WO2014086166A1 - Method and system for preventively preserving electronic data - Google Patents

Method and system for preventively preserving electronic data Download PDF

Info

Publication number
WO2014086166A1
WO2014086166A1 PCT/CN2013/081096 CN2013081096W WO2014086166A1 WO 2014086166 A1 WO2014086166 A1 WO 2014086166A1 CN 2013081096 W CN2013081096 W CN 2013081096W WO 2014086166 A1 WO2014086166 A1 WO 2014086166A1
Authority
WO
WIPO (PCT)
Prior art keywords
ciphertext
library
data
server
client
Prior art date
Application number
PCT/CN2013/081096
Other languages
French (fr)
Chinese (zh)
Inventor
鄢小征
陈奋
毛宪标
Original Assignee
厦门市美亚柏科信息股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 厦门市美亚柏科信息股份有限公司 filed Critical 厦门市美亚柏科信息股份有限公司
Publication of WO2014086166A1 publication Critical patent/WO2014086166A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones

Definitions

  • the present invention relates to the field of electronic data preservation, and more particularly to a method of preventive electronic data preservation, and a system for implementing preventive electronic data preservation.
  • Chinese invention patent application number 201110168678.7 discloses a third-party authentication security system and method based on electronic evidence online preservation.
  • the client After the client sends a security request to the server, the client generates a hash value related to the saved electronic data, and transmits it to the server for saving; the client issues a certification security request, and the server saves the client hash value saved by the system.
  • the comparison of the hash values sent by the client to determine whether the client's previous preservation behavior is objective and true; the communication between the client and the server is encrypted by a secure cryptographic algorithm; the server performs all the hash values in the system.
  • Correlation processing to ensure that the hash value associated with the electronic data stored on the server side will not be tampered with; when the used cryptographic algorithm is deciphered, the application update is preserved, and the data to be preserved and the result data of the last application for preservation are re-executed. Security processing.
  • the method disclosed in the above patent application is not a recognized tamper-proof algorithm. Once the process is completely disclosed, it is easy to be forged and the tamper-proof ability is weak.
  • the original form of the method is electronic data (electronic documents, electronic files, electronic transactions). On the client side, there is a possibility of being forged.
  • the technical solution disclosed in the invention application is mainly for the field of electronic transaction and instant communication, and is not applicable to other network behaviors, because the implementation manner is closely integrated with the electronic transaction and instant messaging system, and is inseparable.
  • the object of the present invention is to overcome the deficiencies of the prior art, and to provide a method for preventing preventive electronic data preservation that can prevent tampering, storage security, leakage, and client identity, and apply the method to the field of judicial depositary notarization.
  • preventive electronic data preservation system based on the preventive electronic data preservation method, the data submitted for preservation is not arbitrarily falsified, and the notary office can directly recognize that it is true and effective, saving a lot of notarization time and cost.
  • the method and system of the present invention are applicable to electronic data formed in everyday network behavior.
  • a method of preventive electronic data preservation the steps are as follows:
  • Encryption uploading step the client data is encrypted into the first ciphertext and then uploaded to the server, and the server saves the first ciphertext to the user library; the server encrypts the first ciphertext in the user library into the second secret. After the text, save to the notarization library of the server; the server generates a first verification code for the first ciphertext in the user library, and saves it to the verification library of the server;
  • Download and decrypt step the client downloads the second ciphertext in the notary library, decrypts to obtain the third ciphertext, and generates a second check code for the third ciphertext, if the second check code and the checksum are in the library The first check code is successfully matched, indicating that the third ciphertext is the same as the first ciphertext, and the third ciphertext is decrypted to obtain the data plaintext.
  • the client data encryption step is specifically: first symmetrically encrypting the data with the first key to obtain the first encrypted data, and then asymmetrically encrypting the first encryption key with the first public key.
  • the server re-encrypts the first encrypted data in the user library by first symmetrically encrypting the first encrypted data with the second key to obtain the second encrypted data, and then using the second public key to the second secret.
  • the key is asymmetrically encrypted to obtain a second encryption key.
  • the second encryption key is first decrypted by the second private key to obtain the second key, and then the second secret data is decrypted by the second key to obtain the third encrypted data;
  • the private key decrypts the first encryption key to obtain the first key, and then decrypts the third encrypted data with the first key.
  • the first key is randomly generated by the client; and the second key is randomly generated by the server.
  • step 1) further comprises: encrypting the check code with a third private key into a cryptographic check code; and step 2) further comprising decrypting the cryptographic check code with the third public key.
  • the time of the client and the server is kept in real time through the network time protocol.
  • the method further includes: after uploading the first encrypted data and the first encryption key, deleting the first encrypted data and the first encryption key on the client.
  • the method further comprises: deleting the data plaintext, the second encrypted data, the third encrypted data, the first check code, and the second check code after the decryption is completed to obtain the data plaintext.
  • a system for preventive electronic data security comprising a user client, a notary office client, and a server, wherein the server includes an application server and a data server; and the data server includes a user library, a notarization library, and a verification library. ;
  • the user client When the encryption is uploaded, the user client encrypts the data into the first ciphertext and uploads it to the user library; the application server encrypts the first ciphertext in the user library into the second ciphertext, and saves it to the notary library; the application server pairs The first ciphertext in the user library generates a first check code and saves it to the check library;
  • the notary office downloads the second ciphertext in the notary library, decrypts to obtain the third ciphertext, and generates a second check code for the third ciphertext, if the second check code and the checksum are in the library The first check code is successfully matched, indicating that the third ciphertext is the same as the first ciphertext, and the third ciphertext is decrypted to obtain the data plaintext.
  • the server further includes a CA/RA server for managing the digital certificate of the user client and the notary client.
  • a CA/RA server for managing the digital certificate of the user client and the notary client.
  • the server further includes an NTP server, and the time of the user encryption, the client of the notary office, and the server are kept in real time during the data encryption uploading process.
  • the technical solution of the invention saves the electronic data separately in the user library and the notary library, and the user has his own user library, and no one can view it by any notary office; the notary office also has its own notarization library, but the notary office cannot view the user data at will. Only when the user applies for notarization and authorization, can the public certificate be viewed and issued; the user cannot modify the content and attributes of the electronic data that has been deposited, even if the user maliciously tampers with the electronic data in the user library, they still cannot Tampering with electronic data in the notary library. Both have a unique check to ensure that the electronic data is the same.
  • the verification code in the verification library that the operation organization is responsible for ensures that the electronic data in the user library and the notarization library are consistent, and the modification of any one party will not pass the check code verification. Any library that has been tampered with can be found by comparing the checksums.
  • CA there is also the application of CA, so that the data in the user library can only be decrypted by the user, and the notarization library can only be decrypted by the notary office and the user at the same time. It is ensured that the evidence submitted by the user is submitted by the user and cannot be tampered with.
  • the notary office can directly recognize and issue a notarial certificate. In the increasingly common network era, this provides a low-cost solution for the electronic data deposit and notarization formed by people in daily network behavior.
  • a hospital can save a patient's electronic medical record to the system provided by the program at the first time of formation, so that when the hospital and the patient have a doctor-patient dispute
  • the hospital legal person may apply to the notary office to directly issue a notarial certificate according to the electronic medical record stored in the system, reduce unnecessary disputes, and reduce waste of resources in the litigation process.
  • Similar corporate applications include insurance company insurance documents, e-commerce company shopping documents, logistics company logistics documents, and so on.
  • Figure 1 is a schematic view showing the connection of the system of the present invention
  • Figure 2 is a schematic diagram of the notarization process of deposit certificate
  • Figure 3 is a schematic diagram of the process of depositing notarized data
  • 1 is the user client
  • 2 is the notary client
  • 3 is the server
  • 4 is the Java application server
  • 5 is the data server
  • 6 is the CA/RA server
  • 7 is the WebServer + NTP server
  • 8 is the user library
  • 9 is the notary library
  • 10 is the verification library.
  • a method of preventive electronic data preservation the steps are as follows:
  • Encryption uploading step the client data is encrypted into the first ciphertext and then uploaded to the server, and the server saves the first ciphertext to the user library; the server encrypts the first ciphertext in the user library into the second secret. After the text, save to the notary library of the server; the server generates the first check code for the first ciphertext in the user library, encrypts the check code with the third private key as the encrypted check code, and saves it to the server of the server. Test library
  • Download and decrypt step the client downloads the second ciphertext in the notary library, obtains the third ciphertext after decryption, generates a second check code for the third ciphertext, and decrypts the encrypted check code by the third public key. Obtaining a first check code; if the second check code is successfully matched with the first check code in the check library, indicating that the third ciphertext is the same as the first ciphertext, decrypting the third ciphertext to obtain The data is clear.
  • the client data encryption step is specifically: the client randomly generates the first key, first symmetrically encrypts the data with the first key to obtain the first encrypted data, and then asymmetrically encrypts the first key with the first public key.
  • the first ciphertext described above includes the first encrypted data and the first encryption key.
  • the server re-encrypts the first encrypted data in the user library: the server randomly generates the second key, first symmetrically encrypts the first encrypted data with the second key to obtain the second encrypted data, and then uses the second
  • the public key asymmetrically encrypts the second key to obtain a second encryption key.
  • the second ciphertext described above includes the second encrypted data and the second encryption key.
  • step 1) and step 2) the time of the client and the server is synchronized in real time through the network time protocol.
  • the client includes: a user client and a notary client; the encrypted uploading step is operated by the user client, and the downloading and decrypting step is operated by the notary client.
  • the core technical solution of the invention is: storing the electronic data encrypted by the user for the first time through the three independent storage spaces - the user library, the notarization library, the verification library - the electronic data in the user library is only The user can view it at the same time; at the same time, the system performs the second encryption and saves it in the notary library.
  • the electronic data in the notary library can only be issued to the designated notary office if the user authorizes it, and the notarization library is independent.
  • Third-party repository finally, the system also generates a unique check code for the electronic data stored in the verification library. This check code ensures that the data in the user database and the notary library are consistent. If the electronic data in any of the libraries has been tampered with, it can be found by comparing the check codes.
  • a system for preventive electronic data security as shown in FIG. 1 includes a user client 1, a notary office client 2, and a server 3, and the server 3 includes a Java application server 4, a data server 5, and a CA/ The RA server 6, the WebServer+NTP server 7; the data server 5 includes a user library 8, a notary library 9, and a verification library 10; the CA/RA server 6 is used for the number of the user client 1, the notary client 2 Certificate management; NTP is used in data encryption upload process, user client 1, notary client 2, server 3 time is consistent with the time of the national time center; WebServer is used to handle some static resource requests and load balancing .
  • the user client 1 is responsible for collecting, encrypting, and transmitting the electronic data to the server 3.
  • electronic data collection of various network behaviors such as online shopping, web chat, and e-mail can be realized without changing the user's usage habits.
  • the encryption is performed synchronously and transmitted to the server 3, and the user does not retain any electronic data locally. In the process of depositing the entire electronic data, users or other external factors cannot interfere with the acquisition, encryption, and transmission procedures.
  • the notary office client 2 is used by the notary public notary. After the user submits a notarization application for an electronic data, carry a valid certificate that can prove his identity, and a digital certificate to the notary office; under the authorization of the notary public, use the notary office client 2 to download and decrypt the electronic data. View and issue a notarized certificate for this electronic data.
  • the server 3 is composed of a server cluster, and includes a database server 5, an application server 4, a CA/RA server 6, and a time server.
  • the database server 5 provides three independent storage spaces, namely, a user library 8, a notary library 9, a verification library 10, and a matching digital certificate management, encryption and decryption service, and verification service.
  • the user client 1 randomly generates a first key 11 to perform the first symmetric encryption on the electronic data into the first encrypted data, and simultaneously uses the first public key 12 of the user to the first
  • the key 11 is asymmetrically encrypted into the first encryption key 13, so that the first encrypted data can only be decrypted by its own first private key 14 in the future, that is, only the person can read it, and others cannot read it.
  • the user client 1 uploads the first encrypted data, the first encryption key 13, while deleting all relevant data, including the first encrypted data, the first encryption key 13;
  • the server 3 is responsible for saving the first encrypted data and the first encryption key 13 submitted by the user to the user library 8;
  • the second key 31 is randomly generated by the server 3, the second encrypted data is symmetrically encrypted into the second encrypted data, and the first encryption key 13 is used for the second time using the notary public key 32.
  • a hash check code is generated for the first encrypted data in the user library 8, and is signed by the third private key (checking private key) representing the verification mechanism, and then stored in the check library 10, indicating the hash check.
  • the code is secured by the verification mechanism.
  • the time of the user client 1, the notary office client 2, and the server 3 automatically keeps synchronized with the national time-of-day center, ensuring that the user completes the depositing action in a time that cannot be tampered with.
  • the user goes to the designated notary office, the notary public notary extracts the second encrypted data and the second encryption key 33 in the notary library 9 through the notary office client 2, and passes through the second private key 21 of the notary office to the second encryption key
  • the key 33 is decrypted to obtain the second key 31, and the second encrypted data is decrypted for the first time by the second key 31 to obtain the third encrypted data (decryption for the second encryption, after decryption is still ciphertext, and cannot be viewed yet) );
  • the key includes an electronic data plaintext, a second encrypted data, a third encrypted data, a first check code, and a second check code.
  • the user has his own user library 8, and any person including the notary office can not view; the notary office also has its own notarization library 9.
  • the user cannot modify the content and attributes of the electronic data that has been deposited, even if the user maliciously tampers with the electronic data in the user library 8 (such as the system administrator of the user federated user library 8, or the system administrator itself is the user), but they The electronic data in the notary library 9 cannot be falsified, and the verification code signed by the verification institution in the library 10 cannot be verified. Therefore, this solution can solve the problem of security deposit and notarization of electronic data.
  • the content transmitted between the client and the server 3 is encrypted, and even if it is stolen in the network transmission, information leakage does not occur.
  • data transmission can go SSL (Secure Sockets Layer), which will provide better network transmission security.
  • the algorithm used for the first and second symmetric encryption may be AES (Advanced Encryption).
  • Standard, Advanced Encryption Standard, or other symmetric encryption algorithms are available.
  • Different strength encryption algorithms can be used for different electronic data storage requirements.
  • the asymmetric encryption algorithm can be RSA, or other asymmetric encryption algorithms are available.
  • the hash digest check code generation algorithm can be SHAl (Secure Hash) Algorithm), or other digest algorithms, such as MD5. During the transfer process, the data is likely to change, then a different message digest will be generated at this time.
  • the digest algorithm has the following characteristics: It is not possible to recover information from a message digest; two different messages do not produce the same message digest.
  • the invention provides a preventive electronic data preservation method and a system for implementing preventive electronic data preservation, which can prevent tampering, storage security, easy disclosure, and clear client identity, and save time and cost in judicial deposit certificate notarization.

Abstract

The present invention relates to a method for preventively preserving electronic data, and a system for realizing preventive electronic data preservation. The steps of the method are as follows: 1) an encryption and uploading step: encrypting client data into a first ciphertext and then uploading same to a service end, and the service end storing the first ciphertext in a user library; the service end encrypting the first ciphertext in the user library into a second ciphertext and then storing same to a notarization library of the service end; and the service end generating a first check code for the first ciphertext in the user library and storing same in a check library of the service end; and 2) a downloading and decryption step: the client downloading the second ciphertext in the notarization library, decrypting same to obtain a third ciphertext, and generating a second check code for the third ciphertext, and if the second check code successfully matches the first check code in the check library, which represents that the third ciphertext is the same as the first ciphertext, decrypting the third ciphertext to obtain a data cleartext. Tampering can be prevented, the storage is secure, it is not easy to leak, the client identity is clear, and in the judicial evidence notarization, time and costs can be saved.

Description

一种预防性电子数据保全的方法及系统  Method and system for preventive electronic data preservation 技术领域  Technical field
本发明涉及一种电子数据保全领域,更具体地说,涉及一种预防性电子数据保全的方法,以及实现预防性电子数据保全的系统。 The present invention relates to the field of electronic data preservation, and more particularly to a method of preventive electronic data preservation, and a system for implementing preventive electronic data preservation.
背景技术Background technique
互联网时代,人们通过网络购物、网络聊天、电子邮件等各种网络行为,形成海量的电子数据,这些电子数据一旦涉及到法律纠纷,其证据效力(或称证据价值、证据力),即如何体现作为证据的电子数据的客观性,成为法律工作者与信息技术工程师需要共同解决的问题。In the Internet age, people form a large amount of electronic data through various online behaviors such as online shopping, online chat, and e-mail. Once these electronic data involve legal disputes, their evidence effectiveness (or evidence value, evidence power) is how to reflect The objectivity of electronic data as evidence has become a problem that legal workers and information technology engineers need to solve together.
中国发明专利申请号201110168678.7公开了一种基于电子证据在线保全的第三方认证保全系统及方法。客户端向服务器端发出保全请求后,客户端生成与保全的电子数据相关的哈希值,并传给服务器端保存;客户端发出认证保全请求,服务器端将系统保存的客户端哈希值与客户端传来的哈希值对比,以确定客户端曾经的保全行为是否客观真实;客户端与服务器端之间的通信采用了安全的密码算法加密;服务器端对系统内所有的哈希值进行关联处理,以确保服务器端保存的与电子数据相关的哈希值不会被篡改;当使用的密码算法被破译时,申请更新保全,将需保全的数据和上一次申请保全的结果数据重新进行保全处理。Chinese invention patent application number 201110168678.7 discloses a third-party authentication security system and method based on electronic evidence online preservation. After the client sends a security request to the server, the client generates a hash value related to the saved electronic data, and transmits it to the server for saving; the client issues a certification security request, and the server saves the client hash value saved by the system. The comparison of the hash values sent by the client to determine whether the client's previous preservation behavior is objective and true; the communication between the client and the server is encrypted by a secure cryptographic algorithm; the server performs all the hash values in the system. Correlation processing to ensure that the hash value associated with the electronic data stored on the server side will not be tampered with; when the used cryptographic algorithm is deciphered, the application update is preserved, and the data to be preserved and the result data of the last application for preservation are re-executed. Security processing.
但上述专利申请公开的方法并不是公认的防篡改算法,一旦处理过程被完全公开,容易被伪造,防篡改能力弱;其次,该方法的原生形态电子数据(电子文书、电子档案、电子交易)在客户端保存,存在被伪造的可能性,另外当客户端物理机器变更时,数据迁移对于普通用户来讲是很麻烦的过程。同时,该发明申请公开的技术方案主要是针对电子交易、即时通讯领域,不适用于其他网络行为,因其实现方式是跟电子交易、即时通讯系统紧密结合、不可分割的。However, the method disclosed in the above patent application is not a recognized tamper-proof algorithm. Once the process is completely disclosed, it is easy to be forged and the tamper-proof ability is weak. Secondly, the original form of the method is electronic data (electronic documents, electronic files, electronic transactions). On the client side, there is a possibility of being forged. In addition, when the client physical machine changes, data migration is a troublesome process for ordinary users. At the same time, the technical solution disclosed in the invention application is mainly for the field of electronic transaction and instant communication, and is not applicable to other network behaviors, because the implementation manner is closely integrated with the electronic transaction and instant messaging system, and is inseparable.
发明内容Summary of the invention
本发明的目的在于克服现有技术的不足,提供一种可防止篡改、存储安全、不易泄露、客户端身份明确的预防性电子数据保全的方法,将该方法运用至司法存证公证领域中,配合预防性电子数据保全的系统,基于预防性电子数据保全的方法,确保提交保全的数据不被随意篡改,公证处可直接承认其真实有效,节约大量公证时间与成本。本发明所述的方法与系统适用于日常网络行为中形成的电子数据。The object of the present invention is to overcome the deficiencies of the prior art, and to provide a method for preventing preventive electronic data preservation that can prevent tampering, storage security, leakage, and client identity, and apply the method to the field of judicial depositary notarization. In conjunction with the preventive electronic data preservation system, based on the preventive electronic data preservation method, the data submitted for preservation is not arbitrarily falsified, and the notary office can directly recognize that it is true and effective, saving a lot of notarization time and cost. The method and system of the present invention are applicable to electronic data formed in everyday network behavior.
本发明的技术方案如下:The technical solution of the present invention is as follows:
一种预防性电子数据保全的方法,步骤如下:A method of preventive electronic data preservation, the steps are as follows:
1)加密上传步骤:客户端数据加密为第一密文后上传到服务端,服务端将第一密文保存至用户库;服务端对用户库里的第一密文进行加密为第二密文后,保存至服务端的公证库;服务端对用户库里的第一密文生成第一校验码,保存至服务端的校验库;1) Encryption uploading step: the client data is encrypted into the first ciphertext and then uploaded to the server, and the server saves the first ciphertext to the user library; the server encrypts the first ciphertext in the user library into the second secret. After the text, save to the notarization library of the server; the server generates a first verification code for the first ciphertext in the user library, and saves it to the verification library of the server;
2)下载解密步骤:客户端下载公证库里的第二密文,解密后得到第三密文,并对第三密文生成第二校验码,如果第二校验码与校验库中的第一校验码匹配成功,表示第三密文与第一密文相同,则对第三密文进行解密,获得数据明文。2) Download and decrypt step: the client downloads the second ciphertext in the notary library, decrypts to obtain the third ciphertext, and generates a second check code for the third ciphertext, if the second check code and the checksum are in the library The first check code is successfully matched, indicating that the third ciphertext is the same as the first ciphertext, and the third ciphertext is decrypted to obtain the data plaintext.
作为优选,客户端数据加密步骤具体为:先用第一密钥对数据进行对称加密得到第一加密数据,然后用第一公钥对第一密钥进行不对称加密第一加密密钥。Preferably, the client data encryption step is specifically: first symmetrically encrypting the data with the first key to obtain the first encrypted data, and then asymmetrically encrypting the first encryption key with the first public key.
作为优选,服务端对用户库里的第一加密数据再加密的步骤为:先用第二密钥对第一加密数据进行对称加密得到第二加密数据,然后用第二公钥对第二密钥进行不对称加密得到第二加密密钥。Preferably, the server re-encrypts the first encrypted data in the user library by first symmetrically encrypting the first encrypted data with the second key to obtain the second encrypted data, and then using the second public key to the second secret. The key is asymmetrically encrypted to obtain a second encryption key.
作为优选,解密时,先用第二私钥对第二加密密钥进行解密得到第二密钥,再用第二密钥对加第二密数据进行解密得到第三加密数据;然后用第一私钥对第一加密密钥进行解密得到第一密钥,再用第一密钥对第三加密数据进行解密。Preferably, when decrypting, the second encryption key is first decrypted by the second private key to obtain the second key, and then the second secret data is decrypted by the second key to obtain the third encrypted data; The private key decrypts the first encryption key to obtain the first key, and then decrypts the third encrypted data with the first key.
作为优选,所述的第一密钥为客户端随机生成的;所述的第二密钥为服务端随机生成的。Preferably, the first key is randomly generated by the client; and the second key is randomly generated by the server.
作为优选,步骤1)进一步还包括:用第三私钥对校验码进行加密为加密校验码;步骤2)进一步还包括用第三公钥对加密校验码进行解密。Advantageously, step 1) further comprises: encrypting the check code with a third private key into a cryptographic check code; and step 2) further comprising decrypting the cryptographic check code with the third public key.
作为优选,步骤1)、步骤2)进行的过程中,客户端、服务端的时间通过网络时间协议保持实时同步。Preferably, in the process of step 1) and step 2), the time of the client and the server is kept in real time through the network time protocol.
作为优选,进一步包括:上传第一加密数据、第一加密密钥后,删除客户端上的第一加密数据、第一加密密钥。Preferably, the method further includes: after uploading the first encrypted data and the first encryption key, deleting the first encrypted data and the first encryption key on the client.
作为优选,进一步包括:解密完成得到数据明文后,删除数据明文、第二加密数据、第三加密数据、第一校验码、第二校验码。Preferably, the method further comprises: deleting the data plaintext, the second encrypted data, the third encrypted data, the first check code, and the second check code after the decryption is completed to obtain the data plaintext.
一种预防性电子数据保全的系统,包括用户客户端、公证处客户端、服务端,所述的服务端包括应用服务器、数据服务器;所述的数据服务器包括用户库、公证库、校验库; A system for preventive electronic data security, comprising a user client, a notary office client, and a server, wherein the server includes an application server and a data server; and the data server includes a user library, a notarization library, and a verification library. ;
加密上传时,用户客户端把数据加密为第一密文后上传到至用户库;应用服务器对用户库里的第一密文进行加密为第二密文后,保存至公证库;应用服务器对用户库里的第一密文生成第一校验码,保存至校验库;When the encryption is uploaded, the user client encrypts the data into the first ciphertext and uploads it to the user library; the application server encrypts the first ciphertext in the user library into the second ciphertext, and saves it to the notary library; the application server pairs The first ciphertext in the user library generates a first check code and saves it to the check library;
下载解密时,公证处客户端下载公证库里的第二密文,解密后得到第三密文,并对第三密文生成第二校验码,如果第二校验码与校验库中的第一校验码匹配成功,表示第三密文与第一密文相同,则对第三密文进行解密,获得数据明文。When downloading and decrypting, the notary office downloads the second ciphertext in the notary library, decrypts to obtain the third ciphertext, and generates a second check code for the third ciphertext, if the second check code and the checksum are in the library The first check code is successfully matched, indicating that the third ciphertext is the same as the first ciphertext, and the third ciphertext is decrypted to obtain the data plaintext.
作为优选,服务端还包括CA/RA服务器,用于对用户客户端、公证处客户端的数字证书进行管理。Preferably, the server further includes a CA/RA server for managing the digital certificate of the user client and the notary client.
作为优选,服务端还包括NTP服务器,用于数据加密上传过程中,用户客户端、公证处客户端、服务端的时间保持实时同步。Preferably, the server further includes an NTP server, and the time of the user encryption, the client of the notary office, and the server are kept in real time during the data encryption uploading process.
本发明的有益效果如下:The beneficial effects of the present invention are as follows:
本发明的技术方案把电子数据在用户库和公证库分开保存,用户拥有自己的用户库,任何人包括公证处都无法查看;公证处也有自己的公证库,但公证处无法随意查看用户的数据,只有在用户申请公证、并授权的情况下,才能查看并出具公证书;用户无法修改已经存证的电子数据的内容、属性,即使用户恶意篡改了用户库中的电子数据,但他们仍然无法篡改公证库中的电子数据。两者具有唯一性校验,确保电子数据为同一份。运营机构负责的校验库中的校验码,确保了用户库与公证库中的电子数据是一致的,任何一方的修改都将无法通过校验码的校验。任何一个库被篡改,都可以通过对比校验码发现。另外还有CA的应用,使得用户库中的数据只能被用户解密,公证库中的只能被公证处和用户同时在场的情况下解密。确保了用户提交的证据是其本人提交的、无法篡改的,公证处可以直接认可并为其出具公证书。这在日益普遍的网络时代,为人们在日常网络行为中形成的电子数据存证、公证提供了低成本的解决办法。The technical solution of the invention saves the electronic data separately in the user library and the notary library, and the user has his own user library, and no one can view it by any notary office; the notary office also has its own notarization library, but the notary office cannot view the user data at will. Only when the user applies for notarization and authorization, can the public certificate be viewed and issued; the user cannot modify the content and attributes of the electronic data that has been deposited, even if the user maliciously tampers with the electronic data in the user library, they still cannot Tampering with electronic data in the notary library. Both have a unique check to ensure that the electronic data is the same. The verification code in the verification library that the operation organization is responsible for ensures that the electronic data in the user library and the notarization library are consistent, and the modification of any one party will not pass the check code verification. Any library that has been tampered with can be found by comparing the checksums. In addition, there is also the application of CA, so that the data in the user library can only be decrypted by the user, and the notarization library can only be decrypted by the notary office and the user at the same time. It is ensured that the evidence submitted by the user is submitted by the user and cannot be tampered with. The notary office can directly recognize and issue a notarial certificate. In the increasingly common network era, this provides a low-cost solution for the electronic data deposit and notarization formed by people in daily network behavior.
不仅个人,本发明的技术方案也能应用到企业信息化中,比如医院可以把患者的电子病历在形成的第一时间就保存到本方案提供的系统中,这样当医院与患者出现医患纠纷、患者怀疑医院篡改病历的时候,医院法人可以申请公证处根据本系统中存储的电子病历直接出具公证书,减少无谓纠纷,减少诉讼过程中资源的浪费。类似的企业应用还有保险公司的保险单据,电子商务公司的购物单据,物流公司的物流单据等等。Not only individuals, but also the technical solutions of the present invention can be applied to enterprise informationization. For example, a hospital can save a patient's electronic medical record to the system provided by the program at the first time of formation, so that when the hospital and the patient have a doctor-patient dispute When the patient suspects that the hospital has falsified the medical record, the hospital legal person may apply to the notary office to directly issue a notarial certificate according to the electronic medical record stored in the system, reduce unnecessary disputes, and reduce waste of resources in the litigation process. Similar corporate applications include insurance company insurance documents, e-commerce company shopping documents, logistics company logistics documents, and so on.
附图说明DRAWINGS
图1是本发明所述的系统的连接示意图;Figure 1 is a schematic view showing the connection of the system of the present invention;
图2是存证公证流程示意图;Figure 2 is a schematic diagram of the notarization process of deposit certificate;
图3是存证公证数据流程示意图;Figure 3 is a schematic diagram of the process of depositing notarized data;
图中:1是用户客户端,2是公证处客户端,3是服务端,4是Java应用服务器,5是数据服务器,6是CA/RA服务器,7是WebServer+NTP服务器,8是用户库,9是公证库,10是校验库。In the figure: 1 is the user client, 2 is the notary client, 3 is the server, 4 is the Java application server, 5 is the data server, 6 is the CA/RA server, 7 is the WebServer + NTP server, 8 is the user library , 9 is the notary library, and 10 is the verification library.
具体实施方式detailed description
以下结合附图及实施例对本发明进行进一步的详细说明。The present invention will be further described in detail below with reference to the accompanying drawings and embodiments.
一种预防性电子数据保全的方法,步骤如下:A method of preventive electronic data preservation, the steps are as follows:
1)加密上传步骤:客户端数据加密为第一密文后上传到服务端,服务端将第一密文保存至用户库;服务端对用户库里的第一密文进行加密为第二密文后,保存至服务端的公证库;服务端对用户库里的第一密文生成第一校验码,用第三私钥对校验码进行加密为加密校验码,保存至服务端的校验库;1) Encryption uploading step: the client data is encrypted into the first ciphertext and then uploaded to the server, and the server saves the first ciphertext to the user library; the server encrypts the first ciphertext in the user library into the second secret. After the text, save to the notary library of the server; the server generates the first check code for the first ciphertext in the user library, encrypts the check code with the third private key as the encrypted check code, and saves it to the server of the server. Test library
2)下载解密步骤:客户端下载公证库里的第二密文,解密后得到第三密文,并对第三密文生成第二校验码,第三公钥对加密校验码进行解密,得到第一校验码;如果第二校验码与校验库中的第一校验码匹配成功,表示第三密文与第一密文相同,则对第三密文进行解密,获得数据明文。2) Download and decrypt step: the client downloads the second ciphertext in the notary library, obtains the third ciphertext after decryption, generates a second check code for the third ciphertext, and decrypts the encrypted check code by the third public key. Obtaining a first check code; if the second check code is successfully matched with the first check code in the check library, indicating that the third ciphertext is the same as the first ciphertext, decrypting the third ciphertext to obtain The data is clear.
客户端数据加密步骤具体为:客户端随机生成第一密钥,先用第一密钥对数据进行对称加密得到第一加密数据,然后用第一公钥对第一密钥进行不对称加密第一加密密钥。上述的第一密文即包括第一加密数据与第一加密密钥。The client data encryption step is specifically: the client randomly generates the first key, first symmetrically encrypts the data with the first key to obtain the first encrypted data, and then asymmetrically encrypts the first key with the first public key. An encryption key. The first ciphertext described above includes the first encrypted data and the first encryption key.
服务端对用户库里的第一加密数据再加密的步骤为:服务端随机生成第二密钥,先用第二密钥对第一加密数据进行对称加密得到第二加密数据,然后用第二公钥对第二密钥进行不对称加密得到第二加密密钥。上述的第二密文即包括第二加密数据与第二加密密钥。The server re-encrypts the first encrypted data in the user library: the server randomly generates the second key, first symmetrically encrypts the first encrypted data with the second key to obtain the second encrypted data, and then uses the second The public key asymmetrically encrypts the second key to obtain a second encryption key. The second ciphertext described above includes the second encrypted data and the second encryption key.
解密时,先用第二私钥对第二加密密钥进行解密得到第二密钥,再用第二密钥对加第二密数据进行解密得到第三加密数据;然后用第一私钥对第一加密密钥进行解密得到第一密钥,再用第一密钥对第三加密数据进行解密。When decrypting, first decrypting the second encryption key with the second private key to obtain the second key, and then decrypting the second encrypted data with the second key to obtain the third encrypted data; then using the first private key pair The first encryption key is decrypted to obtain a first key, and the third encrypted data is decrypted by the first key.
步骤1)、步骤2)进行的过程中,客户端、服务端的时间通过网络时间协议保持实时同步。所述的客户端包括:用户客户端和公证处客户端;加密上传步骤由用户客户端操作,下载解密步骤由公证处客户端操作。In the process of step 1) and step 2), the time of the client and the server is synchronized in real time through the network time protocol. The client includes: a user client and a notary client; the encrypted uploading step is operated by the user client, and the downloading and decrypting step is operated by the notary client.
实施例Example
本发明的核心技术方案为:通过三个独立的存储空间--用户库、公证库、校验库--把用户第一次加密后的电子数据保存在用户库,用户库中的电子数据只有用户本人才能查看;同时,系统进行第二次加密并保存在公证库中,公证库中的电子数据只有在用户本人授权的情况下,前往指定的公证处才能出具公证书,公证库就是独立的第三方存储库;最后系统还要对这份电子数据生成一个唯一的校验码保存在校验库中,这份校验码确保了电子数据在用户库和公证库中的数据是一致的,如果任何一个库中的电子数据被篡改过,都可以通过比对校验码发现。The core technical solution of the invention is: storing the electronic data encrypted by the user for the first time through the three independent storage spaces - the user library, the notarization library, the verification library - the electronic data in the user library is only The user can view it at the same time; at the same time, the system performs the second encryption and saves it in the notary library. The electronic data in the notary library can only be issued to the designated notary office if the user authorizes it, and the notarization library is independent. Third-party repository; finally, the system also generates a unique check code for the electronic data stored in the verification library. This check code ensures that the data in the user database and the notary library are consistent. If the electronic data in any of the libraries has been tampered with, it can be found by comparing the check codes.
运用到存证公证领域时,这三个独立的存储空间授权给三个独立的组织机构或个人进行管理。用户库、公证库、校验库对应的所有者分别是用户、公证处、电子数据保全运营机构(以下简称运营机构)。本方案要确保用户提交的证据是其本人提交的、无法篡改的,公证处可以直接认可并为其出具公证书的。When applied to the notarization of deposit certificates, these three separate storage spaces are licensed to three independent organizations or individuals for management. The owner of the user library, the notary library, and the verification library are the user, the notary office, and the electronic data security operation organization (hereinafter referred to as the operation organization). This program must ensure that the evidence submitted by the user is submitted by the user and cannot be tampered with. The notary office can directly recognize and issue a notarial certificate.
如图1所示的一种预防性电子数据保全的系统,包括用户客户端1、公证处客户端2、服务端3,所述的服务端3包括Java应用服务器4、数据服务器5、CA/RA服务器6、WebServer+NTP服务器7;所述的数据服务器5包括用户库8、公证库9、校验库10;CA/RA服务器6用于对用户客户端1、公证处客户端2的数字证书进行管理;NTP用于数据加密上传过程中,用户客户端1、公证处客户端2、服务端3的时间与国家授时中心的时间保持一致;WebServer用于处理一些静态资源的请求以及负载均衡。A system for preventive electronic data security as shown in FIG. 1 includes a user client 1, a notary office client 2, and a server 3, and the server 3 includes a Java application server 4, a data server 5, and a CA/ The RA server 6, the WebServer+NTP server 7; the data server 5 includes a user library 8, a notary library 9, and a verification library 10; the CA/RA server 6 is used for the number of the user client 1, the notary client 2 Certificate management; NTP is used in data encryption upload process, user client 1, notary client 2, server 3 time is consistent with the time of the national time center; WebServer is used to handle some static resource requests and load balancing .
用户客户端1负责电子数据的采集、加密、并传输到服务端3。通过提供各种电子数据的采集方法,在不改变用户使用习惯的前提下,实现网络购物、网络聊天、电子邮件等各种网络行为电子数据采集。在采集过程中,同步进行加密、并传输到服务端3,用户本地不会保留任何的电子数据。在整个电子数据的存证过程中,用户或者其他外在因素无法干预采集、加密、传输程序。The user client 1 is responsible for collecting, encrypting, and transmitting the electronic data to the server 3. By providing various electronic data collection methods, electronic data collection of various network behaviors such as online shopping, web chat, and e-mail can be realized without changing the user's usage habits. During the acquisition process, the encryption is performed synchronously and transmitted to the server 3, and the user does not retain any electronic data locally. In the process of depositing the entire electronic data, users or other external factors cannot interfere with the acquisition, encryption, and transmission procedures.
公证处客户端2是给公证处公证员使用的。在用户提出针对某个电子数据的公证申请后,携带能够证明自身身份的有效证件,以及数字证书前往公证处;公证处公证员在其授权下,使用公证处客户端2下载、解密电子数据,查看、并出具该电子数据的公证书。The notary office client 2 is used by the notary public notary. After the user submits a notarization application for an electronic data, carry a valid certificate that can prove his identity, and a digital certificate to the notary office; under the authorization of the notary public, use the notary office client 2 to download and decrypt the electronic data. View and issue a notarized certificate for this electronic data.
服务端3是由一个服务器集群组成,包括了数据库服务器5、应用服务器4、CA/RA服务器6、时间服务器。数据库服务器5提供了三个独立的存储空间,即用户库8、公证库9、校验库10,以及配套的数字证书管理、加解密服务、校验服务。The server 3 is composed of a server cluster, and includes a database server 5, an application server 4, a CA/RA server 6, and a time server. The database server 5 provides three independent storage spaces, namely, a user library 8, a notary library 9, a verification library 10, and a matching digital certificate management, encryption and decryption service, and verification service.
如图2所示的存证公证流程示意图,主要分为两大步骤:The schematic diagram of the notarization process of deposit certificate shown in Figure 2 is mainly divided into two major steps:
1、用户提交电子数据进行存证的流程如下:1. The process for users to submit electronic data for deposit is as follows:
1.1、用户在提交电子数据之前,用户客户端1随机生成一个第一密钥11,对电子数据进行第一次对称加密成第一加密数据,同时用该用户的第一公钥12对第一密钥11进行不对称加密成第一加密密钥13,使得该第一加密数据将来只能由其本人的第一私钥14才能解密,即只有其本人才能读取,其他人无法读取、篡改;1.1. Before the user submits the electronic data, the user client 1 randomly generates a first key 11 to perform the first symmetric encryption on the electronic data into the first encrypted data, and simultaneously uses the first public key 12 of the user to the first The key 11 is asymmetrically encrypted into the first encryption key 13, so that the first encrypted data can only be decrypted by its own first private key 14 in the future, that is, only the person can read it, and others cannot read it. tamper;
1.2、用户客户端1上传第一加密数据、第一加密密钥13,同时删除所有相关数据,包括第一加密数据、第一加密密钥13;1.2, the user client 1 uploads the first encrypted data, the first encryption key 13, while deleting all relevant data, including the first encrypted data, the first encryption key 13;
1.3、服务端3负责把用户提交的第一加密数据、第一加密密钥13保存到用户库8中;1.3, the server 3 is responsible for saving the first encrypted data and the first encryption key 13 submitted by the user to the user library 8;
1.4、然后由服务端3再随机生成第二密钥31,对第一加密数据进行第二次对称加密成第二加密数据,使用公证处公钥32对第一加密密钥13进行第二次加密,并保存到公证库9中,使得该电子数据将来只能由公证处和用户提供各自的私钥才能解密,即只有公证处和用户同时授权的情况下才能读取,其他人无法读取、篡改;1.4, then the second key 31 is randomly generated by the server 3, the second encrypted data is symmetrically encrypted into the second encrypted data, and the first encryption key 13 is used for the second time using the notary public key 32. Encrypted and saved to the notary library 9, so that the electronic data can only be decrypted by the notary office and the user in the future, that is, only the notary office and the user can simultaneously read, and others cannot read it. ,tamper;
1.5、最后对用户库8中第一加密数据生成哈希校验码,并用代表校验机构的第三私钥(校验私钥)签名后存储到校验库10,表明该哈希校验码是由该校验机构确保安全的。1.5. Finally, a hash check code is generated for the first encrypted data in the user library 8, and is signed by the third private key (checking private key) representing the verification mechanism, and then stored in the check library 10, indicating the hash check. The code is secured by the verification mechanism.
在整个存证过程中,用户客户端1、公证处客户端2、服务端3的时间自动保持与国家授时中心同步,确保用户是在无法篡改的时间里完成存证动作。During the entire deposit process, the time of the user client 1, the notary office client 2, and the server 3 automatically keeps synchronized with the national time-of-day center, ensuring that the user completes the depositing action in a time that cannot be tampered with.
2、用户申请电子数据的公证流程如下:2. The notarization process for users to apply for electronic data is as follows:
2.1、用户前往指定的公证处,公证处公证员通过公证处客户端2提取公证库9中的第二加密数据、第二加密密钥33,经过公证处第二私钥21对第二加密密钥33进行解密得到第二密钥31,用第二密钥31对第二加密数据进行第一次解密得到第三加密数据(针对第二次加密的解密,解密之后还是密文,还无法查看);2.1, the user goes to the designated notary office, the notary public notary extracts the second encrypted data and the second encryption key 33 in the notary library 9 through the notary office client 2, and passes through the second private key 21 of the notary office to the second encryption key The key 33 is decrypted to obtain the second key 31, and the second encrypted data is decrypted for the first time by the second key 31 to obtain the third encrypted data (decryption for the second encryption, after decryption is still ciphertext, and cannot be viewed yet) );
2.2、对第三加密数据生成第二校验码,与校验库10中经过校验机构签名的第一校验码比对、验签,验签通过则继续下一步,否则终止(这种情况下电子数据可能已被篡改);2.2. Generate a second check code for the third encrypted data, compare and check with the first check code signed by the verification mechanism in the verification library 10, and continue the next step after the verification is passed, otherwise terminate (this kind of Electronic data may have been tampered with)
2.3、使用用户客户端1的第一私钥14对第一加密密钥13进行解密得到第一密钥11,再用第一密钥11对第三加密数据进行第二次解密,得到数据明文。证实该电子数据确实是由该用户提交的,并且由校验机构签名、确保未被篡改的,方能出具公证书;客户端在用户操作结束后立即删除本地所有跟电子数据有关的文件、密钥,包括电子数据明文、第二加密数据、第三加密数据、第一校验码、第二校验码。2.3. Using the first private key 14 of the user client 1 to decrypt the first encryption key 13 to obtain the first key 11, and then decrypting the third encrypted data with the first key 11 for the second time to obtain the data plaintext. . It is confirmed that the electronic data is actually submitted by the user, and is signed by the verification institution to ensure that it has not been tampered with before the public certificate can be issued; the client deletes all the files related to the electronic data and the confidentiality immediately after the user operation ends. The key includes an electronic data plaintext, a second encrypted data, a third encrypted data, a first check code, and a second check code.
通过以上处理步骤,使得用户拥有自己的用户库8,任何人包括公证处都无法查看;公证处也有自己的公证库9。用户无法修改已经存证的电子数据的内容、属性,即使用户恶意篡改了用户库8中的电子数据(比如用户联合用户库8的系统管理员,或者该系统管理员本身就是用户),但他们无法篡改公证库9中的电子数据,以及校验库10中经过校验机构签名的校验码。所以,本方案可以很好的解决电子数据的安全存证、公证问题。Through the above processing steps, the user has his own user library 8, and any person including the notary office can not view; the notary office also has its own notarization library 9. The user cannot modify the content and attributes of the electronic data that has been deposited, even if the user maliciously tampers with the electronic data in the user library 8 (such as the system administrator of the user federated user library 8, or the system administrator itself is the user), but they The electronic data in the notary library 9 cannot be falsified, and the verification code signed by the verification institution in the library 10 cannot be verified. Therefore, this solution can solve the problem of security deposit and notarization of electronic data.
作为存储数字证书的安全介质 UKEY,在本发明中也可以应用,这种具有密码验证功能的小型存储设备也是对本发明在安全方面的有力补充。当然,本发明同样支持存储在本地计算机的数字证书。As a secure medium for storing digital certificates UKEY, which can also be applied in the present invention, is also a powerful supplement to the security aspect of the present invention. Of course, the present invention also supports digital certificates stored on a local computer.
如图3所示的存证公证数据流程示意图,图中涉及的变量定义如表1所示:As shown in Figure 3, the schematic diagram of the process of depositing notarized data shows the variables defined in the figure as shown in Table 1:
表1:变量定义表Table 1: Variable Definition Table
变量名称 Variable name 含义 meaning
file File 电子数据明文 Electronic data plaintext
pass1 Pass1 用于第一次对称加密的随机密码 Random password for the first symmetric encryption
sfile1 Sfile1 第一次对称加密后的电子数据 First symmetrically encrypted electronic data
spass1 Spass1 用户公钥加密后的 pass1 Pass1 after user public key encryption
pass2 Pass2 用于第二次对称加密的随机密码 Random password for the second symmetric encryption
sfile2 Sfile2 第二次对称加密后的电子数据 Second symmetrically encrypted electronic data
spass2 Spass2 公证处公钥加密后的 pass2 Pass2 after public key encryption in the notary office
hsfile1 Hsfile1 sfile1 的哈希摘要校验码 Hash digest checksum for sfile1
shsfile1 Shsfile1 校验库私钥签名过的 hsfile1 Check the library private key signed hsfile1
由图3可知,在客户端与服务端3之间,传输的内容都是加密过的,即使在网络传输中被窃取也不会导致信息泄漏。当然,在实际应用中,数据传输可以走 SSL(Secure Sockets Layer 安全套接层),这样将具备更好的网络传输安全性。As can be seen from FIG. 3, the content transmitted between the client and the server 3 is encrypted, and even if it is stolen in the network transmission, information leakage does not occur. Of course, in practical applications, data transmission can go SSL (Secure Sockets Layer), which will provide better network transmission security.
在本发明中,第一、二次对称加密采用的算法可以是AES(Advanced Encryption Standard,高级加密标准),或者其他对称加密算法皆可,针对不同的电子数据存证需求,可以采用不同强度的加密算法。不对称加密算法可以是 RSA,或其他不对称加密算法皆可。In the present invention, the algorithm used for the first and second symmetric encryption may be AES (Advanced Encryption). Standard, Advanced Encryption Standard, or other symmetric encryption algorithms are available. Different strength encryption algorithms can be used for different electronic data storage requirements. The asymmetric encryption algorithm can be RSA, or other asymmetric encryption algorithms are available.
哈希摘要校验码生成算法可以是 SHAl(Secure Hash Algorithm),或者其他摘要算法皆可,比如 MD5。在传输的过程中,数据很可能会发生变化,那么这时候就会产生不同的消息摘要。 摘要算法有如下特性:不可以从消息摘要中复原信息;两个不同的消息不会产生同样的消息摘要。The hash digest check code generation algorithm can be SHAl (Secure Hash) Algorithm), or other digest algorithms, such as MD5. During the transfer process, the data is likely to change, then a different message digest will be generated at this time. The digest algorithm has the following characteristics: It is not possible to recover information from a message digest; two different messages do not produce the same message digest.
上述实施例仅是用来说明本发明,而并非用作对本发明的限定。只要是依据本发明的技术实质,对上述实施例进行变化、变型等都将落在本发明的权利要求的范围内 。The above-described embodiments are merely illustrative of the invention and are not intended to limit the invention. Variations, modifications, etc. of the above-described embodiments are intended to fall within the scope of the claims of the present invention as long as they are in accordance with the technical spirit of the present invention. .
工业实用性Industrial applicability
本发明一种预防性电子数据保全的方法,以及实现预防性电子数据保全的系统,可防止篡改、存储安全、不易泄露、客户端身份明确,在司法存证公证中可节约时间与成本。 The invention provides a preventive electronic data preservation method and a system for implementing preventive electronic data preservation, which can prevent tampering, storage security, easy disclosure, and clear client identity, and save time and cost in judicial deposit certificate notarization.

Claims (14)

  1. 一种预防性电子数据保全的方法,其特征在于,步骤如下:  A method of preventive electronic data preservation, characterized in that the steps are as follows:
    1)加密上传步骤:客户端数据加密为第一密文后上传到服务端,服务端将第一密文保存至用户库;服务端对用户库里的第一密文进行加密为第二密文后,保存至服务端的公证库;服务端对用户库里的第一密文生成第一校验码,保存至服务端的校验库;1) Encryption uploading step: the client data is encrypted into the first ciphertext and then uploaded to the server, and the server saves the first ciphertext to the user library; the server encrypts the first ciphertext in the user library into the second secret. After the text, save to the notarization library of the server; the server generates a first verification code for the first ciphertext in the user library, and saves it to the verification library of the server;
    2)下载解密步骤:客户端下载公证库里的第二密文,解密后得到第三密文,并对第三密文生成第二校验码,如果第二校验码与校验库中的第一校验码匹配成功,表示第三密文与第一密文相同,则对第三密文进行解密,获得数据明文。2) Download and decrypt step: the client downloads the second ciphertext in the notary library, decrypts to obtain the third ciphertext, and generates a second check code for the third ciphertext, if the second check code and the checksum are in the library The first check code is successfully matched, indicating that the third ciphertext is the same as the first ciphertext, and the third ciphertext is decrypted to obtain the data plaintext.
  2. 根据权利要求1所述的预防性电子数据保全的方法,其特征在于,所述的客户端包括:用户客户端和公证处客户端;加密上传步骤由用户客户端操作,下载解密步骤由公证处客户端操作。The method for preventing electronic data security according to claim 1, wherein the client comprises: a user client and a notary client; the encrypted uploading step is operated by the user client, and the downloading and decrypting steps are performed by a notary office. Client operation.
  3. 根据权利要求1或2所述的预防性电子数据保全的方法,其特征在于,客户端数据加密步骤具体为:先用第一密钥对数据进行对称加密得到第一加密数据,然后用第一公钥对第一密钥进行不对称加密第一加密密钥。The method for preventing electronic data preservation according to claim 1 or 2, wherein the step of encrypting the client data is specifically: first symmetrically encrypting the data with the first key to obtain the first encrypted data, and then using the first The public key asymmetrically encrypts the first key with the first encryption key.
  4. 根据权利要求3所述的预防性电子数据保全的方法,其特征在于,服务端对用户库里的第一加密数据再加密的步骤为:先用第二密钥对第一加密数据进行对称加密得到第二加密数据,然后用第二公钥对第二密钥进行不对称加密得到第二加密密钥。The method for preventing electronic data preservation according to claim 3, wherein the step of the server re-encrypting the first encrypted data in the user library is: first symmetrically encrypting the first encrypted data with the second key Obtaining the second encrypted data, and then asymmetrically encrypting the second key with the second public key to obtain a second encryption key.
  5. 根据权利要求4所述的预防性电子数据保全的方法,其特征在于,解密时,先用第二私钥对第二加密密钥进行解密得到第二密钥,再用第二密钥对加第二密数据进行解密得到第三加密数据;然后用第一私钥对第一加密密钥进行解密得到第一密钥,再用第一密钥对第三加密数据进行解密,得到数据明文。The method for preventing electronic data preservation according to claim 4, characterized in that, in decryption, the second encryption key is first decrypted by the second private key to obtain the second key, and then the second key pair is added. The second secret data is decrypted to obtain the third encrypted data; then the first encryption key is decrypted by the first private key to obtain the first key, and the third encrypted data is decrypted by the first key to obtain the data plaintext.
  6. 根据权利要求4所述的预防性电子数据保全的方法,其特征在于,所述的第一密钥为客户端随机生成的;所述的第二密钥为服务端随机生成的。The method for preventing electronic data preservation according to claim 4, wherein the first key is randomly generated by a client; and the second key is randomly generated by a server.
  7. 根据权利要求1或2所述的预防性电子数据保全的方法,其特征在于,步骤1)进一步还包括:用第三私钥对校验码进行加密为加密校验码;步骤2)进一步还包括用第三公钥对加密校验码进行解密。The method of preventive electronic data preservation according to claim 1 or 2, wherein the step 1) further comprises: encrypting the check code into a cryptographic check code with the third private key; and step 2) further This includes decrypting the encrypted check code with the third public key.
  8. 根据权利要求1或2所述的预防性电子数据保全的方法,其特征在于,步骤1)、步骤2)进行的过程中,客户端、服务端的时间通过网络时间协议保持实时同步。The method for preventing electronic data preservation according to claim 1 or 2, wherein in the process of step 1) and step 2), the time of the client and the server is maintained in real time by the network time protocol.
  9. 根据权利要求3所述的预防性电子数据保全的方法,其特征在于,进一步包括:上传第一加密数据、第一加密密钥后,删除客户端上的第一加密数据、第一加密密钥。The method for preventing electronic data security according to claim 3, further comprising: after uploading the first encrypted data and the first encryption key, deleting the first encrypted data and the first encryption key on the client. .
  10. 根据权利要求5所述的预防性电子数据保全的方法,其特征在于,进一步包括:解密完成得到数据明文后,删除数据明文、第二加密数据、第三加密数据、第一校验码、第二校验码。The method for preventing electronic data preservation according to claim 5, further comprising: deleting the data plaintext, the second encrypted data, the third encrypted data, the first check code, and the first Second check code.
  11. 一种预防性电子数据保全的系统,其特征在于,包括用户客户端、公证处客户端、服务端,所述的服务端包括应用服务器、数据服务器;所述的数据服务器包括用户库、公证库、校验库; A system for preventive electronic data security, comprising: a user client, a notary office client, and a server, wherein the server includes an application server and a data server; and the data server includes a user library and a notarization library. , check library;
    加密上传时,用户客户端把数据加密为第一密文后上传到至用户库;应用服务器对用户库里的第一密文进行加密为第二密文后,保存至公证库;应用服务器对用户库里的第一密文生成第一校验码,保存至校验库;When the encryption is uploaded, the user client encrypts the data into the first ciphertext and uploads it to the user library; the application server encrypts the first ciphertext in the user library into the second ciphertext, and saves it to the notary library; the application server pairs The first ciphertext in the user library generates a first check code and saves it to the check library;
    下载解密时,公证处客户端下载公证库里的第二密文,解密后得到第三密文,并对第三密文生成第二校验码,如果第二校验码与校验库中的第一校验码匹配成功,表示第三密文与第一密文相同,则对第三密文进行解密,获得数据明文。When downloading and decrypting, the notary office downloads the second ciphertext in the notary library, decrypts to obtain the third ciphertext, and generates a second check code for the third ciphertext, if the second check code and the checksum are in the library The first check code is successfully matched, indicating that the third ciphertext is the same as the first ciphertext, and the third ciphertext is decrypted to obtain the data plaintext.
  12. 根据权利要求11所述的预防性电子数据保全的系统,其特征在于,服务端还包括CA/RA服务器,用于对用户客户端、公证处客户端的数字证书进行管理。The system for preventing electronic data security according to claim 11, wherein the server further comprises a CA/RA server for managing the digital certificate of the user client and the notary client.
  13. 根据权利要求11所述的预防性电子数据保全的系统,其特征在于,服务端还包括NTP服务器,用于数据加密上传过程中,用户客户端、公证处客户端、服务端的时间保持实时同步。The system for preventing electronic data security according to claim 11, wherein the server further includes an NTP server, and the time of the user client, the notary office client, and the server is synchronized in real time during the data encryption uploading process.
  14. 根据权利要求11所述的预防性电子数据保全的系统,其特征在于,所述数据服务器的用户库、公证库、校验库为三个独立的储存空间。The system for preventing electronic data security according to claim 11, wherein the user database, the notarization library, and the verification library of the data server are three independent storage spaces.
PCT/CN2013/081096 2012-12-03 2013-08-08 Method and system for preventively preserving electronic data WO2014086166A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210516819.4 2012-12-03
CN201210516819.4A CN103078841B (en) 2012-12-03 2012-12-03 The method and system that a kind of preventative electronic data is saved from damage

Publications (1)

Publication Number Publication Date
WO2014086166A1 true WO2014086166A1 (en) 2014-06-12

Family

ID=48155245

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/081096 WO2014086166A1 (en) 2012-12-03 2013-08-08 Method and system for preventively preserving electronic data

Country Status (2)

Country Link
CN (1) CN103078841B (en)
WO (1) WO2014086166A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659579A (en) * 2017-10-20 2018-02-02 国信嘉宁数据技术有限公司 Deposit card method, equipment and related deposit system in a kind of scene
CN111177772A (en) * 2019-12-04 2020-05-19 国网浙江省电力有限公司 Data security method for palm power business of power system
CN113438210A (en) * 2021-06-04 2021-09-24 上海焜耀网络科技有限公司 Data transmission processing method and device and electronic equipment
CN113886860A (en) * 2021-12-06 2022-01-04 山东确信信息产业股份有限公司 Electronic data security system and method based on mobile terminal

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078841B (en) * 2012-12-03 2016-01-13 厦门市美亚柏科信息股份有限公司 The method and system that a kind of preventative electronic data is saved from damage
CN103475664B (en) * 2013-09-18 2017-02-15 北京工业大学 Credible extraction method for digital evidence of Android
CN103530555B (en) * 2013-10-31 2016-09-07 浙江云巢科技有限公司 Prevent the method and apparatus that program performs malicious operation
CN104009841B (en) * 2014-06-20 2018-01-19 天津理工大学 A kind of message encryption method under instant messaging situation
CN104063323B (en) * 2014-07-03 2017-09-15 南昌欧菲生物识别技术有限公司 The method and system of mobile terminal and its control device
CN106301783A (en) * 2016-07-29 2017-01-04 李曙胜 Control method, device and the wireless key component of authentication are provided with wireless key
CN107196919B (en) * 2017-04-27 2021-01-01 北京小米移动软件有限公司 Data matching method and device
CN107273514A (en) * 2017-06-21 2017-10-20 杭州云证网络科技有限公司 A kind of inspection method and application its inspect subsystem and data deposit signed certificate administration chain-circuit system
CN111416788B (en) * 2019-01-04 2023-08-08 北京京东尚科信息技术有限公司 Method and device for preventing transmission data from being tampered
CN110138749B (en) * 2019-04-23 2021-12-21 华为技术有限公司 Data security protection method and related equipment
CN110311773B (en) * 2019-06-28 2022-05-17 兆讯恒达科技股份有限公司 Method for preventing injection type attack of advanced encryption standard coprocessor
CN111081338A (en) * 2019-12-25 2020-04-28 安徽师范大学 Safe human health parameter acquisition method
CN112948851A (en) * 2021-02-25 2021-06-11 深圳壹账通智能科技有限公司 User authentication method, device, server and storage medium
CN113553607A (en) * 2021-07-28 2021-10-26 国网江苏省电力有限公司物资分公司 Bidding file secrecy method based on multiple asymmetric encryption algorithm
CN113569120A (en) * 2021-08-04 2021-10-29 成都安恒信息技术有限公司 System and method for realizing webpage non-repudiation through original data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223374A (en) * 2011-06-22 2011-10-19 熊志海 Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
US20120054491A1 (en) * 2010-08-31 2012-03-01 Peter John Tippett Re-authentication in client-server communications
CN102684879A (en) * 2012-05-02 2012-09-19 四川建设网有限责任公司 Method and system for remote bid opening and bid evaluation
CN103078841A (en) * 2012-12-03 2013-05-01 厦门市美亚柏科信息股份有限公司 Method and system for preventive electronic data security

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120054491A1 (en) * 2010-08-31 2012-03-01 Peter John Tippett Re-authentication in client-server communications
CN102223374A (en) * 2011-06-22 2011-10-19 熊志海 Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
CN102684879A (en) * 2012-05-02 2012-09-19 四川建设网有限责任公司 Method and system for remote bid opening and bid evaluation
CN103078841A (en) * 2012-12-03 2013-05-01 厦门市美亚柏科信息股份有限公司 Method and system for preventive electronic data security

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659579A (en) * 2017-10-20 2018-02-02 国信嘉宁数据技术有限公司 Deposit card method, equipment and related deposit system in a kind of scene
CN107659579B (en) * 2017-10-20 2020-10-09 国信嘉宁数据技术有限公司 On-site certificate storing method and device and related certificate storing system
CN111177772A (en) * 2019-12-04 2020-05-19 国网浙江省电力有限公司 Data security method for palm power business of power system
CN111177772B (en) * 2019-12-04 2023-10-20 国网浙江省电力有限公司 Data security method for palm power business of power system
CN113438210A (en) * 2021-06-04 2021-09-24 上海焜耀网络科技有限公司 Data transmission processing method and device and electronic equipment
CN113438210B (en) * 2021-06-04 2023-04-07 上海焜耀网络科技有限公司 Data transmission processing method and device and electronic equipment
CN113886860A (en) * 2021-12-06 2022-01-04 山东确信信息产业股份有限公司 Electronic data security system and method based on mobile terminal
CN113886860B (en) * 2021-12-06 2022-03-29 确信信息股份有限公司 Electronic data security system and method based on mobile terminal

Also Published As

Publication number Publication date
CN103078841A (en) 2013-05-01
CN103078841B (en) 2016-01-13

Similar Documents

Publication Publication Date Title
WO2014086166A1 (en) Method and system for preventively preserving electronic data
Liang et al. PDPChain: A consortium blockchain-based privacy protection scheme for personal data
WO2022042301A1 (en) Data processing method and apparatus, smart device and storage medium
CN112989415B (en) Private data storage and access control method and system based on block chain
CN108092982B (en) Data storage method and system based on alliance chain
Fabian et al. Collaborative and secure sharing of healthcare data in multi-clouds
Hu et al. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
US7702107B1 (en) Server-based encrypted messaging method and apparatus
Chen et al. A secure electronic medical record authorization system for smart device application in cloud computing environments
US20130061035A1 (en) Method and system for sharing encrypted content
US9300639B1 (en) Device coordination
Mashima et al. Enhancing accountability of electronic health record usage via patient-centric monitoring
US20140129836A1 (en) Information distribution system and program for the same
CN114513533A (en) Classified and graded fitness and health big data sharing system and method
CN111698093B (en) Digital timestamp issuing and verifying method based on PKI system
CN102073819A (en) Digital rights management methods
CN106254342A (en) The secure cloud storage method of file encryption is supported under Android platform
CN108022194A (en) Law-enforcing recorder and its data safety processing method, server and system
TW201041352A (en) Methods for producing products with certificates and keys
CN113326541B (en) Cloud edge collaborative multi-mode private data transfer method based on intelligent contract
Win et al. Privacy enabled digital rights management without trusted third party assumption
CN114357492A (en) Medical data privacy fusion method and device based on block chain
CN107689957A (en) A kind of digital certificate management method, electronic equipment, storage medium
CN113938281B (en) Quantum security identity issuing system, issuing method and using method
CN114065261A (en) Block chain-based distributed trusted data sharing platform, method and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13861058

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13861058

Country of ref document: EP

Kind code of ref document: A1