CN1614574A - Anti-fogery file supervising and managing method - Google Patents

Anti-fogery file supervising and managing method Download PDF

Info

Publication number
CN1614574A
CN1614574A CN 200310103201 CN200310103201A CN1614574A CN 1614574 A CN1614574 A CN 1614574A CN 200310103201 CN200310103201 CN 200310103201 CN 200310103201 A CN200310103201 A CN 200310103201A CN 1614574 A CN1614574 A CN 1614574A
Authority
CN
China
Prior art keywords
file
hash
data
record
managing method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200310103201
Other languages
Chinese (zh)
Inventor
吴建明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200310103201 priority Critical patent/CN1614574A/en
Publication of CN1614574A publication Critical patent/CN1614574A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A new method for monitoring falseproof of the file features that a data recorder is used to record one-way hash value of the file fixed length when the file is signed and issued or the file is received, the data is automatically recorded and it can not be revised. The data recorder has a storage electronic chip with a set of ROM for recording one-way hash value of the fixed length.

Description

The false proof monitoring and managing method of a kind of new file
The present invention relates to computing machine and electronic technology, refer in particular to and utilize ROM (read-only memory) the data of e-file to be carried out a kind of new false proof monitoring and managing method of file of objective record.
In the development of computer information technology, file, official document etc. all is based on computer technology and drafts, writes and send and receive, and it is universal day by day to utilize network to transmit e-file.Especially in the enforcement of the with no paper office of E-Government, whether a file is received, whether the content of file was not modified, whether the file that portion is received is file signed by (physical or juridical person really, sign and issue down together), if someone forges and swindles at (physical or juridical person, down together) malice, how accurately to identify the true and false?
The preservation of computer data generally is to finish by the database of hard disk, and for example: the data of approval file are kept in approval file people's the Computer Database, checks whether the file of signing and issuing exists the computer data database data with the approval file people to be as the criterion; Otherwise file recipient (physical or juridical person, down together) confirms whether a file exists also and will be as the criterion with its computer data database data.
Under legal system, nature person and legal person, supvr and all be equality by supvr, citizen and government relation between the two, all people are equal before the law, if someone utilizes justice to forge document and loss with the other side's computer data is that reason is carried out dolus malus, how to provide effective technological prevention measure to carry out the material evidence technical appraisement, and judicial decision produces evidence to support?
In international computer theory and the engineering practice, the operational method of Hash (HASH) function is provided, with hash function (Hash Functions) algorithm the file of different length is made a summary, generation has unidirectional (irreversible operation) hash (HASH) value of regular length, be message digest (Message Digest Algorithms), also claim digital finger-print, algorithmic formula decision cryptographic hash is the length of message digest, and this length decision protection computer is decoded the intensity of attacking.Cryptographic hash is a message digest provides the method for digital signature in E-Government and the ecommerce with asymmetric encryption.
The best way that addresses this problem is:
A kind of data record method and equipment of objective e-file are provided; write down the data that it can not be changed, for example cryptographic hash also claims message digest or digital finger-print; so that protect e-file to generate people's (or legal person) interests effectively, make judicial expertise that reliable material evidence appraisal basis be arranged.
Be head it off, this case applicant has proposed 03102354.1 of number of patent application and has been called: the patent application document of " a kind of new electronic signature seal technology ", the cryptographic hash seal method that proposes in this document has solved the data association relation of seal with the file of affixing one's seal, can retrieve the file of associated data and the content that can not change thereof according to the data combination of the unique identification of seal, guaranteed the safety of seal and the interests of the unit of affixing one's seal, thereby the method that adopts long-range strange land stamped signature to send file in the enforcement of the E-Government of making and ecommerce had feasibility.
The objective of the invention is:
Provide a kind of new file false proof monitoring and managing method, it is characterized in that when file is signed and issued or receive through a data register, the cryptographic hash of this data recorder record approval file or reception file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and can not be revised, it is the storer electronic chip of uni-directional hash (HASH) value of regular length that a record cryptographic hash is arranged in the data recorder mainboard, and this storer electronic chip is one or one group of ROM (read-only memory).
Advantage of the present invention is:
The uniqueness data of the e-file that this new false proof monitoring and managing method of file can generate computing machine are carried out objective record, so that strengthen the effective supervision and the judicial technology material evidence of e-file are identified, prevent that malice from forging and swindle.
In administration of justice trial, if being damaged of the computer data database data relevant with data in the data recorder ROM (read-only memory) damages the people and then will bear the responsibility that evidence is loss.
The object of the present invention is achieved like this:
The false proof monitoring and managing method of a kind of new file is characterized in that when file is signed and issued through a data register, and the cryptographic hash of this data recorder record approval file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
The false proof monitoring and managing method of a kind of new file is characterized in that when file receives through a data register, and the cryptographic hash that this data recorder record is received file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
According to claim 1 and the false proof monitoring and managing method of 2 described a kind of new files, it is characterized in that having in the data recorder mainboard record cryptographic hash is the storer electronic chip of uni-directional hash (HASH) value of regular length.
The false proof monitoring and managing method of a kind of new file according to claim 3, the storer electronic chip that it is characterized in that record data in the data recorder are one or one group of ROM (read-only memory).
The present invention is provided by following embodiment and accompanying drawing thereof.
Accompanying drawing is a workflow synoptic diagram of the present invention.
Among the figure:
1. file is signed and issued computing machine;
11. e-file; 12. data recorder; 13. storer electronic chip;
14. internal communication circuit
2. file receiving computer;
21. internal communication circuit; 22. data recorder; 23. storer electronic chip;
3. Network Transmission communication line.
How describe the present invention in detail below in conjunction with embodiment realizes:
The false proof monitoring and managing method of a kind of new file is characterized in that when file is signed and issued through a data register, and the cryptographic hash of this data recorder record approval file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
The false proof monitoring and managing method of a kind of new file is characterized in that when file receives through a data register, and the cryptographic hash that this data recorder record is received file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
According to claim 1 and the false proof monitoring and managing method of 2 described a kind of new files, it is characterized in that having in the data recorder mainboard record cryptographic hash is the storer electronic chip of uni-directional hash (HASH) value of regular length.
The false proof monitoring and managing method of a kind of new file according to claim 3, the storer electronic chip that it is characterized in that record data in the data recorder are one or one group of ROM (read-only memory).
In the technology implementation, connect data management systems 12 by internal communication circuit 14 at the computing machine 1 of file signed by; When e-file 11 needs externally to send, together with the cryptographic hash of using the hash function computing to generate is that uni-directional hash (HASH) value of regular length is passed through data management system 12, the cryptographic hash of this document is that uni-directional hash (HASH) value of regular length is recorded into automatically according to the time in the storer electronic chip 13 of ROM (read-only memory) making, and e-file 11 then sends to the file recipient by Network Transmission communication line 3 with its cryptographic hash.
Otherwise file recipient's computing machine 2 connects data management system 22 by internal communication circuit 21; When e-file 11 then sends to the file recipient by Network Transmission communication line 3 with its cryptographic hash, the cryptographic hash of this document is that uni-directional hash (HASH) value of regular length is recorded in the storer electronic chip 23 that the ROM (read-only memory) of data management system 22 makes automatically according to time of reception, 11 of e-files enter in file recipient's the computing machine 2, perhaps directly by the file output device e-file 11 are made into paper document.
Because the data of the ROM (read-only memory) of data management system 22 storage can not be revised, when screening the authenticity of this document, as long as being uni-directional hash (HASH) value of regular length, the cryptographic hash of this document in data management system 22, exists, and also the e-file with this numerical associations can be accessed in the relevant Computer Database, prove that then this document is real.
Otherwise if the cryptographic hash of a file that provides does not exist in the data management system 22 of file signed by, and data management system 22 is by the malice physical damage, can prove that then this document forges.
If the cryptographic hash of a file that provides exists in data management system 12,22, then it must have a corresponding e-file, and clone's file cryptographic hash content of forging document can use the original that can draw this cryptographic hash to give counterevidence, and screens true and false.
Cryptographic hash is that the uniqueness proof of uni-directional hash (HASH) value of regular length needs corresponding mathematical theory and existing evidence support.If the proposition chance also needs its corresponding theory and existing evidence support.
In administration of justice trial, if being damaged of the computer data database data relevant with data in the data recorder ROM (read-only memory) damages the people and then will bear the responsibility that evidence is loss.

Claims (4)

1. false proof monitoring and managing method of new file, it is characterized in that when e-file 11 is signed and issued through a data register 12, the cryptographic hash of this data recorder 12 record approval files is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
2. false proof monitoring and managing method of new file, it is characterized in that when e-file 11 receives through a data register 22, the cryptographic hash that this data recorder 22 records are received file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and also can not be revised.
3. according to claim 1 and the false proof monitoring and managing method of 2 described a kind of new files, it is characterized in that having in data recorder 12,22 mainboards record cryptographic hash is the storer electronic chip 13,23 of uni-directional hash (HASH) value of regular length.
4. the false proof monitoring and managing method of a kind of new file according to claim 3, the storer electronic chip 13,23 that it is characterized in that record data in the data recorder are one or one group of ROM (read-only memory).
CN 200310103201 2003-11-03 2003-11-03 Anti-fogery file supervising and managing method Pending CN1614574A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200310103201 CN1614574A (en) 2003-11-03 2003-11-03 Anti-fogery file supervising and managing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200310103201 CN1614574A (en) 2003-11-03 2003-11-03 Anti-fogery file supervising and managing method

Publications (1)

Publication Number Publication Date
CN1614574A true CN1614574A (en) 2005-05-11

Family

ID=34756560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200310103201 Pending CN1614574A (en) 2003-11-03 2003-11-03 Anti-fogery file supervising and managing method

Country Status (1)

Country Link
CN (1) CN1614574A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359353B (en) * 2008-09-05 2011-05-18 成都市华为赛门铁克科技有限公司 File protection method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359353B (en) * 2008-09-05 2011-05-18 成都市华为赛门铁克科技有限公司 File protection method and device

Similar Documents

Publication Publication Date Title
KR101302562B1 (en) Apparatus and Method for Falsification Protection of Black Box Data
US20110173451A1 (en) Method and system to provide fine granular integrity to digital data
WO2000004422A2 (en) Method for image processing to facilitate copy protection
CN103226675B (en) A kind of traceability system and method analyzing intrusion behavior
CN1894671A (en) Method for ensuring the integrity of a data record set
CN112464030B (en) Suspicious person determination method and suspicious person determination device
CN107154939A (en) A kind of method and system of data tracing
CN111639355B (en) Data security management method and system
CN1193587C (en) Image and video authentication system
CN102456146A (en) Method for guaranteeing uniqueness of digital certificate based on RFID (radio frequency identification device) technology
CN1614574A (en) Anti-fogery file supervising and managing method
CN112055173A (en) Method for preventing monitoring video from being tampered by using block chain
CN116886335A (en) Data security management system
CN2676503Y (en) A novel electronic data preserving device
CN111061695B (en) File sharing method and system based on block chain
CN116028953A (en) Data encryption method based on privacy calculation
CN109271811B (en) Group signature-based electronic material evidence tamper-proof storage method
CN1395223A (en) Fingerprint patrol system
CN1889097A (en) Antifake examining system with electronic tag video
Shivani et al. An effective pixel-wise fragile watermarking scheme based on ARA bits
CN113609334A (en) Method for improving recognition reliability of cross-camera behaviors by using block chain
CN109509095B (en) Video active identification method combined with block chain
CN113709215A (en) IPFS-based method and system for identifying authenticity of monitoring video
KR20210065433A (en) Method for transmission of integrity guarantee traffic accident information based on blockchain
CN213403156U (en) Network hard disk video recorder for preventing image data from being tampered and stored

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication