CN116319081B - Electronic signature security management system based on big data cloud platform - Google Patents
Electronic signature security management system based on big data cloud platform Download PDFInfo
- Publication number
- CN116319081B CN116319081B CN202310551311.6A CN202310551311A CN116319081B CN 116319081 B CN116319081 B CN 116319081B CN 202310551311 A CN202310551311 A CN 202310551311A CN 116319081 B CN116319081 B CN 116319081B
- Authority
- CN
- China
- Prior art keywords
- signature
- time
- network
- security
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012360 testing method Methods 0.000 claims description 120
- 241000700605 Viruses Species 0.000 claims description 62
- 230000002159 abnormal effect Effects 0.000 claims description 49
- 238000004458 analytical method Methods 0.000 claims description 26
- 238000003012 network analysis Methods 0.000 claims description 20
- 238000012545 processing Methods 0.000 claims description 17
- 238000000034 method Methods 0.000 claims description 16
- 230000009545 invasion Effects 0.000 claims description 7
- 238000012163 sequencing technique Methods 0.000 claims description 5
- 230000005856 abnormality Effects 0.000 claims description 4
- 230000009286 beneficial effect Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000013480 data collection Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an electronic signature security management system based on a big data cloud platform, which belongs to the field of electronic signatures and is used for solving the problem that security performance of a signature device or a signature clicking link provided by a worker during electronic signatures cannot be guaranteed.
Description
Technical Field
The invention belongs to the field of electronic signature, relates to a security management technology, and in particular relates to an electronic signature security management system based on a big data cloud platform.
Background
The electronic signature is a representation form of the electronic signature, the electronic signature operation is converted into the same visual effect as the paper file stamping operation by utilizing an image processing technology, and meanwhile, the authenticity and the integrity of the electronic information and the non-repudiation of a signer are ensured by utilizing the electronic signature technology;
at present, a staff generally provides signature equipment or performs signature after clicking signature link, the two modes do not perform security analysis on the signature equipment, and the problem that important files after signature are easy to leak is solved.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention aims to provide an electronic signature security management system based on a big data cloud platform.
The technical problems to be solved by the invention are as follows: how to implement security management of electronic signatures based on multiparty factors.
The aim of the invention can be achieved by the following technical scheme: an electronic signature security management system based on a big data cloud platform comprises a data acquisition module, a security analysis module, a network analysis module, a management terminal, an intelligent ordering module, a storage module, a signature test platform, a user terminal and a server;
when signature is needed, the management terminal is used for importing an electronic file which needs to be subjected to electronic signature and a signature request of the electronic file, sending the electronic file and the signature request to a server, the data acquisition module is used for acquiring request data of the signature request and feeding the request data back to the server, and the server sends the request data to the intelligent sequencing module; the intelligent ordering module is used for intelligently ordering the signature requests, a processing table of the signature requests is obtained and fed back to the server, and the server processes the signature requests in sequence according to the processing table;
when electronic signature is needed, the server sends a login link of the electronic signature to a corresponding user terminal, and the user terminal clicks the login link and then enters a signature test platform of the electronic signature;
the management terminal is also used for inputting the security level of the electronic file corresponding to the electronic signature and sending the security level to the storage module through the server; the storage module is used for storing virus testing tools corresponding to different security levels and sending the corresponding virus testing tools to the signature testing platform according to the security levels; the server sends a copy text of the electronic file corresponding to the signature request to a signature test platform;
the virus test tool performs virus invasion on the copied text, and the data acquisition module is used for acquiring real-time network data of the signature test platform and text data of the copied text in the signature platform and sending the real-time network data to the network analysis module and sending the text data to the security analysis module;
the network analysis module is used for analyzing the network condition of the signature test platform, generating a network normal signal or a network abnormal signal and feeding the network normal signal or the network abnormal signal back to the server; the security analysis module is used for analyzing the security condition of the signature test platform, generating a security normal signal or a security abnormal signal and feeding the security normal signal or the security abnormal signal back to the server;
if the server receives the network normal signal and the security normal signal at the same time, the electronic file of the electronic signature is sent to the user terminal, the user terminal submits and feeds back the electronic file after the electronic signature to the server, and the server sends the electronic file after the electronic signature to the management terminal;
if the server sends the network abnormal signal or the security abnormal signal, a signature abnormal signal is generated and sent to the management terminal, the management terminal is used for checking the electronic signature with abnormal signature, and when the abnormality occurs, the management terminal cancels the current electronic signature.
Further, the request data is a generation time and an expiration signature time of the signature request.
Further, the intelligent sorting process of the intelligent sorting module is specifically as follows:
acquiring the generation time of the signature request, and subtracting the generation time of the signature request from the current time of the server to obtain the generation time of the signature request;
if the generation time length does not exceed the generation time length threshold value, no operation is performed;
if the generated time exceeds the generated time threshold, comparing the cut-off signature time with the current time of the server, and if the cut-off signature time exceeds the current time of the server, calibrating the signature request as a failure signature;
if the time of the seal stop is not more than the current time of the server, subtracting the time of the seal stop from the current time of the server to obtain the residual seal duration of the seal request;
and arranging from short to long according to the remaining signature duration to obtain a processing table of signature requests.
Further, the security levels include a first security level, a second security level, and a third security level;
the first security level is higher than the second security level, which is higher than the third security level;
the first security level corresponds to the virus strength of the virus testing tool and is greater than the second security level corresponds to the virus strength of the virus testing tool, and the second security level corresponds to the virus strength of the virus testing tool and is greater than the third security level corresponds to the virus strength of the virus testing tool.
Further, the real-time network data is a real-time uploading network speed value and a real-time downloading network speed value of the signature test platform;
the text data is original sector data of the copied text before being invaded by the virus testing tool on the signature testing platform and current sector data of the copied text after being invaded by the virus testing tool on the signature testing platform.
Further, the analysis process of the network analysis module is specifically as follows:
setting a test period, setting a plurality of time points in the test period, and acquiring a real-time uploading network speed value and a real-time downloading network speed value of a signature test platform at the plurality of time points;
calculating a time difference value before the adjacent time point and a difference value of a real-time uploading network speed value before the adjacent time point to obtain a real-time uploading network speed fluctuation value, and dividing the real-time uploading network speed fluctuation value by the corresponding time difference value to obtain real-time uploading network speed fluctuation rates of a plurality of sets of signature test platforms;
similarly, calculating the real-time download network speed fluctuation rate of a plurality of groups of signature test platforms;
if the fluctuation speed of the real-time uploading network does not exceed the preset fluctuation speed of the uploading network and the fluctuation speed of the real-time downloading network does not exceed the preset fluctuation speed of the downloading network, generating a network normal signal;
if any one group of real-time uploading network speed fluctuation rate exceeds the preset uploading network speed fluctuation rate or any one group of real-time downloading network speed fluctuation rate exceeds the preset downloading network speed fluctuation rate, generating a network abnormal signal.
Further, the analysis process of the security analysis module is specifically as follows:
acquiring original sector data of a copied text on a signature test platform before being invaded by a virus test tool;
then obtaining current sector data of the copied text in the signature test platform after being invaded by the virus test tool;
comparing the original sector data with the current sector data;
if the current sector data is different from the original sector data, generating a security abnormal signal;
and if the current sector data is the same as the original sector data, generating a safety normal signal.
Compared with the prior art, the invention has the beneficial effects that:
the invention collects the request data of signature request through the data collection module and sends to the intelligent ordering module, the intelligent ordering module is utilized to intelligently order the signature request, the processing table of the signature request is obtained and fed back to the server, and the signature request is processed according to the processing table;
according to the invention, the management terminal inputs the security level of the electronic document corresponding to the electronic signature, the corresponding virus testing tool is sent to the signature testing platform according to the security level, the virus testing tool carries out virus invasion on the copy text, on one hand, the network analysis module is utilized to analyze the network condition of the signature testing platform to generate a network normal signal or a network abnormal signal, on the other hand, the security analysis module is utilized to analyze the security condition of the signature testing platform to generate a security normal signal or a security abnormal signal, the security normal signal is fed back to the server, if the network normal signal and the security normal signal are generated at the same time, the electronic signature has no potential safety hazard, and if the network abnormal signal or the security abnormal signal is generated, the current electronic signature is cancelled.
Drawings
The present invention is further described below with reference to the accompanying drawings for the convenience of understanding by those skilled in the art.
Fig. 1 is an overall system block diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, an electronic signature security management system based on a big data cloud platform includes a data acquisition module, a security analysis module, a network analysis module, a management terminal, an intelligent ordering module, a storage module, a signature test platform, a user terminal and a server;
in specific implementation, the user terminal is used for registering the login system after the signer inputs personal information, and sending the personal information to the server, wherein the personal information comprises the name of the signer, an identity card number, a mobile phone number for real-name authentication and the like; the management terminal is used for registering and logging in after personnel inputs personal information, and sending the personal information to the server, wherein the personal information comprises the name, the mobile phone number and the like of the personnel;
when signature is needed, the management terminal is used for importing an electronic file which needs to be subjected to electronic signature and a signature request of the electronic file, sending the electronic file and the signature request to the server, the data acquisition module is used for acquiring request data of the signature request, feeding the request data back to the server, and the server sends the request data to the intelligent sequencing module;
the specific explanation is that the request data is the generation time and the expiration signing time of the signature request;
the intelligent ordering module is used for intelligently ordering the signature requests, and the intelligent ordering process is specifically as follows:
marking a signature request as u, u=1, 2, … …, z, z being a positive integer;
acquiring the generation time of the signature request, and subtracting the generation time of the signature request from the current time of the server to obtain the generation time of the signature request;
if the generation time length does not exceed the generation time length threshold value, no operation is performed;
if the generation time exceeds the generation time threshold, entering the next step;
comparing the cut-off signature time with the current time of the server, and if the cut-off signature time exceeds the current time of the server, calibrating the signature request as a failure signature;
if the time of the seal stop is not more than the current time of the server, subtracting the time of the seal stop from the current time of the server to obtain the residual seal duration of the seal request;
a processing table of signature requests is obtained by arranging the short to long time according to the remaining signature duration;
the intelligent ordering module feeds back a processing table of the signature request to the server, and the server processes the signature request in sequence according to the processing table;
the beneficial effects that this embodiment can embody are: the signature requests are intelligently ordered by utilizing the intelligent ordering module, a processing table of the signature requests is obtained and fed back to the server, and the signature requests are sequentially processed according to the processing table;
when the electronic signature is required, the server sends a login link of the electronic signature to a corresponding user terminal, and the user terminal clicks the login link and then enters a signature test platform of the electronic signature;
the signature test platform is clicked by the login link and then enters, and the network data generated when the signature test platform is used is the network data of the user terminal;
meanwhile, the management terminal is also used for inputting the security level of the electronic file corresponding to the electronic signature, sending the security level to the server, and sending the security level to the storage module by the server; the storage module is used for storing virus testing tools corresponding to different security levels and sending the corresponding virus testing tools to the signature testing platform according to the security levels; the server sends a signature request corresponding to the copy text of the electronic file to a signature test platform;
specifically, the security levels include a first security level, a second security level and a third security level, the level of the first security level is higher than the level of the second security level, the level of the second security level is higher than the level of the third security level, the first security level corresponds to the virus strength of the virus testing tool and is greater than the virus strength of the second security level corresponds to the virus testing tool, and the second security level corresponds to the virus strength of the virus testing tool and is greater than the virus strength of the third security level corresponds to the virus testing tool;
further, the virus testing tool in the signature testing platform is used for carrying out virus invasion on the copied text, the data acquisition module is used for acquiring real-time network data of the signature testing platform and text data of the copied text in the signature platform, the real-time network data and the text data are sent to the server, the server sends the real-time network data to the network analysis module, and the server sends the text data to the security analysis module;
the real-time network data are a real-time uploading network speed value and a real-time downloading network speed value of the signature test platform; the text data is original sector data of the copied text in the signature test platform before being invaded by the virus test tool and current sector data of the copied text in the signature test platform after being invaded by the virus test tool;
the network analysis module is used for analyzing the network condition of the signature test platform, and the analysis process is specifically as follows:
setting a test period, setting a plurality of time points in the test period, and acquiring a real-time uploading network speed value and a real-time downloading network speed value of a signature test platform at the plurality of time points;
calculating a time difference value before the adjacent time point and a difference value of a real-time uploading network speed value before the adjacent time point to obtain a real-time uploading network speed fluctuation value, and dividing the real-time uploading network speed fluctuation value by the corresponding time difference value to obtain real-time uploading network speed fluctuation rates of a plurality of sets of signature test platforms;
similarly, according to the method, calculating to obtain the real-time download network speed fluctuation rate of a plurality of groups of signature test platforms;
if the fluctuation speed of the real-time uploading network does not exceed the preset fluctuation speed of the uploading network and the fluctuation speed of the real-time downloading network does not exceed the preset fluctuation speed of the downloading network, generating a network normal signal;
if any one group of real-time uploading network speed fluctuation rate exceeds the preset uploading network speed fluctuation rate or any one group of real-time downloading network speed fluctuation rate exceeds the preset downloading network speed fluctuation rate, generating a network abnormal signal;
the network analysis module feeds back a network normal signal or a network abnormal signal to the server;
the security analysis module is used for analyzing the security condition of the signature test platform, and the analysis process is specifically as follows:
acquiring original sector data of a copied text on a signature test platform before being invaded by a virus test tool;
then obtaining current sector data of the copied text in the signature test platform after being invaded by the virus test tool;
comparing the original sector data with the current sector data;
specifically, a square grid comparison method can be adopted for the comparison mode of the sector data, namely, a plurality of square grids in the same area at the same position are respectively judged from the original sector data and the current sector data, then the number of all color pixel points in the square grids is compared, and if the number of the pixel points of any color is changed, the change of the sector data is represented;
if the current sector data is different from the original sector data, generating a security abnormal signal;
if the current sector data is the same as the original sector data, generating a safety normal signal;
the security analysis module feeds back a security normal signal or a security abnormal signal to the server, if the server receives the network normal signal and the security normal signal at the same time, the electronic file of the electronic signature is sent to the user terminal, the user terminal submits the electronic file to the server for feedback after electronic signature, and the server sends the electronic file after electronic signature to the management terminal;
if the server sends the network abnormal signal or the security abnormal signal, a signature abnormal signal is generated and sent to the management terminal, the management terminal is used for checking the electronic signature with abnormal signature, and when the abnormality occurs, a worker at the management terminal can cancel the current electronic signature;
the beneficial effects that this embodiment can embody are: according to the invention, a management terminal inputs the security level of an electronic document corresponding to an electronic signature, a corresponding virus testing tool is sent to a signature testing platform according to the security level, the virus testing tool carries out virus invasion on a copy text, on one hand, a network analysis module is utilized to analyze the network condition of the signature testing platform to generate a network normal signal or a network abnormal signal, on the other hand, a security analysis module is utilized to analyze the security condition of the signature testing platform to generate a security normal signal or a security abnormal signal and feed back the security normal signal or the security abnormal signal to a server, if the network normal signal and the security normal signal are generated at the same time, the electronic signature has no potential safety hazard, and if the network abnormal signal or the security abnormal signal is generated, the current electronic signature is cancelled, and the security management of the electronic signature is realized through network analysis and security analysis
According to the invention, the management terminal inputs the security level of the electronic document corresponding to the electronic signature, the corresponding virus testing tool is sent to the signature testing platform according to the security level, the virus testing tool carries out virus invasion on the copy text, on one hand, the network analysis module is utilized to analyze the network condition of the signature testing platform to generate a network normal signal or a network abnormal signal, on the other hand, the security analysis module is utilized to analyze the security condition of the signature testing platform to generate a security normal signal or a security abnormal signal, the security normal signal is fed back to the server, if the network normal signal and the security normal signal are generated at the same time, the electronic signature has no potential safety hazard, and if the network abnormal signal or the security abnormal signal is generated, the current electronic signature is cancelled.
In the present application, if a corresponding calculation formula appears, the above calculation formulas are all dimensionality-removed and numerical calculation, and the size of the weight coefficient, the scale coefficient and other coefficients existing in the formulas is a result value obtained by quantizing each parameter, so long as the proportional relation between the parameter and the result value is not affected.
When in operation, when signature is needed, the management terminal imports an electronic file which needs to be subjected to electronic signature and a signature request of the electronic file, and sends the electronic file and the signature request to a server, a data acquisition module acquires request data of the signature request, feeds the request data back to the server, and the server sends the request data to an intelligent ordering module;
the signature request is intelligently sequenced through an intelligent sequencing module, the generation time of the signature request is obtained, the generation time of the signature request is subtracted by the current time of the server to obtain the generation time of the signature request, if the generation time does not exceed the generation time threshold, no operation is performed, if the generation time exceeds the generation time threshold, the expiration time is compared with the current time of the server, if the expiration time exceeds the current time of the server, the signature request is marked as invalid signature, if the expiration time does not exceed the current time of the server, the current time of the server is subtracted by the expiration time to obtain the remaining signature time of the signature request, the processing table of the signature request is obtained by arranging the remaining signature time by short-term length, the intelligent sequencing module feeds back the processing table of the signature request to the server, and the server processes the signature request according to the processing table in sequence;
when electronic signature is needed, the server sends a login link of the electronic signature to a corresponding user terminal, the user terminal clicks the login link and then enters a signature test platform of the electronic signature, meanwhile, the management terminal also inputs the security level of the electronic document corresponding to the electronic signature and sends the security level to the server, the server sends the security level to a storage module, the storage module sends a corresponding virus test tool to the signature test platform according to the security level, and meanwhile, the server sends a signature request copy text of the electronic document to the signature test platform;
the method comprises the steps that virus invasion is carried out on a copy text by a virus testing tool existing in a signature testing platform, real-time network data of the signature testing platform and text data of the copy text in the signature platform are collected by a data collection module, the real-time network data and the text data are sent to a server, the server sends the real-time network data to a network analysis module, and the text data are sent to a security analysis module by the server;
analyzing the network condition of the signature test platform by using a network analysis module, setting a test period, setting a plurality of time points in the test period, acquiring a real-time uploading network speed value and a real-time downloading network speed value of the signature test platform when the time points are detected, calculating a time difference value before the adjacent time points, obtaining a real-time uploading network speed fluctuation value by the difference value of the real-time uploading network speed value before the adjacent time points, dividing the real-time uploading network speed fluctuation value by the corresponding time difference value to obtain real-time uploading network speed fluctuation rates of a plurality of groups of signature test platforms, similarly, calculating real-time downloading network speed fluctuation rates of a plurality of groups of signature test platforms, generating network normal signals if the real-time uploading network speed fluctuation rates do not exceed the preset uploading network speed fluctuation rates, and generating network abnormal signals if any group of real-time uploading network speed fluctuation rates exceed the preset uploading network speed fluctuation rates or any group of real-time uploading network speed fluctuation rates exceed the preset downloading network speed fluctuation rates, and feeding the network abnormal signals back to a network server by the network analysis module;
on the other hand, the security analysis module analyzes the security condition of the signature test platform to obtain the original sector data of the copied text in the signature test platform before being invaded by the virus test tool, then obtains the current sector data of the copied text in the signature test platform after being invaded by the virus test tool, compares the original sector data with the current sector data, generates a security abnormal signal if the current sector data is different from the original sector data, generates a security normal signal if the current sector data is the same as the original sector data, and feeds back the security normal signal or the security abnormal signal to the server;
if the server receives the network normal signal and the security normal signal at the same time, the electronic file of the electronic signature is sent to the user terminal, the user terminal submits and feeds back the electronic file after electronic signature to the server, the server sends the electronic file after electronic signature to the management terminal, if the server sends the network abnormal signal or the security abnormal signal, a signature abnormal signal is generated and sent to the management terminal, the management terminal is used for checking the electronic signature with abnormal signature, and when abnormality occurs, a worker at the management terminal can cancel the current electronic signature.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.
Claims (8)
1. The electronic signature security management system based on the big data cloud platform is characterized by comprising a data acquisition module, a security analysis module, a network analysis module, a management terminal, an intelligent ordering module, a storage module, a signature test platform, a user terminal and a server;
when signature is needed, the management terminal is used for importing an electronic file needing to be subjected to electronic signature and a signature request of the electronic file and sending the electronic file to the server, and the data acquisition module is used for acquiring request data of the signature request and sending the request data to the intelligent sequencing module through the server; the intelligent ordering module is used for intelligently ordering the signature requests, a processing table of the signature requests is obtained and fed back to the server, and the server processes the signature requests in sequence according to the processing table;
when electronic signature is needed, the server sends a login link of the electronic signature to a corresponding user terminal, and the user terminal clicks the login link and then enters a signature test platform of the electronic signature; the management terminal is also used for inputting the security level of the electronic file corresponding to the electronic signature and sending the security level to the storage module through the server; the storage module is used for storing virus testing tools corresponding to different security levels and sending the corresponding virus testing tools to the signature testing platform according to the security levels; the server sends a copy text of the electronic file corresponding to the signature request to a signature test platform;
the virus test tool performs virus invasion on the copied text, and the data acquisition module is used for acquiring real-time network data of the signature test platform and text data of the copied text in the signature platform and sending the real-time network data to the network analysis module and sending the text data to the security analysis module; the network analysis module is used for analyzing the network condition of the signature test platform and generating a network normal signal or a network abnormal signal; the security analysis module is used for analyzing the security condition of the signature test platform and generating a security normal signal or a security abnormal signal.
2. The electronic signature security management system based on big data cloud platform as claimed in claim 1, wherein the request data is a generation time and a deadline time of a signature request.
3. The electronic signature security management system based on the big data cloud platform as claimed in claim 2, wherein the intelligent ordering process of the intelligent ordering module is specifically as follows:
acquiring the generation time of the signature request, and subtracting the generation time of the signature request from the current time of the server to obtain the generation time of the signature request;
if the generation time length does not exceed the generation time length threshold value, no operation is performed;
if the generated time exceeds the generated time threshold, comparing the cut-off signature time with the current time of the server, and if the cut-off signature time exceeds the current time of the server, calibrating the signature request as a failure signature;
if the time of the seal stop is not more than the current time of the server, subtracting the time of the seal stop from the current time of the server to obtain the residual seal duration of the seal request;
and arranging from short to long according to the remaining signature duration to obtain a processing table of signature requests.
4. The electronic signature security management system based on a big data cloud platform of claim 1, wherein the security levels include a first security level, a second security level, and a third security level;
the first security level is higher than the second security level, which is higher than the third security level;
the first security level corresponds to the virus strength of the virus testing tool and is greater than the second security level corresponds to the virus strength of the virus testing tool, and the second security level corresponds to the virus strength of the virus testing tool and is greater than the third security level corresponds to the virus strength of the virus testing tool.
5. The electronic signature security management system based on the big data cloud platform as claimed in claim 1, wherein the real-time network data is a real-time uploading network speed value and a real-time downloading network speed value of the signature test platform;
the text data is original sector data of the copied text before being invaded by the virus testing tool on the signature testing platform and current sector data of the copied text after being invaded by the virus testing tool on the signature testing platform.
6. The electronic signature security management system based on the big data cloud platform as claimed in claim 5, wherein the analysis process of the network analysis module is specifically as follows:
setting a test period, setting a plurality of time points in the test period, and acquiring a real-time uploading network speed value and a real-time downloading network speed value of a signature test platform at the plurality of time points;
calculating a time difference value before the adjacent time point and a difference value of a real-time uploading network speed value before the adjacent time point to obtain a real-time uploading network speed fluctuation value, and dividing the real-time uploading network speed fluctuation value by the corresponding time difference value to obtain real-time uploading network speed fluctuation rates of a plurality of sets of signature test platforms;
similarly, calculating the real-time download network speed fluctuation rate of a plurality of groups of signature test platforms;
if the fluctuation speed of the real-time uploading network does not exceed the preset fluctuation speed of the uploading network and the fluctuation speed of the real-time downloading network does not exceed the preset fluctuation speed of the downloading network, generating a network normal signal;
if any one group of real-time uploading network speed fluctuation rate exceeds the preset uploading network speed fluctuation rate or any one group of real-time downloading network speed fluctuation rate exceeds the preset downloading network speed fluctuation rate, generating a network abnormal signal.
7. The electronic signature security management system based on the big data cloud platform as claimed in claim 6, wherein the analysis process of the security analysis module is specifically as follows:
acquiring original sector data of a copied text on a signature test platform before being invaded by a virus test tool;
then obtaining current sector data of the copied text in the signature test platform after being invaded by the virus test tool;
comparing the original sector data with the current sector data;
if the current sector data is different from the original sector data, generating a security abnormal signal;
and if the current sector data is the same as the original sector data, generating a safety normal signal.
8. The electronic signature security management system based on the big data cloud platform as claimed in claim 7, wherein the network analysis module feeds back a network normal signal or a network abnormal signal to the server; the safety analysis module feeds back a safety normal signal or a safety abnormal signal to the server;
if the server receives the network normal signal and the security normal signal at the same time, the electronic file of the electronic signature is sent to the user terminal, the user terminal submits and feeds back the electronic file after the electronic signature to the server, and the server sends the electronic file after the electronic signature to the management terminal;
if the server sends the network abnormal signal or the security abnormal signal, a signature abnormal signal is generated and sent to the management terminal, the management terminal is used for checking the electronic signature with abnormal signature, and when the abnormality occurs, the management terminal cancels the current electronic signature.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310551311.6A CN116319081B (en) | 2023-05-17 | 2023-05-17 | Electronic signature security management system based on big data cloud platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310551311.6A CN116319081B (en) | 2023-05-17 | 2023-05-17 | Electronic signature security management system based on big data cloud platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116319081A CN116319081A (en) | 2023-06-23 |
CN116319081B true CN116319081B (en) | 2023-07-28 |
Family
ID=86826145
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310551311.6A Active CN116319081B (en) | 2023-05-17 | 2023-05-17 | Electronic signature security management system based on big data cloud platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116319081B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116522313B (en) * | 2023-06-26 | 2023-09-08 | 北京惠朗时代科技有限公司 | Seal security management method and system based on cloud platform |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000099725A (en) * | 1998-09-18 | 2000-04-07 | Mitsubishi Electric Corp | Method for preparing electronic informal seal, electronic informal seal affixing system and electronic document alteration checking system |
CN114239004A (en) * | 2021-11-16 | 2022-03-25 | 中国南方电网有限责任公司 | Electronic signature generation method and device, computer equipment and storage medium |
CN115186303A (en) * | 2022-09-13 | 2022-10-14 | 北京惠朗时代科技有限公司 | Financial signature safety management method and system based on big data cloud platform |
CN116090026A (en) * | 2023-04-06 | 2023-05-09 | 北京惠朗时代科技有限公司 | Big data-based electronic signature use security management system |
-
2023
- 2023-05-17 CN CN202310551311.6A patent/CN116319081B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000099725A (en) * | 1998-09-18 | 2000-04-07 | Mitsubishi Electric Corp | Method for preparing electronic informal seal, electronic informal seal affixing system and electronic document alteration checking system |
CN114239004A (en) * | 2021-11-16 | 2022-03-25 | 中国南方电网有限责任公司 | Electronic signature generation method and device, computer equipment and storage medium |
CN115186303A (en) * | 2022-09-13 | 2022-10-14 | 北京惠朗时代科技有限公司 | Financial signature safety management method and system based on big data cloud platform |
CN116090026A (en) * | 2023-04-06 | 2023-05-09 | 北京惠朗时代科技有限公司 | Big data-based electronic signature use security management system |
Non-Patent Citations (1)
Title |
---|
电子签名:可视化与安全性如何双赢?;吴东升;《中国教育网络》;第62-65页 * |
Also Published As
Publication number | Publication date |
---|---|
CN116319081A (en) | 2023-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113869630B (en) | Coal quality detection information management system based on big data | |
CN116319081B (en) | Electronic signature security management system based on big data cloud platform | |
CN108961455A (en) | Overhead line structures method for inspecting, system and terminal device | |
CN108805296A (en) | The monitoring method and monitoring device of measuring equipment abnormality | |
CN111813655B (en) | Buried point test method and device, buried point management system and storage medium | |
CN105956987A (en) | Road traffic engineering test detection data acquisition and evaluation system | |
CN111709634B (en) | Method, device, equipment and medium for generating job risk prompt table | |
CN114397596A (en) | Fault detection system of distributed direct-current power supply cabinet | |
CN111949625B (en) | Parallel data synchronous uploading system for quick detection mobile phone end | |
CN114615702B (en) | Fault detection and diagnosis system based on 5G communication network | |
CN113835417A (en) | Fault detection and diagnosis method based on 5G communication network | |
CN116594801A (en) | Fault analysis system for big data cloud computing | |
CN117391534A (en) | Construction quality monitoring method and device, electronic equipment and storage medium | |
CN113965487B (en) | Fault diagnosis system based on network flow data | |
CN111767193A (en) | Server data anomaly detection method and device, storage medium and equipment | |
CN113506096B (en) | Inter-system interface method based on industrial internet identification analysis system | |
CN116684327B (en) | Mountain area communication network fault monitoring and evaluating method based on cloud computing | |
CN117311295B (en) | Production quality improving method and system based on wireless network equipment | |
CN113435803A (en) | Method and device for collecting quality data in equipment production process | |
CN111045984B (en) | Power grid laboratory file management system and method | |
CN111931012A (en) | Data model self-adaption method and device based on fault management subsystem | |
CN115343318A (en) | Passive ash content appearance remote calibration system based on wireless communication | |
CN113987081B (en) | Laboratory detection data management system based on block chain | |
CN113900883B (en) | Internet intelligent terminal system based on multi-protocol adaptation and application method thereof | |
CN112328436B (en) | Data processing method based on parallel processing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |