CN2676503Y - A novel electronic data preserving device - Google Patents
A novel electronic data preserving device Download PDFInfo
- Publication number
- CN2676503Y CN2676503Y CN 200420002495 CN200420002495U CN2676503Y CN 2676503 Y CN2676503 Y CN 2676503Y CN 200420002495 CN200420002495 CN 200420002495 CN 200420002495 U CN200420002495 U CN 200420002495U CN 2676503 Y CN2676503 Y CN 2676503Y
- Authority
- CN
- China
- Prior art keywords
- data
- damage
- saved
- data storage
- communication interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model provides a novel electronic data preserving device. The utility model is characterized in that the novel electronic data preserving device comprises a communication interface 1 connected with a computer, a data writing device 2, a communication interface outside the data writing device 21, a data preserving device 3, a data storage device 31, a data storage device welded plate 32, a communication interface outside the data storage device 33, and the outer casing of the data storage device 34; the data storage device 31 is one or N programmable read only memories. The utility model has the advantages that the unique data of the electronic files which the computer can generate is recorded objectively to reinforce the effective control and judicial technical certification for the electronic files to prevent the malicious falsification and fraud.
Description
The utility model relates to computer and electronic technology, refers in particular to a kind of new electronic data that utilizes programmable read only memory that the data of e-file are carried out objective record and saves device from damage.
In the development of computer information technology, file, official document etc. all is based on computer technology and drafts, writes and send and receive, and it is universal day by day to utilize network to transmit e-file.Especially in the enforcement of the with no paper office of E-Government, whether a file is received, whether the content of file was not modified, whether the file that portion is received is file signed by (physical or juridical person really, sign and issue down together), if someone forges and swindles at (physical or juridical person, down together) malice, how accurately to identify the true and false?
The preservation of computer data generally is to finish by the database of hard disk, and for example: the data of approval file are kept in approval file people's the Computer Database, checks whether the file of signing and issuing exists the computer data database data with the approval file people to be as the criterion; Otherwise file recipient (physical or juridical person, down together) confirms whether a file exists also and will be as the criterion with its computer data database data.
Under legal system, natural person and legal person, manager and all be equality by manager, citizen and government relation between the two, all people are equal before the law, if someone utilizes justice to forge document and loss with the other side's computer data is that reason is carried out dolus malus, how to provide effective technological prevention measure to carry out the material evidence technical appraisement, and judicial decision produces evidence to support?
In international computer theory and the engineering practice, the operation method of Hash (HASH) function is provided, with hash function (Hash Functions) algorithm the file of different length is made a summary, generation has unidirectional (irreversible operation) hash (HASH) value of regular length, be message digest (Message Digest Algorithms), also claim digital finger-print, algorithmic formula decision cryptographic Hash is the length of message digest, and this length decision protection computer is decoded the intensity of attacking.Cryptographic Hash is a message digest provides the method for digital signature in E-Government and the ecommerce with asymmetric encryption.
The best way that addresses this problem is:
A kind of data record method and equipment of objective e-file are provided; write down the data that it can not be changed, for example cryptographic Hash also claims message digest or digital finger-print; so that protect e-file to generate people's (or legal person) interests effectively, make judicial expertise that reliable material evidence appraisal basis be arranged.
Be head it off, this case applicant has proposed 03102354.1 of number of patent application and has been called: the patent application document of " a kind of new electronic signature seal technology ", the cryptographic Hash seal method that proposes in this document has solved the data incidence relation of seal with the file of affixing one's seal, can retrieve the file of associated data and the content that can not change thereof according to the data combination of the unique identification of seal, guaranteed the safety of seal and the interests of the unit of affixing one's seal, thereby the method that adopts long-range strange land stamped signature to send file in the enforcement of the E-Government of making and ecommerce had feasibility.
The purpose of this utility model is:
Provide a kind of new electronic data to save device from damage, it is characterized in that when file is signed and issued or receive through a data register, the cryptographic Hash of this data logger record approval file or reception file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and can not be revised, it is the memory electronic chip of uni-directional hash (HASH) value of regular length that a record cryptographic Hash is arranged in the data logger mainboard, and this memory electronic chip is one or one group of programmable read only memory.
The utility model has the advantages that:
The uniqueness data of the e-file that this new false proof monitoring and managing method of file can generate computer are carried out objective record, so that strengthen the effective supervision and the judicial technology material evidence of e-file are identified, prevent that malice from forging and swindle.
In administration of justice trial, if being damaged of the computer data database data relevant with data in the data logger read-only memory damages the people and then will bear the responsibility that evidence is loss.
The purpose of this utility model is achieved in that
A kind of new electronic data is saved device from damage, it is characterized in that by saving device 3, data storage 31, data storage welded plate 32 from damage with computer communication interface 1, data writing device 2, the outer communication interface 21 of data writing device, data, the outer communication interface 33 of data storage, data storage shell 34 is formed.
This new electronic data is saved device from damage, it is characterized in that it is matched interfaces that a pair of plug mutually inserts with the outer communication interface 21 of data writing device that data are saved the outer communication interface 33 of data storage of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that it is combinations of one or N memory that data are saved the data storage group 31 of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that it is one or N programmable read only memory (PROM, English full name are Programmable ReadOnly Memory) that data are saved the data storage group 31 of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that data writing device 2 is the private memory electronic data write devices that can carry out the fuse operation to programmable read only memory.
This new electronic data is saved device from damage, it is characterized in that data are saved the data space of the data storage 31 of device 3 from damage and used after, can change another new data and save device from damage and use.
Concrete structure of the present utility model is provided by following embodiment and accompanying drawing thereof.
Accompanying drawing is a schematic diagram of the present utility model.
Among the figure:
1. with the computer communication interface;
2. data writing device;
21. the outer communication interface of data writing device
3. data are saved device from damage;
31. data storage
32. data storage welded plate
33. the outer communication interface of data storage
34. data storage shell
Describe the details and the method for work of the concrete device that the utility model proposes in detail below in conjunction with accompanying drawing.
A kind of new electronic data is saved device from damage, it is characterized in that by saving device 3, data storage 31, data storage welded plate 32 from damage with computer communication interface 1, data writing device 2, the outer communication interface 21 of data writing device, data, the outer communication interface 33 of data storage, data storage shell 34 is formed.
This new electronic data is saved device from damage, it is characterized in that it is matched interfaces that a pair of plug mutually inserts with the outer communication interface 21 of data writing device that data are saved the outer communication interface 33 of data storage of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that it is combinations of one or N memory that data are saved the data storage group 31 of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that it is one or N programmable read only memory (PROM, English full name are Programmable ReadOnly Memory) that data are saved the data storage group 31 of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that data writing device 2 is the private memory electronic data write devices that can carry out the fuse operation to programmable read only memory.This new electronic data is saved device from damage, it is characterized in that data are saved the data space of the data storage 31 of device 3 from damage and used after, can change another new data and save device from damage and use.
In actual the use, with the computer operation system to combine the course of work as follows:
This process is given an example with the data of using cryptographic Hash to save from damage as needs.
When the e-file of a legal entity is is externally signed and issued, the computer system of using inserts this utility model, and the data of one group of fixed length that the cryptographic Hash of the e-file that this utility model will externally be signed and issued by data writing device 2 etc. can not be changed write data and save from damage in the programmable read only memory in the device 3.
During the e-file of the outside input of the reception of a legal entity, the computer system of using inserts this utility model, and the data of one group of fixed length that this utility model can not be changed the cryptographic Hash of the e-file that receives etc. by data writing device 2 write data and save from damage in the programmable read only memory in the device 3.
After effective usage space that the data of this utility model are saved the programmable read only memory of device 3 from damage runs out, can open the matched interfaces that data writing device 2 and data are saved device 3 from damage, change new data again and save device 3 from damage.
The user can select to meet the data volume that the data of own time requirement are saved device from damage according to the file amount of oneself, if be 1000 bits after the data combination that can not change of a e-file, the programmable read only memory of a 512K*8 can be stored 4096 units, and the programmable read only memory of 10 512K*8 can be stored the data that can not change of more than 40,000 file.
Because saving the data of device 3 from damage, data can not revise, when screening the authenticity of e-file, as long as being uni-directional hash (HASH) value of regular length, the cryptographic Hash of this document saves existence in the device 3 from damage in data, and also the e-file with this numerical associations can be accessed in the relevant Computer Database, prove that then this document is real.
Otherwise, do not exist if the cryptographic Hash of a file that provides is saved from damage in the device 3 in the data of file signed by, and data save device 3 from damage not by the malice physical damage, can prove that then this document forges.
If the cryptographic Hash of a file that provides is saved from damage in the device 3 with the data that receive both sides in the transmission of e-file and is existed, then it must have a corresponding e-file, clone's file cryptographic Hash content of forging document can use the original that can draw this cryptographic Hash to give counterevidence, and screens true and false.
Cryptographic Hash is that the uniqueness proof of uni-directional hash (HASH) value of regular length needs corresponding mathematical theory and existing evidence support.If the proposition chance also needs its corresponding theory and existing evidence support.
In administration of justice trial,, damage the responsibility that the people then will bear the evidence of lossing if data are saved device 3 from damage by the malice physical damage.Because send out and the receipts of a e-file are two-way behaviors, can not deny and the exclusiveness objective evidence is loss, thereby protect property owners's interests effectively because of a side malice, make carrying out smoothly of E-Government and e-commerce initiative.
Claims (6)
1. a new electronic data is saved device from damage, it is characterized in that by saving device 3, data storage 31, data storage welded plate 32 from damage with computer communication interface 1, data writing device 2, the outer communication interface 21 of data writing device, data, the outer communication interface 33 of data storage, data storage shell 34 is formed.
2. a kind of new electronic data according to claim 1 is saved device from damage, it is characterized in that it is matched interfaces that a pair of plug mutually inserts with the outer communication interface 21 of data writing device that data are saved the outer communication interface 33 of data storage of device 3 from damage.
3. a kind of new electronic data according to claim 1 is saved device from damage, it is characterized in that it is combinations of one or N memory that data are saved the data storage group 31 of device 3 from damage.
4. a kind of new electronic data according to claim 1 is saved device from damage, it is characterized in that it is one or N programmable read only memory (PROM, English full name are Programmable Read Only Memory) that data are saved the data storage group 31 of device 3 from damage.
5. a kind of new electronic data according to claim 1 is saved device from damage, it is characterized in that data writing device 2 is the private memory electronic data write devices that can carry out the fuse operation to programmable read only memory.
6. save device from damage according to claim 1 and 2 described a kind of new electronic data, it is characterized in that data are saved the data space of the data storage 31 of device 3 from damage and used after, can change another new data and save device from damage and use.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200420002495 CN2676503Y (en) | 2004-02-02 | 2004-02-02 | A novel electronic data preserving device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200420002495 CN2676503Y (en) | 2004-02-02 | 2004-02-02 | A novel electronic data preserving device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN2676503Y true CN2676503Y (en) | 2005-02-02 |
Family
ID=34482254
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200420002495 Expired - Fee Related CN2676503Y (en) | 2004-02-02 | 2004-02-02 | A novel electronic data preserving device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN2676503Y (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103390225A (en) * | 2013-08-05 | 2013-11-13 | 天津勤达科贸有限公司 | Justice credit information preservation system |
-
2004
- 2004-02-02 CN CN 200420002495 patent/CN2676503Y/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103390225A (en) * | 2013-08-05 | 2013-11-13 | 天津勤达科贸有限公司 | Justice credit information preservation system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107196934A (en) | A kind of cloud data managing method based on block chain | |
US20110173451A1 (en) | Method and system to provide fine granular integrity to digital data | |
CN107154939A (en) | A kind of method and system of data tracing | |
CN111709718A (en) | Intelligent warranty asset service platform, method and storage medium based on artificial intelligence | |
CN111639355B (en) | Data security management method and system | |
CN101514534A (en) | Paper embedded with RFID label capable of being numerically signed for anti-counterfeiting | |
US20080189558A1 (en) | System and Method for Secure Data Storage | |
Karthikeyan et al. | Strategy of Trible–E on Solving Trojan Defense in Cyber Crime Cases | |
CN2676503Y (en) | A novel electronic data preserving device | |
CN112911002B (en) | Block chain data sharing encryption method | |
CN112634037A (en) | Electronic license management system based on block chain digital identity and non-homogeneous certificate | |
CN109801189A (en) | A kind of block chain residential property application | |
CN116090024B (en) | Reliable data storage device, system and method | |
CN112632635A (en) | Electronic license management system based on block chain IPFS and non-homogeneous certificate | |
US11588811B2 (en) | Electronic apparatus including non-volatile memory | |
US20120089849A1 (en) | Cookie management system and method | |
AU2021100847A4 (en) | Blockchain based multiple authorities signature model for industrial iot applications | |
CN115659378A (en) | Case record information evidence storing method and related equipment | |
CN115439296A (en) | Public service data open platform based on government affair data | |
CN111061695B (en) | File sharing method and system based on block chain | |
CN1614574A (en) | Anti-fogery file supervising and managing method | |
CN111784339A (en) | Commodity room project license file anti-counterfeiting and storage method based on block chain | |
CN110543774A (en) | XML (extensive Makeup language) file private data protection method and system in cloud environment | |
CN117708806B (en) | Security authentication risk detection method, system, electronic equipment and storage medium | |
Akeem et al. | E-Identity and Security: Study of the Role of Identity Management in Sustainable Development |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20050202 Termination date: 20110202 |