CN2676503Y - A novel electronic data preserving device - Google Patents

A novel electronic data preserving device Download PDF

Info

Publication number
CN2676503Y
CN2676503Y CN 200420002495 CN200420002495U CN2676503Y CN 2676503 Y CN2676503 Y CN 2676503Y CN 200420002495 CN200420002495 CN 200420002495 CN 200420002495 U CN200420002495 U CN 200420002495U CN 2676503 Y CN2676503 Y CN 2676503Y
Authority
CN
China
Prior art keywords
data
damage
saved
data storage
communication interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 200420002495
Other languages
Chinese (zh)
Inventor
吴建明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200420002495 priority Critical patent/CN2676503Y/en
Application granted granted Critical
Publication of CN2676503Y publication Critical patent/CN2676503Y/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model provides a novel electronic data preserving device. The utility model is characterized in that the novel electronic data preserving device comprises a communication interface 1 connected with a computer, a data writing device 2, a communication interface outside the data writing device 21, a data preserving device 3, a data storage device 31, a data storage device welded plate 32, a communication interface outside the data storage device 33, and the outer casing of the data storage device 34; the data storage device 31 is one or N programmable read only memories. The utility model has the advantages that the unique data of the electronic files which the computer can generate is recorded objectively to reinforce the effective control and judicial technical certification for the electronic files to prevent the malicious falsification and fraud.

Description

A kind of new electronic data is saved device from damage
The utility model relates to computer and electronic technology, refers in particular to a kind of new electronic data that utilizes programmable read only memory that the data of e-file are carried out objective record and saves device from damage.
In the development of computer information technology, file, official document etc. all is based on computer technology and drafts, writes and send and receive, and it is universal day by day to utilize network to transmit e-file.Especially in the enforcement of the with no paper office of E-Government, whether a file is received, whether the content of file was not modified, whether the file that portion is received is file signed by (physical or juridical person really, sign and issue down together), if someone forges and swindles at (physical or juridical person, down together) malice, how accurately to identify the true and false?
The preservation of computer data generally is to finish by the database of hard disk, and for example: the data of approval file are kept in approval file people's the Computer Database, checks whether the file of signing and issuing exists the computer data database data with the approval file people to be as the criterion; Otherwise file recipient (physical or juridical person, down together) confirms whether a file exists also and will be as the criterion with its computer data database data.
Under legal system, natural person and legal person, manager and all be equality by manager, citizen and government relation between the two, all people are equal before the law, if someone utilizes justice to forge document and loss with the other side's computer data is that reason is carried out dolus malus, how to provide effective technological prevention measure to carry out the material evidence technical appraisement, and judicial decision produces evidence to support?
In international computer theory and the engineering practice, the operation method of Hash (HASH) function is provided, with hash function (Hash Functions) algorithm the file of different length is made a summary, generation has unidirectional (irreversible operation) hash (HASH) value of regular length, be message digest (Message Digest Algorithms), also claim digital finger-print, algorithmic formula decision cryptographic Hash is the length of message digest, and this length decision protection computer is decoded the intensity of attacking.Cryptographic Hash is a message digest provides the method for digital signature in E-Government and the ecommerce with asymmetric encryption.
The best way that addresses this problem is:
A kind of data record method and equipment of objective e-file are provided; write down the data that it can not be changed, for example cryptographic Hash also claims message digest or digital finger-print; so that protect e-file to generate people's (or legal person) interests effectively, make judicial expertise that reliable material evidence appraisal basis be arranged.
Be head it off, this case applicant has proposed 03102354.1 of number of patent application and has been called: the patent application document of " a kind of new electronic signature seal technology ", the cryptographic Hash seal method that proposes in this document has solved the data incidence relation of seal with the file of affixing one's seal, can retrieve the file of associated data and the content that can not change thereof according to the data combination of the unique identification of seal, guaranteed the safety of seal and the interests of the unit of affixing one's seal, thereby the method that adopts long-range strange land stamped signature to send file in the enforcement of the E-Government of making and ecommerce had feasibility.
The purpose of this utility model is:
Provide a kind of new electronic data to save device from damage, it is characterized in that when file is signed and issued or receive through a data register, the cryptographic Hash of this data logger record approval file or reception file is uni-directional hash (HASH) value of regular length, and data are finished record automatically and can not be revised, it is the memory electronic chip of uni-directional hash (HASH) value of regular length that a record cryptographic Hash is arranged in the data logger mainboard, and this memory electronic chip is one or one group of programmable read only memory.
The utility model has the advantages that:
The uniqueness data of the e-file that this new false proof monitoring and managing method of file can generate computer are carried out objective record, so that strengthen the effective supervision and the judicial technology material evidence of e-file are identified, prevent that malice from forging and swindle.
In administration of justice trial, if being damaged of the computer data database data relevant with data in the data logger read-only memory damages the people and then will bear the responsibility that evidence is loss.
The purpose of this utility model is achieved in that
A kind of new electronic data is saved device from damage, it is characterized in that by saving device 3, data storage 31, data storage welded plate 32 from damage with computer communication interface 1, data writing device 2, the outer communication interface 21 of data writing device, data, the outer communication interface 33 of data storage, data storage shell 34 is formed.
This new electronic data is saved device from damage, it is characterized in that it is matched interfaces that a pair of plug mutually inserts with the outer communication interface 21 of data writing device that data are saved the outer communication interface 33 of data storage of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that it is combinations of one or N memory that data are saved the data storage group 31 of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that it is one or N programmable read only memory (PROM, English full name are Programmable ReadOnly Memory) that data are saved the data storage group 31 of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that data writing device 2 is the private memory electronic data write devices that can carry out the fuse operation to programmable read only memory.
This new electronic data is saved device from damage, it is characterized in that data are saved the data space of the data storage 31 of device 3 from damage and used after, can change another new data and save device from damage and use.
Concrete structure of the present utility model is provided by following embodiment and accompanying drawing thereof.
Accompanying drawing is a schematic diagram of the present utility model.
Among the figure:
1. with the computer communication interface;
2. data writing device;
21. the outer communication interface of data writing device
3. data are saved device from damage;
31. data storage
32. data storage welded plate
33. the outer communication interface of data storage
34. data storage shell
Describe the details and the method for work of the concrete device that the utility model proposes in detail below in conjunction with accompanying drawing.
A kind of new electronic data is saved device from damage, it is characterized in that by saving device 3, data storage 31, data storage welded plate 32 from damage with computer communication interface 1, data writing device 2, the outer communication interface 21 of data writing device, data, the outer communication interface 33 of data storage, data storage shell 34 is formed.
This new electronic data is saved device from damage, it is characterized in that it is matched interfaces that a pair of plug mutually inserts with the outer communication interface 21 of data writing device that data are saved the outer communication interface 33 of data storage of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that it is combinations of one or N memory that data are saved the data storage group 31 of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that it is one or N programmable read only memory (PROM, English full name are Programmable ReadOnly Memory) that data are saved the data storage group 31 of device 3 from damage.
This new electronic data is saved device from damage, it is characterized in that data writing device 2 is the private memory electronic data write devices that can carry out the fuse operation to programmable read only memory.This new electronic data is saved device from damage, it is characterized in that data are saved the data space of the data storage 31 of device 3 from damage and used after, can change another new data and save device from damage and use.
In actual the use, with the computer operation system to combine the course of work as follows:
This process is given an example with the data of using cryptographic Hash to save from damage as needs.
When the e-file of a legal entity is is externally signed and issued, the computer system of using inserts this utility model, and the data of one group of fixed length that the cryptographic Hash of the e-file that this utility model will externally be signed and issued by data writing device 2 etc. can not be changed write data and save from damage in the programmable read only memory in the device 3.
During the e-file of the outside input of the reception of a legal entity, the computer system of using inserts this utility model, and the data of one group of fixed length that this utility model can not be changed the cryptographic Hash of the e-file that receives etc. by data writing device 2 write data and save from damage in the programmable read only memory in the device 3.
After effective usage space that the data of this utility model are saved the programmable read only memory of device 3 from damage runs out, can open the matched interfaces that data writing device 2 and data are saved device 3 from damage, change new data again and save device 3 from damage.
The user can select to meet the data volume that the data of own time requirement are saved device from damage according to the file amount of oneself, if be 1000 bits after the data combination that can not change of a e-file, the programmable read only memory of a 512K*8 can be stored 4096 units, and the programmable read only memory of 10 512K*8 can be stored the data that can not change of more than 40,000 file.
Because saving the data of device 3 from damage, data can not revise, when screening the authenticity of e-file, as long as being uni-directional hash (HASH) value of regular length, the cryptographic Hash of this document saves existence in the device 3 from damage in data, and also the e-file with this numerical associations can be accessed in the relevant Computer Database, prove that then this document is real.
Otherwise, do not exist if the cryptographic Hash of a file that provides is saved from damage in the device 3 in the data of file signed by, and data save device 3 from damage not by the malice physical damage, can prove that then this document forges.
If the cryptographic Hash of a file that provides is saved from damage in the device 3 with the data that receive both sides in the transmission of e-file and is existed, then it must have a corresponding e-file, clone's file cryptographic Hash content of forging document can use the original that can draw this cryptographic Hash to give counterevidence, and screens true and false.
Cryptographic Hash is that the uniqueness proof of uni-directional hash (HASH) value of regular length needs corresponding mathematical theory and existing evidence support.If the proposition chance also needs its corresponding theory and existing evidence support.
In administration of justice trial,, damage the responsibility that the people then will bear the evidence of lossing if data are saved device 3 from damage by the malice physical damage.Because send out and the receipts of a e-file are two-way behaviors, can not deny and the exclusiveness objective evidence is loss, thereby protect property owners's interests effectively because of a side malice, make carrying out smoothly of E-Government and e-commerce initiative.

Claims (6)

1. a new electronic data is saved device from damage, it is characterized in that by saving device 3, data storage 31, data storage welded plate 32 from damage with computer communication interface 1, data writing device 2, the outer communication interface 21 of data writing device, data, the outer communication interface 33 of data storage, data storage shell 34 is formed.
2. a kind of new electronic data according to claim 1 is saved device from damage, it is characterized in that it is matched interfaces that a pair of plug mutually inserts with the outer communication interface 21 of data writing device that data are saved the outer communication interface 33 of data storage of device 3 from damage.
3. a kind of new electronic data according to claim 1 is saved device from damage, it is characterized in that it is combinations of one or N memory that data are saved the data storage group 31 of device 3 from damage.
4. a kind of new electronic data according to claim 1 is saved device from damage, it is characterized in that it is one or N programmable read only memory (PROM, English full name are Programmable Read Only Memory) that data are saved the data storage group 31 of device 3 from damage.
5. a kind of new electronic data according to claim 1 is saved device from damage, it is characterized in that data writing device 2 is the private memory electronic data write devices that can carry out the fuse operation to programmable read only memory.
6. save device from damage according to claim 1 and 2 described a kind of new electronic data, it is characterized in that data are saved the data space of the data storage 31 of device 3 from damage and used after, can change another new data and save device from damage and use.
CN 200420002495 2004-02-02 2004-02-02 A novel electronic data preserving device Expired - Fee Related CN2676503Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200420002495 CN2676503Y (en) 2004-02-02 2004-02-02 A novel electronic data preserving device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200420002495 CN2676503Y (en) 2004-02-02 2004-02-02 A novel electronic data preserving device

Publications (1)

Publication Number Publication Date
CN2676503Y true CN2676503Y (en) 2005-02-02

Family

ID=34482254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200420002495 Expired - Fee Related CN2676503Y (en) 2004-02-02 2004-02-02 A novel electronic data preserving device

Country Status (1)

Country Link
CN (1) CN2676503Y (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390225A (en) * 2013-08-05 2013-11-13 天津勤达科贸有限公司 Justice credit information preservation system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390225A (en) * 2013-08-05 2013-11-13 天津勤达科贸有限公司 Justice credit information preservation system

Similar Documents

Publication Publication Date Title
CN107196934A (en) A kind of cloud data managing method based on block chain
US20110173451A1 (en) Method and system to provide fine granular integrity to digital data
CN107154939A (en) A kind of method and system of data tracing
CN111709718A (en) Intelligent warranty asset service platform, method and storage medium based on artificial intelligence
CN111639355B (en) Data security management method and system
CN101514534A (en) Paper embedded with RFID label capable of being numerically signed for anti-counterfeiting
US20080189558A1 (en) System and Method for Secure Data Storage
Karthikeyan et al. Strategy of Trible–E on Solving Trojan Defense in Cyber Crime Cases
CN2676503Y (en) A novel electronic data preserving device
CN112911002B (en) Block chain data sharing encryption method
CN112634037A (en) Electronic license management system based on block chain digital identity and non-homogeneous certificate
CN109801189A (en) A kind of block chain residential property application
CN116090024B (en) Reliable data storage device, system and method
CN112632635A (en) Electronic license management system based on block chain IPFS and non-homogeneous certificate
US11588811B2 (en) Electronic apparatus including non-volatile memory
US20120089849A1 (en) Cookie management system and method
AU2021100847A4 (en) Blockchain based multiple authorities signature model for industrial iot applications
CN115659378A (en) Case record information evidence storing method and related equipment
CN115439296A (en) Public service data open platform based on government affair data
CN111061695B (en) File sharing method and system based on block chain
CN1614574A (en) Anti-fogery file supervising and managing method
CN111784339A (en) Commodity room project license file anti-counterfeiting and storage method based on block chain
CN110543774A (en) XML (extensive Makeup language) file private data protection method and system in cloud environment
CN117708806B (en) Security authentication risk detection method, system, electronic equipment and storage medium
Akeem et al. E-Identity and Security: Study of the Role of Identity Management in Sustainable Development

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20050202

Termination date: 20110202