CN1614574A - Anti-fogery file supervising and managing method - Google Patents
Anti-fogery file supervising and managing method Download PDFInfo
- Publication number
- CN1614574A CN1614574A CN 200310103201 CN200310103201A CN1614574A CN 1614574 A CN1614574 A CN 1614574A CN 200310103201 CN200310103201 CN 200310103201 CN 200310103201 A CN200310103201 A CN 200310103201A CN 1614574 A CN1614574 A CN 1614574A
- Authority
- CN
- China
- Prior art keywords
- file
- hash
- data
- record
- managing method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
A new method for monitoring falseproof of the file features that a data recorder is used to record one-way hash value of the file fixed length when the file is signed and issued or the file is received, the data is automatically recorded and it can not be revised. The data recorder has a storage electronic chip with a set of ROM for recording one-way hash value of the fixed length.
Description
The present invention relates to computing machine and electronic technology, refer in particular to and utilize ROM (read-only memory) the data of e-file to be carried out a kind of new false proof monitoring and managing method of file of objective record.
In the development of computer information technology, file, official document etc. all is based on computer technology and drafts, writes and send and receive, and it is universal day by day to utilize network to transmit e-file.Especially in the enforcement of the with no paper office of E-Government, whether a file is received, whether the content of file was not modified, whether the file that portion is received is file signed by (physical or juridical person really, sign and issue down together), if someone forges and swindles at (physical or juridical person, down together) malice, how accurately to identify the true and false?
The preservation of computer data generally is to finish by the database of hard disk, and for example: the data of approval file are kept in approval file people's the Computer Database, checks whether the file of signing and issuing exists the computer data database data with the approval file people to be as the criterion; Otherwise file recipient (physical or juridical person, down together) confirms whether a file exists also and will be as the criterion with its computer data database data.
Under legal system, nature person and legal person, supvr and all be equality by supvr, citizen and government relation between the two, all people are equal before the law, if someone utilizes justice to forge document and loss with the other side's computer data is that reason is carried out dolus malus, how to provide effective technological prevention measure to carry out the material evidence technical appraisement, and judicial decision produces evidence to support?
In international computer theory and the engineering practice, the operational method of Hash (HASH) function is provided, with hash function (Hash Functions) algorithm the file of different length is made a summary, generation has unidirectional (irreversible operation) hash (HASH) value of regular length, be message digest (Message Digest Algorithms), also claim digital finger-print, algorithmic formula decision cryptographic hash is the length of message digest, and this length decision protection computer is decoded the intensity of attacking.Cryptographic hash is a message digest provides the method for digital signature in E-Government and the ecommerce with asymmetric encryption.
The best way that addresses this problem is:
A kind of data record method and equipment of objective e-file are provided; write down the data that it can not be changed, for example cryptographic hash also claims message digest or digital finger-print; so that protect e-file to generate people's (or legal person) interests effectively, make judicial expertise that reliable material evidence appraisal basis be arranged.
Be head it off, this case applicant has proposed 03102354.1 of number of patent application and has been called: the patent application document of " a kind of new electronic signature seal technology ", the cryptographic hash seal method that proposes in this document has solved the data association relation of seal with the file of affixing one's seal, can retrieve the file of associated data and the content that can not change thereof according to the data combination of the unique identification of seal, guaranteed the safety of seal and the interests of the unit of affixing one's seal, thereby the method that adopts long-range strange land stamped signature to send file in the enforcement of the E-Government of making and ecommerce had feasibility.
The objective of the invention is:
Provide a kind of new file false proof monitoring and managing method, it is characterized in that when file is signed and issued or receive through a data register, the cryptographic hash of this data recorder record approval file or reception file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and can not be revised, it is the storer electronic chip of uni-directional hash (HASH) value of regular length that a record cryptographic hash is arranged in the data recorder mainboard, and this storer electronic chip is one or one group of ROM (read-only memory).
Advantage of the present invention is:
The uniqueness data of the e-file that this new false proof monitoring and managing method of file can generate computing machine are carried out objective record, so that strengthen the effective supervision and the judicial technology material evidence of e-file are identified, prevent that malice from forging and swindle.
In administration of justice trial, if being damaged of the computer data database data relevant with data in the data recorder ROM (read-only memory) damages the people and then will bear the responsibility that evidence is loss.
The object of the present invention is achieved like this:
The false proof monitoring and managing method of a kind of new file is characterized in that when file is signed and issued through a data register, and the cryptographic hash of this data recorder record approval file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
The false proof monitoring and managing method of a kind of new file is characterized in that when file receives through a data register, and the cryptographic hash that this data recorder record is received file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
According to claim 1 and the false proof monitoring and managing method of 2 described a kind of new files, it is characterized in that having in the data recorder mainboard record cryptographic hash is the storer electronic chip of uni-directional hash (HASH) value of regular length.
The false proof monitoring and managing method of a kind of new file according to claim 3, the storer electronic chip that it is characterized in that record data in the data recorder are one or one group of ROM (read-only memory).
The present invention is provided by following embodiment and accompanying drawing thereof.
Accompanying drawing is a workflow synoptic diagram of the present invention.
Among the figure:
1. file is signed and issued computing machine;
11. e-file; 12. data recorder; 13. storer electronic chip;
14. internal communication circuit
2. file receiving computer;
21. internal communication circuit; 22. data recorder; 23. storer electronic chip;
3. Network Transmission communication line.
How describe the present invention in detail below in conjunction with embodiment realizes:
The false proof monitoring and managing method of a kind of new file is characterized in that when file is signed and issued through a data register, and the cryptographic hash of this data recorder record approval file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
The false proof monitoring and managing method of a kind of new file is characterized in that when file receives through a data register, and the cryptographic hash that this data recorder record is received file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
According to claim 1 and the false proof monitoring and managing method of 2 described a kind of new files, it is characterized in that having in the data recorder mainboard record cryptographic hash is the storer electronic chip of uni-directional hash (HASH) value of regular length.
The false proof monitoring and managing method of a kind of new file according to claim 3, the storer electronic chip that it is characterized in that record data in the data recorder are one or one group of ROM (read-only memory).
In the technology implementation, connect data management systems 12 by internal communication circuit 14 at the computing machine 1 of file signed by; When e-file 11 needs externally to send, together with the cryptographic hash of using the hash function computing to generate is that uni-directional hash (HASH) value of regular length is passed through data management system 12, the cryptographic hash of this document is that uni-directional hash (HASH) value of regular length is recorded into automatically according to the time in the storer electronic chip 13 of ROM (read-only memory) making, and e-file 11 then sends to the file recipient by Network Transmission communication line 3 with its cryptographic hash.
Otherwise file recipient's computing machine 2 connects data management system 22 by internal communication circuit 21; When e-file 11 then sends to the file recipient by Network Transmission communication line 3 with its cryptographic hash, the cryptographic hash of this document is that uni-directional hash (HASH) value of regular length is recorded in the storer electronic chip 23 that the ROM (read-only memory) of data management system 22 makes automatically according to time of reception, 11 of e-files enter in file recipient's the computing machine 2, perhaps directly by the file output device e-file 11 are made into paper document.
Because the data of the ROM (read-only memory) of data management system 22 storage can not be revised, when screening the authenticity of this document, as long as being uni-directional hash (HASH) value of regular length, the cryptographic hash of this document in data management system 22, exists, and also the e-file with this numerical associations can be accessed in the relevant Computer Database, prove that then this document is real.
Otherwise if the cryptographic hash of a file that provides does not exist in the data management system 22 of file signed by, and data management system 22 is by the malice physical damage, can prove that then this document forges.
If the cryptographic hash of a file that provides exists in data management system 12,22, then it must have a corresponding e-file, and clone's file cryptographic hash content of forging document can use the original that can draw this cryptographic hash to give counterevidence, and screens true and false.
Cryptographic hash is that the uniqueness proof of uni-directional hash (HASH) value of regular length needs corresponding mathematical theory and existing evidence support.If the proposition chance also needs its corresponding theory and existing evidence support.
In administration of justice trial, if being damaged of the computer data database data relevant with data in the data recorder ROM (read-only memory) damages the people and then will bear the responsibility that evidence is loss.
Claims (4)
1. false proof monitoring and managing method of new file, it is characterized in that when e-file 11 is signed and issued through a data register 12, the cryptographic hash of this data recorder 12 record approval files is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
2. false proof monitoring and managing method of new file, it is characterized in that when e-file 11 receives through a data register 22, the cryptographic hash that this data recorder 22 records are received file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
3. according to claim 1 and the false proof monitoring and managing method of 2 described a kind of new files, it is characterized in that having in data recorder 12,22 mainboards record cryptographic hash is the storer electronic chip 13,23 of uni-directional hash (HASH) value of regular length.
4. the false proof monitoring and managing method of a kind of new file according to claim 3, the storer electronic chip 13,23 that it is characterized in that record data in the data recorder are one or one group of ROM (read-only memory).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200310103201 CN1614574A (en) | 2003-11-03 | 2003-11-03 | Anti-fogery file supervising and managing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200310103201 CN1614574A (en) | 2003-11-03 | 2003-11-03 | Anti-fogery file supervising and managing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1614574A true CN1614574A (en) | 2005-05-11 |
Family
ID=34756560
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200310103201 Pending CN1614574A (en) | 2003-11-03 | 2003-11-03 | Anti-fogery file supervising and managing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1614574A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101359353B (en) * | 2008-09-05 | 2011-05-18 | 成都市华为赛门铁克科技有限公司 | File protection method and device |
-
2003
- 2003-11-03 CN CN 200310103201 patent/CN1614574A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101359353B (en) * | 2008-09-05 | 2011-05-18 | 成都市华为赛门铁克科技有限公司 | File protection method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101302562B1 (en) | Apparatus and Method for Falsification Protection of Black Box Data | |
US20110173451A1 (en) | Method and system to provide fine granular integrity to digital data | |
WO2000004422A2 (en) | Method for image processing to facilitate copy protection | |
CN103226675B (en) | A kind of traceability system and method analyzing intrusion behavior | |
CN1894671A (en) | Method for ensuring the integrity of a data record set | |
CN112464030B (en) | Suspicious person determination method and suspicious person determination device | |
CN107154939A (en) | A kind of method and system of data tracing | |
CN111639355B (en) | Data security management method and system | |
CN1193587C (en) | Image and video authentication system | |
CN102456146A (en) | Method for guaranteeing uniqueness of digital certificate based on RFID (radio frequency identification device) technology | |
CN1614574A (en) | Anti-fogery file supervising and managing method | |
CN112055173A (en) | Method for preventing monitoring video from being tampered by using block chain | |
CN116886335A (en) | Data security management system | |
CN2676503Y (en) | A novel electronic data preserving device | |
CN111061695B (en) | File sharing method and system based on block chain | |
CN116028953A (en) | Data encryption method based on privacy calculation | |
CN109271811B (en) | Group signature-based electronic material evidence tamper-proof storage method | |
CN1395223A (en) | Fingerprint patrol system | |
CN1889097A (en) | Antifake examining system with electronic tag video | |
Shivani et al. | An effective pixel-wise fragile watermarking scheme based on ARA bits | |
CN113609334A (en) | Method for improving recognition reliability of cross-camera behaviors by using block chain | |
CN109509095B (en) | Video active identification method combined with block chain | |
CN113709215A (en) | IPFS-based method and system for identifying authenticity of monitoring video | |
KR20210065433A (en) | Method for transmission of integrity guarantee traffic accident information based on blockchain | |
CN213403156U (en) | Network hard disk video recorder for preventing image data from being tampered and stored |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |