of the length, the value range and the like, such as/[ 0-9A-HJ-NPQRTEWY ] {2} \ d {6} [ 0-9A-HJ-NPQRTEWXY ] {10 }/checking mode. The metadata detected by the item is more in line with the business requirements of the real archive.
After the metadata authenticity detection is completed, the four-characteristic detection reporting unit lists the passing and failing conditions of each item according to the detection result of each item, records the detection time, and counts the information of the detected items, the failing items and the like.
An exemplary embodiment of the present application also provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor. The memory stores a computer program executable by the at least one processor, the computer program, when executed by the at least one processor, is operative to cause the electronic device to perform a method according to embodiments of the present application.
The exemplary embodiments of this application also provide a non-transitory computer readable storage medium storing a computer program, wherein the computer program, when executed by a processor of a computer, is configured to cause the computer to perform a method according to an embodiment of this application.
The exemplary embodiments of this application also provide a computer program product comprising a computer program, wherein the computer program is adapted to cause a computer to perform the method according to an embodiment of this application when executed by a processor of the computer.
Referring to fig. 5, a block diagram of a structure of an electronic device 800, which may be a server or a client of the present application, which is an example of a hardware device that may be applied to aspects of the present application, will now be described. Electronic device is intended to represent various forms of digital electronic computer devices, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other suitable computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the applications described and/or claimed herein.
As shown in fig. 5, the electronic device 300 includes a computing unit 301 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 302 or a computer program loaded from a storage unit 308 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data required for the operation of the device 300 can also be stored. The calculation unit 301, the ROM 302, and the RAM 303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
A number of components in the electronic device 300 are connected to the I/O interface 305, including: an input unit 306, an output unit 307, a storage unit 308, and a communication unit 309. The input unit 306 may be any type of device capable of inputting information to the electronic device 300, and the input unit 306 may receive input numeric or character information and generate key signal inputs related to user settings and/or function controls of the electronic device. Output unit 307 may be any type of device capable of presenting information and may include, but is not limited to, a display, speakers, a video/audio output terminal, a vibrator, and/or a printer. The storage unit 308 may include, but is not limited to, a magnetic disk, an optical disk. The communication unit 309 allows the electronic device 300 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunications networks, and may include, but is not limited to, modems, network cards, infrared communication devices, wireless communication transceivers and/or chipsets, such as bluetooth devices, wiFi devices, wiMax devices, cellular communication devices, and/or the like.
The computing unit 301 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of the computing unit 301 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The calculation unit 301 performs the respective methods and processes described above. For example, in some embodiments, the reconstruction and decomposition of the original trajectory of a signed stroke to redraw its trajectory of muscle motion, the decomposition of its logarithmic speed curve, and the like, may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 308. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 300 via the ROM 302 and/or the communication unit 309. In some embodiments, the computing unit 301 may be configured to perform the signature script dynamic acquisition implementation method in any other suitable manner (e.g., by means of firmware).
Program code for implementing the methods of the present application may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program code, when executed by the processor or controller, causes the functions/acts specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this application, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.

Claims (10)

1. A system for detecting authenticity of metadata of an electronic file, comprising: the system comprises a data maintenance module, a business evidence storage module, an authenticity detection configuration module and an authenticity detection module, wherein the data maintenance module acquires database data and information packets filed by a business system, generates a file number of each electronic file, marks the file numbers of all data and information reports belonging to the same file to form an electronic file with the file number as a unique identifier, and is used for standardly configuring metadata of various types of electronic file files, filing, packaging and handing over the electronic file files; the business evidence storing module stores business metadata and business files generated in the operation process of the electronic archive filing business; the authenticity detection module analyzes metadata in the electronic file, verifies the metadata with the metadata stored in the business storage module, and detects each configuration rule according to metadata rules and information configured in the authenticity detection configuration module after verification is passed, so that the authenticity detection of the metadata of the electronic file is completed.
2. The system of claim 1, wherein the data maintenance module comprises: the system comprises a metadata management unit, a gate management unit and an item management unit, wherein the gate management unit analyzes and acquires database data and information packet type information, the item management unit analyzes and acquires related items of the database data and the information packet, and the metadata management unit configures metadata to be managed according to the filing type of an electronic archive file; in the event management unit, for each single event in the event management unit, the metadata fields required by the event can be selected, namely, the metadata in the metadata management unit is selected for combination; after the configuration is configured, the item is bound with a metadata template, and can be automatically filed according to the bound metadata template during filing; in the file field, no event corresponds to different door types for management, and different door types have different metadata filing requirements and filing flows, so in the method and the system for detecting the authenticity of the metadata of the electronic file, the door type management unit supports the addition and the edition of the door types; under different types of door, items related to the door can be selected, namely, the binding of the items and the door can be completed, and the metadata filing specification configuration of each type of electronic archive can be completed; the authenticity configuration module configures metadata according to database data, categories and items of the information package, and configures metadata character string length, data type and format configuration rules, electronic file metadata item value range, electronic file number, file number and characters according to categories, items and file specification requirements of the electronic archive file.
3. The system of claim 1, wherein the transaction credentialing module comprises: the system comprises a behavior certificate storage unit, a business certificate storage unit, a signing certificate storage unit and an archive certificate storage unit, wherein the business certificate storage unit submits application, accepts, approves and signs and handles metadata and business document certificates generated in each business link in the process of filing electronic archive files; the behavior evidence storing unit stores the metadata generated by the operation behavior of the electronic archive file and the archive packaging and transferring operation behavior; the signing and certificate storing unit acquires signed electronic signature files, handwritten electronic signature biological characteristics, signer identities, signing equipment information, records signing time and stores signing and signing metadata of electronic archive files; the business certificate storing unit stores the business submission and business transaction completion notification information; the file certificate storing unit stores the filed electronic file and supplements the metadata of each certificate storing.
4. The system according to any one of claims 1-3, wherein the authenticity detection module parses metadata from the archived electronic archive file, and after comparing and verifying the parsed metadata with metadata in the electronic file with the same case number in the business evidence storage module, the metadata is compared and verified with the character string length, the metadata item type and the format configuration rule configured in the metadata authenticity configuration unit; selecting corresponding metadata special characters from a metadata management unit to carry out detection and verification; and after the business system files the electronic file, adding a metadata field, inputting the initial value and the end value of the item, analyzing the metadata by the authenticity detection module, and calling the value range of the metadata item of the metadata authenticity configuration unit for detection.
5. A method for detecting the authenticity of metadata of an electronic archive, comprising: the data maintenance module acquires database data and information packets filed by a business system, generates a file number of each electronic file, marks the file numbers of all data and information reports belonging to the same file to form an electronic file with the file number as a unique identifier, standardizes and configures metadata of various types of electronic files for filing, and packs and hands over the electronic file; the business evidence storing module stores business metadata and business files generated in the operation process of the electronic archive filing business; the authenticity detection module analyzes metadata in the electronic file, verifies the metadata with the metadata stored in the business storage module, and detects each configuration rule according to metadata rules and information configured in the authenticity detection configuration module after verification is passed, so that the authenticity detection of the metadata of the electronic file is completed.
6. The method of claim 5, wherein the data maintenance module parses and obtains database data, package type information, and related items, configures metadata to be managed according to the electronic archive file filing type, and binds with the items, and then binds with the gate, thereby completing the electronic archive metadata filing standard configuration of each type; the authenticity configuration module configures metadata according to database data, categories and items of the information package, and configures the length of a metadata character string, data types and format configuration rules, the value range of metadata items of the electronic file, the number of the file and characters according to the categories and the items of the electronic archive file.
7. The method of claim 5, wherein the service credentialing module credentials the necessary metadata, electronic files, system information, and entity name information in the service system by interfacing different service systems when generating the credentialing request, supplements the metadata for each credentialing, and synchronously uplinks the credentialing data to the blockchain.
8. The method according to any one of claims 5-7, characterized in that the authenticity detection module parses metadata from the archived electronic archive file, and after comparing and verifying the parsed metadata with metadata in the electronic file with the same case number in the business evidence storage module, the metadata is compared and verified with the character string length, the metadata item type and the format configuration rule configured in the metadata authenticity configuration unit; selecting corresponding metadata special characters from a metadata management unit to carry out detection and verification; and adding a metadata field after the business system files the electronic file, inputting a starting value and an ending value of the item, analyzing the metadata by the authenticity detection module, and calling a metadata item value domain range of the metadata authenticity configuration unit for detection.
9. An electronic device, comprising: a processor; and a memory storing a program, wherein the program comprises instructions which, when executed by the processor, cause the processor to carry out the electronic archive metadata authenticity detection method according to any of claims 5-8.
10. A non-transitory computer readable storage medium storing computer instructions for causing a computer to execute the electronic archive metadata authenticity detection method according to any of claims 5 to 8.
CN202211674531.XA 2022-12-26 2022-12-26 Method, system, device and medium for detecting authenticity of metadata of electronic file Pending CN115964684A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211674531.XA CN115964684A (en) 2022-12-26 2022-12-26 Method, system, device and medium for detecting authenticity of metadata of electronic file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211674531.XA CN115964684A (en) 2022-12-26 2022-12-26 Method, system, device and medium for detecting authenticity of metadata of electronic file

Publications (1)

Publication Number Publication Date
CN115964684A true CN115964684A (en) 2023-04-14

Family

ID=87359579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211674531.XA Pending CN115964684A (en) 2022-12-26 2022-12-26 Method, system, device and medium for detecting authenticity of metadata of electronic file

Country Status (1)

Country Link
CN (1) CN115964684A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116383148A (en) * 2023-05-26 2023-07-04 北京网智易通科技有限公司 Method, device and equipment for detecting readability of electronic file
CN117149716A (en) * 2023-10-27 2023-12-01 北京美络克思科技有限公司 Method, device and equipment for detecting authenticity of electronic document

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116383148A (en) * 2023-05-26 2023-07-04 北京网智易通科技有限公司 Method, device and equipment for detecting readability of electronic file
CN116383148B (en) * 2023-05-26 2023-09-12 北京网智易通科技有限公司 Method, device and equipment for detecting readability of electronic file
CN117149716A (en) * 2023-10-27 2023-12-01 北京美络克思科技有限公司 Method, device and equipment for detecting authenticity of electronic document

Similar Documents

Publication Publication Date Title
CN110765102B (en) Service data processing method and device, computer equipment and storage medium
CN115964684A (en) Method, system, device and medium for detecting authenticity of metadata of electronic file
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
CN112738253A (en) Data processing method, device and equipment based on block chain and storage medium
WO2022095518A1 (en) Automatic interface test method and apparatus, and computer device and storage medium
CN107886312A (en) Contract for the supply and use of electricity mobile terminal based on OFD, service end signature method and device
CN115952560B (en) Method, system, equipment and medium for verifying authenticity of electronic archive file based on original handwriting signature
CN112631911A (en) Automatic testing method and device, computer equipment and storage medium
CN112631924A (en) Automatic testing method and device, computer equipment and storage medium
CN111325585A (en) Asset transfer method, device and computer readable storage medium
CN113806794A (en) Processing method and device for electronic signature of file, computer equipment and storage medium
CN112966304B (en) Tamper-proof method and device for flow document, computer equipment and medium
CN111259411B (en) Block chain management method, device, electronic equipment and readable storage medium
CN111050326B (en) Block chain-based short message verification method, device, equipment and medium
CN112291067A (en) Business operation record and operation verification method and device
CN108052842B (en) Signature data storage and verification method and device
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
CN115934642A (en) Electronic archive inspection system, method, equipment and medium based on chain hash
EP4365808A1 (en) Data verification method and apparatus
CN113360172B (en) Application deployment method, device, computer equipment and storage medium
CN115099822A (en) Carbon emission accounting system and method based on block chain and low code technology
CN114968822A (en) Interface testing method and device, computer equipment and storage medium
CN111078569B (en) Method and device for testing optical character recognition application and storage medium
CN114143308A (en) File uploading information processing method and device, computer equipment and storage medium
CN112506721A (en) REST interface checking method, device, equipment and readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination