CN116992108A - Government administration electronic archive processing method and system - Google Patents

Government administration electronic archive processing method and system Download PDF

Info

Publication number
CN116992108A
CN116992108A CN202311236643.1A CN202311236643A CN116992108A CN 116992108 A CN116992108 A CN 116992108A CN 202311236643 A CN202311236643 A CN 202311236643A CN 116992108 A CN116992108 A CN 116992108A
Authority
CN
China
Prior art keywords
authentication
information
item
supplementary
archive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311236643.1A
Other languages
Chinese (zh)
Other versions
CN116992108B (en
Inventor
张雷
郑瑞
刘兆攀
赖家先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yikangxin Technology Co ltd
Original Assignee
Hangzhou Yikangxin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yikangxin Technology Co ltd filed Critical Hangzhou Yikangxin Technology Co ltd
Priority to CN202311236643.1A priority Critical patent/CN116992108B/en
Publication of CN116992108A publication Critical patent/CN116992108A/en
Application granted granted Critical
Publication of CN116992108B publication Critical patent/CN116992108B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/907Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Library & Information Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Storage Device Security (AREA)

Abstract

The application is applicable to the field of computers, and provides a government administration electronic archive processing method and system, wherein the method comprises the following steps: acquiring file supplementary information obtained by scanning a paper file, and identifying supplementary items and authentication items in the file supplementary information; reading the credential information of an authentication column in the authentication item; identifying a class to be detected of the credential information, wherein the class to be detected at least comprises authentication display time; the technical scheme of the embodiment of the application can ensure that the paper file conforming to the authentication record information of the authentication unit is identified, and can simplify the step-by-step or detailed identification process of the paper file.

Description

Government administration electronic archive processing method and system
Technical Field
The application belongs to the field of computers, and particularly relates to a government administration electronic archive processing method and system.
Background
An electronic archive is a digital-formatted record of various information formed, handled, transmitted, and stored by an electronic device such as a computer, and has a voucher, an examination, and a saved value and files the saved electronic file.
In the prior art, an electronic file is generally scanned based on a real file, and whether the electronic file is a real file or an electronic file, because authenticated contents generally exist in the file, the contents contain authentication records of units with public trust and the like, but the authenticity of the contents in the processing process of the electronic file is difficult to guarantee and difficult to identify.
Disclosure of Invention
The embodiment of the application aims to provide a government management electronic archive processing method and system, which aim to solve the problems in the background technology.
The embodiment of the application is realized in such a way that, on the one hand, the method for processing the government administration electronic archive comprises the following steps:
acquiring file supplementary information obtained by scanning a paper file, and identifying supplementary items and authentication items in the file supplementary information;
reading the credential information of an authentication column in the authentication item;
identifying a class to be detected of the credential information, wherein the class to be detected at least comprises authentication display time;
judging whether the category to be detected accords with prestored archive authentication information or not, wherein the archive authentication information comprises archive supplementary authentication time which is the actual authentication time of an authentication unit on an archive owner;
when the category to be detected accords with the prestored archive authentication information, judging whether the supplementary item and the authentication item accord with the authentication relative position in actual authentication according to the authentication record information of the authentication unit;
if yes, the authentication item is judged to be valid for the supplementary item.
As a further aspect of the present application, the acquiring the document supplemental information obtained by scanning the paper document, and identifying the supplemental item and the authentication item in the document supplemental information includes:
acquiring preliminary scanning information of a paper file, and judging whether the preliminary scanning information is matched with identity information of a scanning requester;
when the identity information is consistent with the information of the file belonging to the preliminary scanning information, judging that the preliminary scanning information is matched with the identity information and continuously acquiring the follow-up scanning information of the paper file, wherein the information of the file belonging to the information comprises the related information of a file owner;
positioning an item in the follow-up scanning information, judging whether filling content and content to be authenticated exist in a preset position of the item, wherein the item comprises a brand new item;
if yes, obtaining the supplementary items and the authentication items in the file supplementary information according to the item items and the content to be authenticated.
As still further aspects of the present application, the determining whether the category to be detected matches the pre-stored profile authentication information includes:
identifying an authentication unit in the credential information, and obtaining archive authentication information associated with the authentication unit in an encryption mode;
decrypting the file authentication information, and judging whether the decryption result is consistent with the category to be detected.
As still further aspects of the present application, the determining, according to the authentication record information of the authentication unit, whether the supplementary item and the authentication item respectively conform to the authentication relative positions at the time of actual authentication includes:
decomposing the authentication record information to obtain authentication record sub-information;
positioning an authentication signing position in the authentication sub-information, and identifying the contact position of a signing tool and a paper file according to the authentication signing position, wherein the contact position at least comprises a starting contact position, a tail end contact position and a directional contact position;
determining a writing occupation position according to a continuous relation between the initial contact position and the tail contact position;
determining an anti-counterfeiting occupation position according to the directional contact position;
and judging whether the supplementary item and the authentication item respectively correspond to the writing occupation position and the anti-counterfeiting occupation position.
As a further aspect of the present application, the method further includes:
detecting whether a second position difference between the authentication item and the anti-counterfeiting occupied bit is not greater than a second threshold value according to the at least one fixed identification position when the first position difference between the supplementary item and the writing occupied bit is not greater than the first threshold value according to the at least one fixed identification position;
if yes, judging that the supplementary item and the authentication item accord with the authentication relative position when the actual authentication.
As a further aspect of the present application, the at least one fixed identification location includes a location where a fixed character of the authentication bar is located.
As a further aspect of the present application, after determining that the authentication item is valid for the supplementary item, the method further includes:
associating the authentication record information to the authentication item and the supplementary item to obtain an association result;
and storing the association result.
In another aspect, a government administration electronic archive processing system, the system comprising:
the acquisition module is used for acquiring file supplementary information obtained by scanning the paper file and identifying supplementary items and authentication items in the file supplementary information;
the reading module is used for reading the credential information of the authentication column in the authentication item;
the class identification module is used for identifying a class to be detected of the credential information, and the class to be detected at least comprises authentication display time;
the first judging module is used for judging whether the category to be detected accords with prestored archive authentication information or not, wherein the archive authentication information comprises archive supplementary authentication time which is the actual authentication time of an authentication unit for archive owners;
the second judging module is used for judging whether the supplementary item and the authentication item accord with the authentication relative position in actual authentication according to the authentication record information of the authentication unit when the category to be detected accords with the prestored archive authentication information;
and the judging module is used for judging that the authentication item is valid for the supplementary item if the authentication item is matched with the supplementary item.
As a further aspect of the present application, the obtaining module specifically includes:
the scanning information acquisition unit is used for acquiring the preliminary scanning information of the paper file and judging whether the preliminary scanning information is matched with the identity information of the scanning requester;
the condition judging unit is used for judging that the preliminary scanning information is matched with the identity information and continuously acquiring the follow-up scanning information of the paper archive when the identity information is consistent with the archive belonging information in the preliminary scanning information, wherein the archive belonging information comprises the relevant information of an archive owner;
the positioning and judging unit is used for positioning an item in the follow-up scanning information and judging whether filling content and to-be-authenticated content exist at a preset position of the item, wherein the item comprises a brand new item;
and the generating unit is used for obtaining the supplementary items and the authentication items in the file supplementary information according to the item items and the content to be authenticated if yes.
As a further aspect of the present application, the second judging module specifically includes:
the decomposition unit is used for decomposing the authentication record information to obtain authentication record sub-information;
the positioning unit is used for positioning the authentication signing position in the authentication sub-information, and identifying the contact position of the signing tool and the paper file according to the authentication signing position, wherein the contact position at least comprises a starting contact position, a tail end contact position and a directional contact position;
a first position determining unit for determining a writing occupation position based on a continuous relationship between the start contact position and the end contact position;
the second position determining unit is used for determining an anti-counterfeiting occupation position according to the directional contact position;
and the coincidence judging unit is used for judging whether the supplementary item and the authentication item respectively coincide with the writing occupation position and the anti-counterfeiting occupation position.
According to the government administration electronic archive processing method and system provided by the embodiment of the application, whether the category to be detected accords with prestored archive authentication information is judged firstly, and then whether the supplementary item and the authentication item accord with the authentication relative position in actual authentication is judged; the identification method and the identification device are progressive in judgment conditions, the to-be-detected category containing the identification display time is taken as a basic verification condition, and the paper files which do not accord with the prestored file identification information can be preferentially removed, so that the identification process is simplified, further, the paper files which accord with the identification record information of the identification unit can be ensured to be identified based on the relative position judgment of the supplementary item and the identification item, and the step-by-step or detailed identification process of the paper files can be simplified.
Drawings
FIG. 1 is a main flow chart of a method for processing government administration electronic files.
FIG. 2 is a flow chart of a government administration electronic archive processing method identifying supplemental and authentication items in archive supplemental information.
FIG. 3 is a flow chart of determining whether the supplemental item and the authentication item respectively correspond to the authentication relative positions at the time of actual authentication in a government administration electronic archive processing method.
Fig. 4 is a main structural diagram of a government administration electronic archive processing system.
FIG. 5 is a block diagram of the acquisition module in the government administration electronic archive processing system.
FIG. 6 is a block diagram showing the construction of a second judging module in the government administration electronic archive processing system.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Specific implementations of the application are described in detail below in connection with specific embodiments.
The application provides a government affair management electronic archive processing method and system, which solve the technical problems in the background technology.
As shown in fig. 1, a main flow chart of a method for processing a government administration electronic archive according to an embodiment of the present application includes:
step S10: acquiring file supplementary information obtained by scanning a paper file, and identifying supplementary items and authentication items in the file supplementary information;
the paper file contains new supplementary information of the file owner of the stored file or brand new (supplementary) information, and the paper file is generally required to be scanned at a designated scanning place to obtain the supplementary information of the file; as for the files in government management, it includes document files, personnel files, accounting files, science and technology files, economic files, business enterprise registration files, and the like; so-called supplementary items include non-authentication parts of the archive that are supplementary to the person for whom the archive is intended and/or supplementary parts of the authentication unit, which are generally statements of facts about the person for whom the archive is intended; the authentication items comprise authentication results of authentication units on the supplementary items, including positive or negative authentication results, such as rewards and punishments of a certain company by a certain gate, and the like;
step S11: reading the credential information of an authentication column in the authentication item;
the credential information is within the authentication column of the authentication item, and thus the step comprises: identifying Chinese information and/or seal information in the authentication item, including related contents of signature, signature and seal, and including word patterns of XX, YY, ZZ and date;
step S12: identifying a class to be detected of the credential information, wherein the class to be detected at least comprises authentication display time;
the category to be detected comprises at least one of the Chinese characters, seal images and dates; these are also the coincidence detection categories that are subsequently referred to;
step S13: judging whether the category to be detected accords with prestored archive authentication information or not, wherein the archive authentication information comprises archive supplementary authentication time which is the actual authentication time of an authentication unit on an archive owner;
the main detection category for judging coincidence comprises the authentication display time, the probability of false is smaller for characters and seal images, the cost is higher and the cost is high, so that the detection method is a simple and reliable detection method for detecting the authentication display time, in a preset archiving program, when an authentication unit authenticates the related content of a file owner, the authentication center where the authentication unit is located is required to acquire file authentication information comprising file supplementary authentication time, if the category to be detected coincides with the prestored file authentication information, the authentication event of the authentication unit for the file owner is basically indicated to exist; the archive authentication information is also substantially true; of course, the signs such as "signature", "consent", "signature" and "seal" can also be detected, especially the "seal" part should be consistent with the seal of the certification unit (the image similarity of the two reach the preset threshold);
step S14: when the category to be detected accords with the prestored archive authentication information, judging whether the supplementary item and the authentication item accord with the authentication relative position in actual authentication according to the authentication record information of the authentication unit;
when the category to be detected includes an authentication display time, the authentication display time coincides with the archive supplemental authentication time, and then the relative position coincidence verification is performed on the supplemental item and the authentication item, since the supplemental item is generally supplemented by the related person of the archive owner and the related person of the authentication unit, the content supplemented by the related person of the archive owner is generally not detected (because it has been verified by the authentication unit and can of course be detected if it is also possible for some special cases), the difficulty of the falsification of the authentication item and part of the supplemental item (mainly supplemented by the related person of the authentication unit) is large (mainly considering that the cost is high and the cost is high), but the expression of whether it coincides with the real wish of the authentication unit is important to detect it (of course, the stamp and the like in the content thereof has been actually detected in the aforementioned category to be detected); the authentication record information contains an actual writing part and an anti-counterfeiting part, so that the authentication record information accords with the authentication relative position; namely, consider that: the supplementary item and the authentication item are in the actual relative positions of the actual writing part and the anti-counterfeit part in the actual authentication situation of the authentication unit, for example: when the distances between the supplementary item and the actual writing part relative to a certain fixed reference point are correspondingly consistent (or the positions are consistent), judging that the authentication item is valid for the supplementary item; for another example: and if the distance between a certain seal in the authentication item and a certain corresponding part (such as a certain corner) of the anti-counterfeiting part is inconsistent with a certain fixed reference point, judging that the authentication item is invalid for the supplementary item.
The expression for judging whether the supplementary item and the authentication item respectively accord with the real willingness of the authentication unit;
step S15: if yes, judging that the authentication item is effective for the supplementary item, and preliminarily recognizing that the authentication item is effective for the supplementary item when judging that the supplementary item and the authentication item respectively meet the expression of the real intention of the authentication unit.
When the method is applied, whether the category to be detected accords with the prestored archive authentication information is judged firstly, and then whether the supplementary item and the authentication item accord with the authentication relative position in actual authentication is judged; the identification method and the identification device are progressive in judgment conditions, the to-be-detected category containing the identification display time is taken as a basic verification condition, and the paper files which do not accord with the prestored file identification information can be preferentially removed, so that the identification process is simplified, further, the paper files which accord with the identification record information of the identification unit can be ensured to be identified based on the relative position judgment of the supplementary item and the identification item, and the step-by-step or detailed identification process of the paper files can be simplified.
As shown in fig. 2, as a preferred embodiment of the present application, the acquiring the document supplementary information obtained by scanning the paper document, identifying the supplementary item and the authentication item in the document supplementary information includes:
step S101: acquiring preliminary scanning information of a paper file, and judging whether the preliminary scanning information is matched with identity information of a scanning requester;
the primary scanning information mainly relates to the part of the file owner, which is generally in the fly page part of the paper file, and the scanning request person is generally the natural person in the file owner or the file representative person assigned by the legal person in the file owner;
step S102: when the identity information is consistent with the information of the file belonging to the preliminary scanning information, judging that the preliminary scanning information is matched with the identity information and continuously acquiring the follow-up scanning information of the paper file, wherein the information of the file belonging to the information comprises the related information of a file owner;
the information of the file comprises the identity card number or the mobile phone number of the owner of the file, so that the identity information of the scanning requester comprises face information or fingerprint information; when the two are consistent, the identity of the scanning requester is qualified, otherwise, the follow-up steps are forbidden, and the file owner and the file administration unit are required to be notified;
step S103: positioning an item in the follow-up scanning information, judging whether filling content and content to be authenticated exist in a preset position of the item, wherein the item comprises a brand new item;
the subsequent scanning information comprises an item, wherein the item is a detail divided by content, the item at least comprises an item title, and for some files, the item comprises an item number such as a bidding document; thus, for the preset position, the position between adjacent items should be included, if the preset position has characters different from the items or the horizontal line of the preset position is filled with characters or pictures, the filling content is indicated; if the filling characters, fingerprints and seal images exist at the positions of the preset word patterns and/or preset formats at the top end of the next item or the bottom end of the last item, judging that the content to be authenticated exists, wherein the preset word patterns comprise a signature, a signature and a seal, and the preset formats comprise a year, month and day format with a space;
step S104: if yes, obtaining the supplementary items and the authentication items in the file supplementary information according to the item items and the content to be authenticated.
The filling content corresponding to the item can obtain a supplementary item, and the content to be authenticated can obtain an authentication item;
it can be understood that the conditional sequential acquisition of the preliminary scan information and the subsequent scan information avoids the subsequent invalid operation caused by inconsistent identities of scan requesters, and the supplementary item and the authentication item can be detected and identified respectively by locating the item, and the identification is performed based on the self-properties of the supplementary item and the authentication item, so that the steps are simple, the synchronism of the supplementary item and the authentication item is ensured, and the final result cannot be obtained by one of the supplementary item and the authentication item.
As a preferred embodiment of the present application, the determining whether the category to be detected matches the pre-stored profile authentication information includes:
the steps are as follows: identifying an authentication unit in the credential information, and obtaining archive authentication information associated with the authentication unit in an encryption mode;
the steps are as follows: decrypting the file authentication information, and judging whether the decryption result is consistent with the category to be detected. The decryption result is archive authentication information, and the key point comprises archive supplementary authentication time, which is specifically accurate to the starting time, the ending time and the duration of archive supplementary authentication, and the corresponding coincidence should judge that each category in the category to be detected is completely consistent with the category of the decrypted information.
The certification authority is typically the relevant department, which needs to be encrypted before transmission for archival certification information, as detailed below based on encryption and decryption.
Firstly, encrypting file authentication information based on the existing encryption software, acquiring encrypted file authentication information sent by an authentication center where an authentication unit is located, decrypting the file authentication information according to the same encryption software, checking the decrypted file authentication information on the encryption software, and only logging in the encryption software by the encryption and decryption parties respectively, wherein the existing encryption software is more in the market and is not listed here;
secondly, generating a pair of public key and private key through an encryption algorithm, and sending the public key to an authentication center where an authentication unit is located, and acquiring archive authentication information after the authentication center encrypts the archive authentication information through the public key; decrypting the encrypted file authentication information by using the private key to obtain the file authentication information; the encryption algorithm utilized therein includes an asymmetric encryption algorithm comprising: RSA, knapsack algorithm, elgamal and Rabin, etc.
In combination with the above encryption and decryption methods, the authentication record information may be encrypted and decrypted according to the method, and it is difficult to forge the authentication record information in consideration of the authentication record information including the authentication record image, and encryption is not generally required in practice.
As shown in fig. 3, as a preferred embodiment of the present application, the determining whether the supplementary item and the authentication item respectively conform to the authentication relative positions at the time of actual authentication according to the authentication record information of the authentication unit includes:
step S111: decomposing the authentication record information to obtain authentication record sub-information;
step S112: positioning an authentication signing position in the authentication sub-information, and identifying the contact position of a signing tool and a paper file according to the authentication signing position, wherein the contact position at least comprises a starting contact position, a tail end contact position and a directional contact position; the signing tool comprises a writing tool and a seal;
step S113: determining a writing occupation position according to a continuous relation between the initial contact position and the tail contact position;
step S114: determining an anti-counterfeiting occupation position according to the directional contact position;
the authentication record information comprises authentication record images and induction detection data, and the authentication record images and the induction detection data are in one-to-one correspondence based on time nodes;
decomposing the authentication record images to obtain videos and/or images, wherein the decomposition mode comprises frame-by-frame decomposition, an authentication signing bit is a position specially used for supplementing, signing and marking anti-counterfeiting marks, and for each paper file, the operations such as supplementing and signing can be carried out only after the authentication signing bit is qualified to be detected, namely, authentication information recording can be started after a signing bit correcting detection instruction is acquired; on the authentication signing position, after the corresponding contact position of the signing tool and the paper file is preliminarily determined based on the authentication record image, reading induction detection data detected by the corresponding contact position, wherein the induction detection data comprises handwriting (shape) detection data and pressing detection data; since the paper file is already aligned, the shape and the position of the paper file after being unfolded are determined, so that when handwriting detection of a patch or handwriting detection of a plurality of patches (including continuous or discontinuous) is performed, the distribution position of handwriting detection data is known, that is, the shape and the size of a writing occupied position, and the coordinates of each edge and each point of the shape of the writing occupied position based on an authentication signature position can be determined (strictly corresponding to the distribution position); similarly, for the directional contact position, the directional contact position corresponds to the pressing detection data, and when the anti-counterfeiting seal such as a seal leaves an anti-counterfeiting mark on the paper file, the position where the anti-counterfeiting mark exists can be determined based on the pressing detection data; the pressing force is generally larger than the writing force, so that the anti-counterfeiting occupied position and the writing occupied position are easy to distinguish, and the coordinates (including the distance) of each side line and each point of the shape of the anti-counterfeiting occupied position taking the certification signing position as the reference can be determined;
the purpose of respectively determining writing occupation positions and anti-counterfeiting occupation positions is to determine judgment references of the supplementary item and the authentication item;
step S115: judging whether the supplementary item and the authentication item are respectively corresponding to the writing occupied position and the anti-counterfeiting occupied position, and for the specific steps of judging whether the supplementary item and the authentication item are respectively corresponding to the writing occupied position and the anti-counterfeiting occupied position, comprising the following steps:
step S116: detecting whether a second position difference between the authentication item and the anti-counterfeiting occupied bit is not greater than a second threshold value according to the at least one fixed identification position when the first position difference between the supplementary item and the writing occupied bit is not greater than the first threshold value according to the at least one fixed identification position; the supplementary item is relatively simple compared with the authentication item, and the counterfeiting difficulty of the authentication item is relatively greater; it is therefore considered to detect the supplemental item first;
the position difference comprises at least one of a coordinate difference value and a distance difference value of the corresponding point and a (shaped) azimuth difference value;
step S117: if yes, judging that the supplementary item and the authentication item accord with the authentication relative position when the actual authentication.
In fact, for the supplementary item and the authentication item, since the scanning information thereof has been acquired, based on the image in the scanning information, the coordinates (including distance) and the like of each edge, point and the like of the supplementary item and the authentication item relative to the fixed identification position can be directly identified;
when the first position difference between the supplemental item and the writing occupied bit is not greater than a first threshold, indicating that the supplemental item and the writing occupied bit are both detected to be in a peer-to-peer position relative to the fixed identification, such peer-to-peer position being free of positional deviation relative to the fixed identification;
for example, the supplemental item and the writing pad are both in a lower right corner position of the fixed logo and are not more than 3mm from the center of the fixed logo by a furthest distance difference of not more than 2mm; at this time, judging the authentication relative position when the supplementary item accords with the actual authentication;
similar to the comparison of the supplemental item and the written occupation, the steps of authenticating the second position difference between the item and the anti-counterfeit occupation are identical and will not be described herein;
in fact, for the fixed identification position, the at least one fixed identification position includes a position where a fixed character of the paper document is located, for example, a rectangular area where the fixed character is located is determined, the fixed character represents a character that is already located on the paper document, theoretically, after the paper document is aligned, the position where the fixed character is located is not changeable, and the position where the authentication signing position and the fixed character are also fixed, so that the fixed identification position can be determined by means of the authentication signing position, or the pattern, the text and other identifications on the fixed identification position can be determined as the fixed identifications directly, and of course, the fixed identification line can be specially set on the authentication signing position so as to be coincident with a border line of the paper document, for example, to be coincident with a top border line, so that the fixed identification position is the top border line of the paper document at this time; the fixed mark position plays a role of a reference of 'intermediate invariant', the comparison of the supplementary item and the writing occupation is determined by the fixed mark position, and the comparison of the authentication item and the anti-counterfeiting occupation is also determined by the fixed mark position; and the fixed identification locations to which the supplemental item and the authentication item correspond may be different.
It can be understood that by comparing the first position difference value between the supplementary item and the writing occupation position successively, and detecting the second position difference value between the authentication item and the anti-counterfeiting occupation position when the first position difference value is in accordance, the purpose is that when the first position difference value is too large, the supplementary item has larger position deviation and is in doubt in reality relative to the writing occupation position, so that the next detection is not needed, the calculation force can be saved, and the step-by-step or detailed recognition process of the paper file is simplified; in contrast, when the first position difference value and the second position difference value are respectively corresponding to be matched, the supplementary item and the authentication item are respectively matched with the real authentication scene, so that the file supplementary information of the paper file is trustworthy.
As a preferred embodiment of the present application, after determining that the authentication item is valid for the supplementary item, the method further includes:
the steps are as follows: the authentication record information is associated to the authentication item and the supplementary item, and the association result is stored.
After the authentication item is determined to be valid for the supplementary item, the fact that the supplementary item and the authentication item are both true is indicated, so in order to facilitate complete traceability of the authentication process of the whole archive, the authentication item and the supplementary item can be associated with the authentication record information, the association result is stored in the same position or the same-level position as the electronic archive, and specifically, after the authentication item and the supplementary item are associated, the authentication item and the authentication record information are associated, so that: when an instruction for referring to or copying the electronic file is detected, an associated option for viewing the authentication record information is displayed, and the authentication record information can be directly viewed by clicking the associated option.
As another preferred embodiment of the present application, as shown in fig. 4, in another aspect, a government administration electronic archive processing system, the system includes:
the acquisition module 100 is used for acquiring the file supplementary information obtained by scanning the paper file and identifying supplementary items and authentication items in the file supplementary information;
a reading module 200, configured to read credential information of an authentication column in the authentication item;
the class identification module 300 is configured to identify a class to be detected of the credential information, where the class to be detected includes at least an authentication display time;
a first judging module 400, configured to judge whether the to-be-detected category matches with pre-stored archive authentication information, where the archive authentication information includes archive supplementary authentication time, and the archive supplementary authentication time is actual authentication time of an authentication unit for an archive owner;
the second judging module 500 is configured to judge, according to the authentication record information of the authentication unit, whether the supplementary item and the authentication item conform to the authentication relative position when the actual authentication is performed, when the category to be detected conforms to the pre-stored archive authentication information;
and the judging module 600 is configured to judge that the authentication item is valid for the supplementary item if the authentication item is matched with the supplementary item.
It can be understood that whether the category to be detected accords with the prestored archive authentication information is judged firstly, and then whether the supplementary item and the authentication item accord with the authentication relative position in actual authentication is judged; the identification method and the identification device are progressive in judgment conditions, the to-be-detected category containing the identification display time is taken as a basic verification condition, and the paper file which does not accord with the prestored file identification information can be preferentially removed, so that the identification process is simplified, and further, the paper file which accords with the identification record information of the identification unit can be ensured to be identified based on the relative position judgment of the supplementary item and the identification item.
As shown in fig. 5, the obtaining module 100 specifically includes:
a scan information acquiring unit 1001, configured to acquire preliminary scan information of a paper document, and determine whether the preliminary scan information matches with identity information of a scan requester;
a condition determining unit 1002, configured to determine that the preliminary scan information matches with the identity information and continuously obtain subsequent scan information of the paper archive when the identity information matches with information belonging to the archive in the preliminary scan information, where the information belonging to the archive includes information about an archive owner;
a positioning and judging unit 1003, configured to position an entry in the subsequent scan information, and judge whether a filling content and a content to be authenticated exist in a preset position where the entry is located, where the entry includes a brand new entry;
and the generating unit 1004 is configured to obtain a supplementary item and an authentication item in the archive supplementary information according to the item and the content to be authenticated if yes.
The method has the advantages that through conditional sequential acquisition of the preliminary scanning information and the subsequent scanning information, subsequent invalid operation caused by inconsistent identities of scanning requesters is avoided, the supplementary items and the authentication items can be detected and identified respectively through positioning the item items, the identification is carried out based on the self-properties of the supplementary items and the authentication items, the steps are simple, the synchronicity of the supplementary items and the authentication items is ensured, and no final result can be obtained.
As shown in fig. 6, the second determining module 400 specifically includes:
a decomposition unit 4001, configured to decompose the authentication record information to obtain authentication record sub-information;
the positioning unit 4002 is used for positioning the authentication signing position in the authentication sub-information, and identifying the contact position of the signing tool and the paper file according to the authentication signing position, wherein the contact position at least comprises a start contact position, an end contact position and a directional contact position;
a first position determination unit 4003 for determining a writing occupied position from a continuous relationship between a start contact position and an end contact position;
a second position determining unit 4004 for determining an anti-counterfeiting occupation position according to the directional contact position;
and a coincidence judging unit 4005 for judging whether the supplementary item and the authentication item coincide with the writing occupied position and the anti-counterfeit occupied position, respectively.
In practical implementation, by determining a first position difference between the supplementary item and the writing occupation position, a second position difference between the authentication item and the anti-counterfeiting occupation position is detected when the first position difference is excessive, so that the supplementary item has larger position deviation and doubtful authenticity relative to the writing occupation position, and further detection is not needed, thereby saving calculation force.
The embodiment of the application provides a government administration electronic archive processing method and a government administration electronic archive processing system based on the government administration electronic archive processing method, wherein whether the category to be detected accords with prestored archive authentication information is judged firstly, and then whether the supplementary item and the authentication item accord with the authentication relative position in actual authentication is judged; the identification method and the identification device are progressive in judgment conditions, the to-be-detected category containing the identification display time is taken as a basic verification condition, and the paper files which do not accord with the prestored file identification information can be preferentially removed, so that the identification process is simplified, further, the paper files which accord with the identification record information of the identification unit can be ensured to be identified based on the relative position judgment of the supplementary item and the identification item, and the step-by-step or detailed identification process of the paper files can be simplified.
In order to be able to load the method and system described above to function properly, the system may include more or less components than those described above, or may combine some components, or different components, in addition to the various modules described above, for example, may include input and output devices, network access devices, buses, processors, memories, and the like.
The processor may be a central processing unit (Central Processing Unit, CPU), other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, which is a control center of the above system, and various interfaces and lines are used to connect the various parts.
The memory may be used to store a computer and a system program and/or module, and the processor may perform the various functions described above by running or executing the computer program and/or module stored in the memory and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as an information acquisition template presentation function, a product information distribution function, etc.), and the like. The storage data area may store data created according to the use of the berth status display system (e.g., product information acquisition templates corresponding to different product types, product information required to be released by different product providers, etc.), and so on. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, memory, plug-in hard disk, smart memory card (SmartMediaCard, SMC), secure digital (SecureDigital, SD) card, flash card (FlashCard), at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the application.

Claims (10)

1. A method for processing an electronic archive for government administration, the method comprising:
acquiring file supplementary information obtained by scanning a paper file, and identifying supplementary items and authentication items in the file supplementary information;
reading the credential information of an authentication column in the authentication item;
identifying a class to be detected of the credential information, wherein the class to be detected at least comprises authentication display time;
judging whether the category to be detected accords with prestored archive authentication information or not, wherein the archive authentication information comprises archive supplementary authentication time which is the actual authentication time of an authentication unit on an archive owner;
when the category to be detected accords with the prestored archive authentication information, judging whether the supplementary item and the authentication item accord with the authentication relative position in actual authentication according to the authentication record information of the authentication unit;
if yes, the authentication item is judged to be valid for the supplementary item.
2. The method for processing a government affair management electronic archive as claimed in claim 1, wherein the acquiring the archive supplementary information obtained by scanning the paper archive, and identifying the supplementary item and the authentication item in the archive supplementary information includes:
acquiring preliminary scanning information of a paper file, and judging whether the preliminary scanning information is matched with identity information of a scanning requester;
when the identity information is consistent with the information of the file belonging to the preliminary scanning information, judging that the preliminary scanning information is matched with the identity information and continuously acquiring the follow-up scanning information of the paper file, wherein the information of the file belonging to the information comprises the related information of a file owner;
positioning an item in the follow-up scanning information, and judging whether filling content and content to be authenticated exist at a preset position of the item;
if yes, obtaining the supplementary items and the authentication items in the file supplementary information according to the item items and the content to be authenticated.
3. The method for processing a government affairs management electronic archive as claimed in claim 1, wherein determining whether the category to be detected matches the prestored archive authentication information includes:
identifying an authentication unit in the credential information, and obtaining archive authentication information associated with the authentication unit in an encryption mode;
decrypting the file authentication information, and judging whether the decryption result is consistent with the category to be detected.
4. A government affair management electronic archive processing method as claimed in claim 1 or 2, wherein determining whether the supplementary item and the authentication item respectively conform to the authentication relative positions at the time of actual authentication according to the authentication record information of the authentication unit includes:
decomposing the authentication record information to obtain authentication record sub-information;
positioning an authentication signing position in the authentication sub-information, and identifying the contact position of a signing tool and a paper file according to the authentication signing position, wherein the contact position at least comprises a starting contact position, a tail end contact position and a directional contact position;
determining a writing occupation position according to a continuous relation between the initial contact position and the tail contact position;
determining an anti-counterfeiting occupation position according to the directional contact position;
and judging whether the supplementary item and the authentication item respectively correspond to the writing occupation position and the anti-counterfeiting occupation position.
5. A method of processing a government affairs management electronic archive as claimed in claim 4 wherein the method further comprises:
detecting whether a second position difference between the authentication item and the anti-counterfeiting occupied bit is not greater than a second threshold value according to the at least one fixed identification position when the first position difference between the supplementary item and the writing occupied bit is not greater than the first threshold value according to the at least one fixed identification position;
if yes, judging that the supplementary item and the authentication item accord with the authentication relative position when the actual authentication.
6. A method of processing a government affairs management electronic archive as claimed in claim 5 wherein the at least one fixed identification location includes the location of the fixed character of the authentication column.
7. A government affairs management electronic archive processing method as claimed in any one of claims 1-3 wherein after determining that the authentication item is valid for the supplementary item, the method further comprises:
associating the authentication record information to the authentication item and the supplementary item to obtain an association result;
and storing the association result.
8. A government administration electronic archive processing system, said system comprising:
the acquisition module is used for acquiring file supplementary information obtained by scanning the paper file and identifying supplementary items and authentication items in the file supplementary information;
the reading module is used for reading the credential information of the authentication column in the authentication item;
the class identification module is used for identifying a class to be detected of the credential information, and the class to be detected at least comprises authentication display time;
the first judging module is used for judging whether the category to be detected accords with prestored archive authentication information or not, wherein the archive authentication information comprises archive supplementary authentication time which is the actual authentication time of an authentication unit for archive owners;
the second judging module is used for judging whether the supplementary item and the authentication item accord with the authentication relative position in actual authentication according to the authentication record information of the authentication unit when the category to be detected accords with the prestored archive authentication information;
and the judging module is used for judging that the authentication item is valid for the supplementary item if the authentication item is matched with the supplementary item.
9. The government administration electronic archive processing system as claimed in claim 8 wherein said acquisition module comprises:
the scanning information acquisition unit is used for acquiring the preliminary scanning information of the paper file and judging whether the preliminary scanning information is matched with the identity information of the scanning requester;
the condition judging unit is used for judging that the preliminary scanning information is matched with the identity information and continuously acquiring the follow-up scanning information of the paper archive when the identity information is consistent with the archive belonging information in the preliminary scanning information, wherein the archive belonging information comprises the relevant information of an archive owner;
the positioning and judging unit is used for positioning an item in the follow-up scanning information and judging whether filling content and to-be-authenticated content exist at a preset position of the item, wherein the item comprises a brand new item;
and the generating unit is used for obtaining the supplementary items and the authentication items in the file supplementary information according to the item items and the content to be authenticated if yes.
10. A government administration electronic archive processing system as claimed in claim 8 or 9 wherein said second determination module comprises:
the decomposition unit is used for decomposing the authentication record information to obtain authentication record sub-information;
the positioning unit is used for positioning the authentication signing position in the authentication sub-information, and identifying the contact position of the signing tool and the paper file according to the authentication signing position, wherein the contact position at least comprises a starting contact position, a tail end contact position and a directional contact position;
a first position determining unit for determining a writing occupation position based on a continuous relationship between the start contact position and the end contact position;
the second position determining unit is used for determining an anti-counterfeiting occupation position according to the directional contact position;
and the coincidence judging unit is used for judging whether the supplementary item and the authentication item respectively coincide with the writing occupation position and the anti-counterfeiting occupation position.
CN202311236643.1A 2023-09-25 2023-09-25 Government administration electronic archive processing method and system Active CN116992108B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311236643.1A CN116992108B (en) 2023-09-25 2023-09-25 Government administration electronic archive processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311236643.1A CN116992108B (en) 2023-09-25 2023-09-25 Government administration electronic archive processing method and system

Publications (2)

Publication Number Publication Date
CN116992108A true CN116992108A (en) 2023-11-03
CN116992108B CN116992108B (en) 2023-12-19

Family

ID=88530473

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311236643.1A Active CN116992108B (en) 2023-09-25 2023-09-25 Government administration electronic archive processing method and system

Country Status (1)

Country Link
CN (1) CN116992108B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10134682A1 (en) * 2001-07-20 2003-02-13 Post Ebusiness Gmbh Deutsche Document authenticity verification method has watermark character inserted in document as indication of authenticity verification
CN107171808A (en) * 2017-06-14 2017-09-15 北京市档案局 A kind of verification method and device of electronic record authenticity
CA3050230A1 (en) * 2018-07-19 2020-01-19 Bank Of Montreal Systems and methods for digitization services
RU2736886C1 (en) * 2019-10-07 2020-11-23 Галина Эдуардовна Добрякова Method and system of documents verification
CN113591051A (en) * 2021-07-08 2021-11-02 安徽宝葫芦信息科技集团股份有限公司 Electronic file full life cycle information security system and method
CN114372868A (en) * 2021-12-31 2022-04-19 中国工商银行股份有限公司 Method and device for associating and managing paper files and electronic files
CN115511588A (en) * 2022-10-12 2022-12-23 重庆远见信息产业集团股份有限公司 Electronic accounting archive filing management system
CN115563656A (en) * 2022-10-12 2023-01-03 重庆远见信息产业集团股份有限公司 Electronic accounting archive security management system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10134682A1 (en) * 2001-07-20 2003-02-13 Post Ebusiness Gmbh Deutsche Document authenticity verification method has watermark character inserted in document as indication of authenticity verification
CN107171808A (en) * 2017-06-14 2017-09-15 北京市档案局 A kind of verification method and device of electronic record authenticity
CA3050230A1 (en) * 2018-07-19 2020-01-19 Bank Of Montreal Systems and methods for digitization services
RU2736886C1 (en) * 2019-10-07 2020-11-23 Галина Эдуардовна Добрякова Method and system of documents verification
CN113591051A (en) * 2021-07-08 2021-11-02 安徽宝葫芦信息科技集团股份有限公司 Electronic file full life cycle information security system and method
CN114372868A (en) * 2021-12-31 2022-04-19 中国工商银行股份有限公司 Method and device for associating and managing paper files and electronic files
CN115511588A (en) * 2022-10-12 2022-12-23 重庆远见信息产业集团股份有限公司 Electronic accounting archive filing management system
CN115563656A (en) * 2022-10-12 2023-01-03 重庆远见信息产业集团股份有限公司 Electronic accounting archive security management system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
杨茜雅;赵勇刚;: "可信时间戳构筑电子档案安全堡垒", 档案与建设, no. 07 *
黄文平;: "浅析确保电子档案安全与可靠的管理对策", 电脑知识与技术, no. 34 *

Also Published As

Publication number Publication date
CN116992108B (en) 2023-12-19

Similar Documents

Publication Publication Date Title
US10972281B2 (en) System and method for document information authenticity verification
US9946865B2 (en) Document authentication based on expected wear
US8590783B2 (en) Security device reader and method of validation
US20160196509A1 (en) Ticket authorisation
CN103310141A (en) Method and system for monitoring of certificate information security
CN111859431A (en) Electronic file signature method and device, electronic equipment and storage medium
US20060265743A1 (en) Image reader
CN102012999B (en) Electronic file for machine-readable information cards, and implementation method and system thereof
CN114879994A (en) Online control method and system for burning of AIS (automatic identification System) static information of ship
US20170352039A1 (en) Counterfeit Prevention and Detection of University and Academic Institutions Documents Using Unique Codes
CN116992108B (en) Government administration electronic archive processing method and system
CN112434506A (en) Electronic protocol signing processing method, device, computer equipment and medium
KR20200142834A (en) A forgery judging application system and its reading method for a randomized encryption printed image
CN110942407B (en) Electronic evidence collection device and management system
WO2023172190A1 (en) Method and apparatus for accessing data in a plurality of machine readable medium
US11522715B2 (en) Methods for processing and verifying a document
WO2018168826A1 (en) Image processing device, image processing system, image processing method and program
EP3671503B1 (en) Graphometric document signing method and system
WO2005101330A1 (en) Document authentication system and related methods
KR102629509B1 (en) Identification method using two-dimensional code
CN111988489B (en) Identity card copying control method, device and equipment
KR101481954B1 (en) Optical mark reading apparatus and method for increasing security of copy of the original optical marks
US20190363897A1 (en) System and method for authenticating security certificates
CN117521153A (en) Electronic contract signing system and contract processing server
CN115550925A (en) Reliable method, device and system for electronic signature of mobile phone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant