CN106713297B - Electronic data fixed platform based on cloud service - Google Patents
Electronic data fixed platform based on cloud service Download PDFInfo
- Publication number
- CN106713297B CN106713297B CN201611163129.XA CN201611163129A CN106713297B CN 106713297 B CN106713297 B CN 106713297B CN 201611163129 A CN201611163129 A CN 201611163129A CN 106713297 B CN106713297 B CN 106713297B
- Authority
- CN
- China
- Prior art keywords
- evidence
- electronic stamp
- module
- electronic
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000012795 verification Methods 0.000 claims abstract description 40
- 238000000034 method Methods 0.000 abstract description 5
- 230000000694 effects Effects 0.000 abstract description 2
- 238000004321 preservation Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 238000005336 cracking Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application discloses electronic data security fixed platform based on cloud includes: the evidence fixing server generates an evidence electronic stamp and evidence fixing information according to the original evidence received by the input module and sends the evidence electronic stamp and the evidence fixing information to the storage for storage; the output module sends the evidence electronic stamp and the evidence fixed information back to the client; the input module also receives an evidence verification request and a comparison evidence; the evidence fixing server also generates a verification evidence electronic stamp according to the comparison evidence received from the input module when receiving an evidence verification request; the output module also searches out a corresponding evidence electronic stamp from the memory according to the evidence verification request, compares the evidence electronic stamp with the received verification evidence electronic stamp, verifies the evidence electronic stamp and transmits the verification evidence electronic stamp to the client. The method has the effect of ensuring that the electronic evidence cannot pass verification if being tampered, thereby effectively guaranteeing the legal effectiveness of the electronic evidence.
Description
Technical Field
The invention relates to the technical field of computer information processing, in particular to an electronic data fixed platform based on cloud service.
Background
In legal life, electronic data such as photos, audio and video files and the like acquired by adopting a digital technology can be used as electronic evidence.
The electronic data is taken as evidence for preservation, in order to prevent the evidence (hereinafter referred to as electronic evidence) existing in the form of electronic data from being lost or tampered and from being difficult to obtain later, the electronic data is applied for examination by a preservation institution to confirm the objectivity and trueness and is fixed and preserved. The third-party certification preservation is electronic evidence preservation conducted by an electronic evidence preservation mechanism which is set up by law and has special technical conditions.
At present, electronic data fixed platforms based on cloud services have appeared, however, the platforms adopt the traditional photographing uploading storage technology and the real-time audio and video recording uploading storage technology, only the collected evidence is uploaded to a server of a third party for storage, but the electronic evidence uploaded to the server end cannot be guaranteed not to be tampered, especially tampered by the owner of the server end; thus, the legal effectiveness of electronic evidence stored and submitted using only these two techniques cannot be guaranteed without proving that it has not been tampered with.
Disclosure of Invention
The invention aims to solve the technical problem of providing a cloud platform which adopts a real-time acquisition and real-time fixation idea to carry out electronic data security fixation, so that the electronic data serving as evidence can not pass verification if being tampered after being acquired, and the legal effectiveness of the electronic data serving as evidence can be effectively guaranteed.
The invention aims to provide an electronic data fixed platform based on cloud service, which is realized by the following technical scheme:
the electronic data fixed platform based on the cloud service comprises:
the input module is used for receiving the original evidence collected by the client in real time;
the evidence fixing server is used for generating an evidence electronic stamp and evidence fixing information according to the original evidence received by the input module and sending the evidence electronic stamp and the evidence fixing information to the output module and the memory module;
the memory is used for storing the evidence electronic stamp, the evidence fixed information and the original evidence information from the evidence fixed server;
the output module is used for sending the evidence electronic stamp and the evidence fixed information back to the client;
the input module is also used for receiving an evidence verification request from the client and comparing the evidence;
the evidence fixing server is also used for generating a verification evidence electronic stamp according to the comparison evidence received from the input module when an evidence verification request is received, and sending the verification evidence electronic stamp to the output module;
the output module is further used for searching out the corresponding evidence electronic stamp from the storage according to the evidence verification request, comparing and verifying the evidence electronic stamp with the received verification evidence electronic stamp, and outputting a comparison and verification result to the client.
The evidence described herein refers to the form of the evidence after it is converted into electronic data or the evidence itself is in electronic data form.
The technical scheme is characterized in that: the original evidence is received by the client in real time, so that the original evidence is prevented from being falsified when being stored in a local memory of the acquisition equipment; the electronic data fixed platform based on the cloud service firstly submits an evidence electronic stamp in real time according to a received original evidence and then submits the evidence electronic stamp to a memory for storage; when the evidence is shown in the form of the electronic evidence, the electronic evidence to be used is only required to be sent to the cloud service-based electronic data fixed platform as the comparison evidence, and meanwhile, an evidence verification request is sent, so that the verification evidence electronic stamp can be generated again through the same curing processing program, and whether the electronic evidence is tampered or not can be verified by comparing whether the two evidence electronic stamps are the same or not, so that the legal effectiveness of the electronic evidence is effectively guaranteed.
Further, the evidence fixing server comprises an evidence electronic stamp generation service module, a confusion key pool module and a database module;
the evidence electronic stamp generating service module is used for generating an evidence electronic stamp according to the combination of the received confusion key and the original evidence and sending the evidence electronic stamp to the memory;
the obfuscated key pool module is used for taking out an obfuscated key and sending the obfuscated key to the electronic stamp generation service module when the electronic stamp generation service module receives the original evidence each time;
the database module is used for storing the used obfuscated key and sending the corresponding obfuscated key to the electronic stamp generation service module according to the evidence verification request;
the evidence electronic stamp generating service module is also used for generating a verification evidence electronic stamp according to the combination of the received confusion key and the comparison evidence and sending the verification evidence electronic stamp to the output module.
Therefore, the evidence electronic stamp is not only related to the original evidence, but also contains information of the obfuscated key, so that a party who wants to tamper the evidence cannot crack the evidence only by the original evidence, the party who wants to tamper the evidence can obtain the related obfuscated key and a combination mode of the obfuscated key and the original evidence, the tampered evidence can obtain the same evidence electronic stamp during verification, and the difficulty of algorithm cracking is increased.
In addition, the obfuscated key pool module with the obfuscated key pool deployed can effectively enable multiple pieces of evidence (which may be evidences from different users) which are solidified at the same time to obtain the obfuscated keys in time.
The system further comprises an obfuscated key generation service module which is used for receiving the newly generated evidence electronic stamp, generating a new obfuscated key based on the electronic stamp and storing the new obfuscated key to the obfuscated key pool module.
With the adoption of the design, in addition to timely supplement of the obfuscated key pool, the obfuscated key used each time is an evidence electronic stamp generated based on other previous evidence; the loop is nested in such a way that the current solidified evidence is associated with a plurality of evidences which are solidified before, and the association between the evidences is generated by the distribution of the confusion key pool and is random; moreover, the obfuscated key itself becomes traceable, thus forming a chain of verifications between the evidences submitted by different users; when the evidence is verified, not only can whether the shown evidence is tampered or not be verified, but also whether the obfuscated key is modified or not can be traced; random verification chains are formed among evidences submitted by different users, so that a cracker can only trace back the confusion key used each time step by step along the verification chains, and the cracking difficulty of the system is greatly increased.
Further, the evidence e-stamp is a HASH value derived based on the original evidence.
The HASH algorithm, also known as a HASH algorithm, maps a binary value of any length to a shorter binary value of fixed length, this small binary value is called a HASH value, which is a unique and extremely compact representation of a piece of data as a numeric value. If a piece of plaintext is hashed and even if only one letter of the piece is altered, the subsequent hash will produce a different value. It is computationally infeasible to find two different inputs for which the HASH is the same value, so the HASH value of the data can verify the integrity of the data.
The electronic evidence and other files generated based on the electronic evidence are essentially a binary value, so that the method is also suitable for the HASH algorithm, and whether the difference exists between the two files before and after the HASH algorithm can be known by contrasting the HASH values, so that whether the electronic evidence is tampered; the HASH value is not only in a unique numerical representation form of a section of data, but also in an extremely compact numerical representation form, so that the electronic stamp using the HASH value as evidence is unique and convenient to transmit and store.
Further, the device also comprises a reproduction module which is used for sending the original evidence information in the storage module to a display device for reproduction.
So that the electronic evidence stored on the platform can be conveniently shown through the display device.
Further, the system also comprises an identity authentication server which is used for sending the information of the evidence owner to the evidence fixed server according to the request of the request client; the evidence fixing server is also used for generating evidence fixing information according to the information of the evidence owner.
The information quantity of the evidence fixed information is larger, the evidence owner is pointed more accurately, the electronic evidence owner can trace the evidence, and the electronic evidence can be used and searched conveniently.
Further, the input module is also used for receiving the self equipment information of the equipment of the client; the evidence fixing server is further used for generating evidence fixing information according to the equipment information of the client.
The information quantity of the evidence fixed information is larger, the client side is more accurately pointed to the equipment for collecting the evidence, the equipment for collecting the electronic evidence can be traced, and the electronic evidence can be conveniently used and searched.
Further, the input module is also used for receiving the geographic position information of the client; the evidence fixed server is also used for forming evidence fixed information according to the geographical position information of the client.
The information quantity of the evidence fixed information is larger, the information quantity points to the geographic position of the client side when the evidence is collected more accurately, the place where the electronic evidence is collected can be traced, and the electronic evidence can be used and found conveniently.
Further, the input module is also used for receiving evidence collection time information from a standard time server; the evidence fixing server is further used for generating evidence fixing information according to the evidence collection time information.
The information quantity of the evidence fixed information is larger, and the acquisition time information comes from the standard time server, so that the acquisition time of the evidence is pointed out more accurately and objectively, the real-time property of evidence acquisition is proved, the acquisition time of the electronic evidence can be traced, and the electronic evidence can be conveniently used and searched.
Drawings
Fig. 1 is a schematic connection diagram of an electronic data fixed platform evidence collection client and a national time center based on cloud services according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of the evidence fixing server in FIG. 1 generating evidence fixing information and an evidence electronic stamp;
fig. 3 is a schematic flow chart of an evidence electronic stamp generating service and a secret key confusion generating service in this embodiment;
fig. 4 is a schematic flow chart of the evidence collection client in fig. 1 when collecting the evidence in real time.
Detailed Description
A schematic diagram of the connection between the embodiment of the present invention and the evidence collection client and the national time center is substantially as shown in fig. 1.
The electronic data fixed platform based on the cloud service in the embodiment comprises: the system comprises an input module, an evidence fixing server, an identity authentication server, an evidence storage server, a memory and an output module.
The evidence collection client is connected with the evidence fixed server through the Internet; when the evidence collection client collects original evidences such as pictures, videos and audios through collection equipment (a camera, a microphone and the like), on one hand, the information is stored in a local memory; and on the other hand, the information, the equipment information of the current acquisition equipment and the geographical position information of the current acquisition equipment are uploaded to an evidence fixed server deployed at the cloud end in real time.
In order to ensure the real-time performance of the video/audio evidence, in this embodiment, the evidence is transmitted in the form of a video stream and/or a video stream; the transmission is carried out while the acquisition is carried out, and the transmission is not carried out once again after the acquisition of the video and audio evidences is finished.
Specifically, as shown in fig. 4, each time a video/audio-type evidence of a certain duration is collected, the evidence collection client starts an evidence preservation thread and a segment storage thread in pair synchronously through the evidence collection thread module, where the evidence preservation thread is used to transmit the video/audio segment as an evidence segment to the evidence fixed server, and the segment storage thread is used to store the video/audio segment as an evidence segment in the local storage.
As shown in fig. 1, the evidence collection client is further connected with an identity authentication server and a national time service center clock server through the internet; the method comprises the following steps that while evidence is collected and sent in real time, an evidence collection client side sends requests to a national time service center clock server and an identity authentication server on a cloud platform; the identity authentication server and the national time service center clock server synchronously submit the information of the evidence owner and the acquisition time (millisecond level) to the evidence fixing server on the cloud platform respectively according to the corresponding requests.
The evidence fixing server can generate evidence fixing information and an evidence electronic stamp according to the information, and submits the original evidence, the evidence fixing information and the evidence electronic stamp to the evidence storage server together, and then the original evidence, the evidence fixing information and the evidence electronic stamp are stored in an evidence storage, so that the electronic evidence can be fixed and preserved. The embodiment further comprises a reproduction module (not shown in the figure) for sending the original evidence information in the memory module to the display device for reproduction according to a reproduction request sent by the client.
The process of generating evidence fixed information and evidence electronic stamps by an evidence fixed server on an electronic data fixed platform based on cloud services is shown in fig. 2.
The evidence electronic stamp generation service module takes out an obfuscated key from the obfuscated key pool after receiving the original evidence from the previous link, obfuscates the obfuscated key with the original evidence to generate an evidence electronic stamp, and submits the evidence electronic stamp to the obfuscated key generation service module and the evidence fixed information generation service module. The former generates a new obfuscated key based on the evidence electronic stamp and stores the new obfuscated key in an obfuscated key pool; the latter combines the electronic stamp with the geographical location information, the acquisition equipment information, the evidence owner information and the acquisition time (millisecond level) received from the previous link to generate evidence fixed information, and outputs the original evidence, the evidence fixed information and the evidence electronic stamp to an evidence storage server.
More specifically, the flow of the evidence electronic stamp generating service and the obfuscating key generating service in this embodiment is basically as shown in fig. 3, and includes the following steps;
① hashing the original evidence to obtain a corresponding HASH value A, and generating a random scrambling code for the HASH value A;
②, taking a HASH value B from the pool as the obfuscated key;
③, generating a HASH value A, HASH value B and a random scrambling code mixed value through a mixing algorithm, and simultaneously associating the HASH value A, HASH value B and the random scrambling code and storing the association in a database;
④ hashing the mixed value generated in the previous step to obtain HASH value C as evidence electronic stamp output of the evidence;
⑤ storing the HASH value C (electronic stamp) as a new obfuscating key in the obfuscating key pool;
the HASH processing of the original evidence and the mixed value is completed through a standard HASH algorithm module, if HASH algorithms adopted in the HASH processing are different, one or more HASH algorithms adopted by the electronic stamp at this time need to be recorded in the database through a mark and are associated with the HASH value A, HASH value B and the random scrambling code obtained at this time.
The hybrid algorithm is specifically that the HASH value A, HASH value B and the random scrambling code are spliced into a hybrid value and completed through a hybrid algorithm module; the arrangement sequence of the three does not affect the generation of the electronic stamp, so that the arrangement sequence can be arbitrarily selected, if the arrangement sequence adopted in each mixing is different, the arrangement sequence adopted at this time needs to be recorded in the database through a mark and is associated with the HASH value A, HASH value B and the random scrambling code obtained at this time;
it should be noted that the operation of hashing the original evidence to obtain the HASH value a in step ① may be performed by a standard HASH algorithm module deployed on the client, or by a standard HASH algorithm module deployed in the evidence fixing server, where the difference between the two cases is that in the first case, the evidence collecting client transmits the hashed original evidence (HASH value a) to the evidence fixing server, and the operation is omitted on the evidence fixing server, so as to reduce the workload of the evidence fixing server, and meanwhile, compared with the transmission of the original evidence, the transmission of HASH value a may save a large amount of transmission data, and may not affect the electronic stamp generated finally, and therefore, both cases should be regarded as transmission of the original evidence to the evidence fixing server.
In this embodiment, a Universally Unique Identifier (UUID) is used as a random scrambling code, each HASH value a is assigned to a mutually unrepeated UUID, and the UUID can also be used as a Unique Identifier of the HASH value a.
The obfuscated key pool is deployed in an obfuscated key pool module on the evidence fixed server.
In the embodiment, the original evidence is uploaded in real time during acquisition, so that the original evidence is prevented from being falsified when being stored in a local memory of acquisition equipment; on an electronic data fixed platform based on cloud service, an evidence fixed server generates an evidence electronic stamp (HASH value C) in real time according to received original evidence, and the evidence electronic stamp is submitted to an evidence storage server for storage; when the evidence is shown, the electronic evidence to be used is only required to be sent to an evidence fixed server on an electronic data fixed platform based on cloud service as comparison evidence, an evidence verification request is sent at the same time, the database module sends a corresponding obfuscation key (HASH value B) and a corresponding random scrambling code to the electronic stamp generation service module according to the evidence verification request, the electronic stamp generation service module generates a verification evidence electronic stamp according to a mixed value of the obfuscation key, the comparison evidence and the random scrambling code, the verification evidence electronic stamp is sent to the output module to be compared, and a comparison result is sent to the client side, so that whether the electronic evidence is tampered or not can be proved, and the legal effectiveness of the electronic evidence is effectively guaranteed.
The obfuscated key (HASH value B) used each time in this embodiment is an electronic stamp generated by another previous proof; the loop is nested in such a way that the currently solidified evidence is associated with a plurality of previously solidified evidences, and the obfuscated key itself becomes traceable to form a verification chain; when the evidence is verified, whether the shown evidence is tampered or not can be verified, whether the obfuscated key is modified or not can be traced, the obfuscated key used each time is traced back step by step along the verification chain, and the cracking difficulty of the system is greatly increased.
The foregoing is merely an example of the present invention and common general knowledge in the art of specific structures and/or features of the invention has not been set forth herein in any way. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.
Claims (6)
1. Electronic data security fixed platform based on cloud service, its characterized in that includes:
the input module is used for receiving the original evidence collected by the client in real time;
the evidence fixing server comprises an evidence electronic stamp generating service module, an obfuscated key pool module and a database module;
the evidence electronic stamp generating service module is used for generating an evidence electronic stamp and evidence fixed information according to the combination of the received confusion key and the original evidence and sending the evidence electronic stamp and the evidence fixed information to the storage and output module;
the memory is used for storing the evidence electronic stamp, the evidence fixed information and the original evidence information from the evidence fixed server;
the output module is used for sending the evidence electronic stamp and the evidence fixed information back to the client;
the input module is also used for receiving an evidence verification request from the client and comparing the evidence;
the evidence fixing server is also used for generating a verification evidence electronic stamp according to the comparison evidence received from the input module when an evidence verification request is received, and sending the verification evidence electronic stamp to the output module;
the output module is also used for searching out a corresponding evidence electronic stamp from the memory according to the evidence verification request, comparing and verifying the evidence electronic stamp with the received verification evidence electronic stamp and outputting a comparison and verification result to the client;
the obfuscated key pool module is used for taking out an obfuscated key and sending the obfuscated key to the electronic stamp generation service module when the electronic stamp generation service module receives the original evidence each time;
the database module is used for storing the used obfuscated key and sending the corresponding obfuscated key to the electronic stamp generation service module according to the evidence verification request;
the evidence electronic stamp generating service module is also used for generating a verification evidence electronic stamp according to the combination of the received confusion key and the comparison evidence and sending the verification evidence electronic stamp to the output module;
the obfuscation key generation service module is used for receiving the newly generated evidence electronic stamp and generating a new obfuscation key based on the evidence electronic stamp to be stored in the obfuscation key pool module;
the evidence e-stamp is a HASH value derived based on the original evidence.
2. The cloud service-based electronic data security fixed platform of claim 1, wherein: the device also comprises a reproduction module used for sending the original evidence information in the memory module to the display device for reproduction.
3. The cloud service-based electronic data security fixed platform of claim 2, wherein: the identity authentication server is used for sending the information of the evidence owner to the evidence fixed server according to the request of the request client;
the evidence fixing server is also used for generating evidence fixing information according to the information of the evidence owner.
4. The cloud service-based electronic data security fixed platform of claim 3, wherein: the input module is also used for receiving the equipment information of the client;
the evidence fixing server is further used for generating evidence fixing information according to the equipment information of the client.
5. The cloud service-based electronic data security fixed platform of claim 4, wherein: the input module is also used for receiving the geographic position information of the client;
the evidence fixed server is also used for generating evidence fixed information according to the geographical position information of the client.
6. The cloud service-based electronic data security fixed platform of claim 5, wherein: the input module is also used for receiving evidence collection time information from a standard time server;
the evidence fixing server is further used for generating evidence fixing information according to the evidence collection time information.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201611163129.XA CN106713297B (en) | 2016-12-15 | 2016-12-15 | Electronic data fixed platform based on cloud service |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201611163129.XA CN106713297B (en) | 2016-12-15 | 2016-12-15 | Electronic data fixed platform based on cloud service |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106713297A CN106713297A (en) | 2017-05-24 |
| CN106713297B true CN106713297B (en) | 2020-03-31 |
Family
ID=58937901
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201611163129.XA Expired - Fee Related CN106713297B (en) | 2016-12-15 | 2016-12-15 | Electronic data fixed platform based on cloud service |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106713297B (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107566410B (en) * | 2017-10-20 | 2020-01-03 | 国信嘉宁数据技术有限公司 | Data security message request processing method and device |
| CN107919953A (en) * | 2017-11-24 | 2018-04-17 | 上海百事通信息技术股份有限公司 | Data notarization method, apparatus, equipment, medium and server |
| CN108923912B (en) * | 2018-07-26 | 2022-03-04 | 中体彩科技发展有限公司 | Distributed electronic data information security method, device and system |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1845116A (en) * | 2006-04-30 | 2006-10-11 | 天津大学 | Integrity Preservation Method of Digital Evidence Based on Computer Forensics |
| EP1821450A1 (en) * | 2006-02-17 | 2007-08-22 | Samsung Electronics Co., Ltd. | Apparatus and method of measuring integrity |
| CN102222202A (en) * | 2011-06-09 | 2011-10-19 | 重庆邮电大学 | Method for detecting integration of high-efficiency finegrained data |
| CN102609658A (en) * | 2012-02-15 | 2012-07-25 | 何晓行 | Electronic evidence consolidating device, electronic evidence consolidating method and electronic evidence consolidating system |
| CN102916971A (en) * | 2012-10-31 | 2013-02-06 | 重庆君盾科技有限公司 | Electronic data curing system and method |
| CN103514410A (en) * | 2013-09-30 | 2014-01-15 | 上海市数字证书认证中心有限公司 | Dependable preservation and evidence collection system and method for electronic contract |
| CN105260677A (en) * | 2015-10-28 | 2016-01-20 | 南京邮电大学 | Multiple-attribute-based electronic data fixing system and method |
| CN105338119A (en) * | 2015-12-03 | 2016-02-17 | 厦门法信公证云科技有限公司 | Electronic evidence fixing security system based on cloud storage |
| CN106033519A (en) * | 2016-05-14 | 2016-10-19 | 北京中凌科技有限公司 | Data security method for electronic file |
-
2016
- 2016-12-15 CN CN201611163129.XA patent/CN106713297B/en not_active Expired - Fee Related
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1821450A1 (en) * | 2006-02-17 | 2007-08-22 | Samsung Electronics Co., Ltd. | Apparatus and method of measuring integrity |
| CN1845116A (en) * | 2006-04-30 | 2006-10-11 | 天津大学 | Integrity Preservation Method of Digital Evidence Based on Computer Forensics |
| CN102222202A (en) * | 2011-06-09 | 2011-10-19 | 重庆邮电大学 | Method for detecting integration of high-efficiency finegrained data |
| CN102609658A (en) * | 2012-02-15 | 2012-07-25 | 何晓行 | Electronic evidence consolidating device, electronic evidence consolidating method and electronic evidence consolidating system |
| CN102916971A (en) * | 2012-10-31 | 2013-02-06 | 重庆君盾科技有限公司 | Electronic data curing system and method |
| CN103514410A (en) * | 2013-09-30 | 2014-01-15 | 上海市数字证书认证中心有限公司 | Dependable preservation and evidence collection system and method for electronic contract |
| CN105260677A (en) * | 2015-10-28 | 2016-01-20 | 南京邮电大学 | Multiple-attribute-based electronic data fixing system and method |
| CN105338119A (en) * | 2015-12-03 | 2016-02-17 | 厦门法信公证云科技有限公司 | Electronic evidence fixing security system based on cloud storage |
| CN106033519A (en) * | 2016-05-14 | 2016-10-19 | 北京中凌科技有限公司 | Data security method for electronic file |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106713297A (en) | 2017-05-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106657049B (en) | System and method for real-time collecting and fixing electronic evidence | |
| CN109409122B (en) | File storage method, electronic device and storage medium | |
| US9178708B2 (en) | Non-deterministic time systems and methods | |
| EP3659311B1 (en) | Data stream integrity | |
| CN108197479B (en) | Method and system for judging electronic contract signing time accuracy | |
| CN110597818B (en) | File inquiry method, device, equipment and storage medium based on block chain | |
| CN106685640B (en) | Electronic evidence fixed information generation method and electronic evidence fixed server | |
| US20130311772A1 (en) | Non-pki digital signatures and information notary public in the cloud | |
| White et al. | Black block recorder: Immutable black box logging for robots via blockchain | |
| US20190354694A1 (en) | Verification of data captured by a consumer electronic device | |
| CN110830259A (en) | Method and system for providing originality and integrity certification for multimedia data | |
| CN107888591B (en) | Method and system for electronic data preservation | |
| CN106713297B (en) | Electronic data fixed platform based on cloud service | |
| CN110992219A (en) | Intellectual property protection method and system based on block chain technology | |
| US20240020420A1 (en) | Tamper-evident storage and provisioning of media streams | |
| CN110704451A (en) | Ownership registration and evidence-providing method and device based on block chain | |
| CN108737095B (en) | Method for carrying out credible operation by using digital current survey record credible model system | |
| CN111682955B (en) | Tool arrangement device for criminal scene electronic data evidence obtaining | |
| CN116702219B (en) | Block chain-based trusted certification method and device | |
| US20160119152A1 (en) | Non-deterministic time generation and event-association system | |
| CN120034343A (en) | Blockchain-based authorization method, device, computer and readable storage medium | |
| CN118114222A (en) | Authentication method, device, system, equipment and medium for data product | |
| Abdelfattah et al. | Blockchain-Based Secure Real-Time Multimedia Surveillance Framework | |
| HK40021002A (en) | Ownership registration method, ownership proof method and device based on blockchain | |
| Goncharov | Provable Time and Place of Capture for Photos |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200331 Termination date: 20211215 |
|
| CF01 | Termination of patent right due to non-payment of annual fee |