Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence

An electronic evidence, third-party technology, applied in transmission systems, electrical components, user identity/authority verification, etc. It is possible to ensure the objectivity and authenticity of electronic evidence and other issues to achieve the effect of ensuring continuous security.

Inactive Publication Date: 2011-10-19
重庆兴际云大数据科技有限公司
View PDF4 Cites 97 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is impossible to achieve the consistency between the electronic evidence stored in the third party and the electronic data stored by the applicant, and it is impossible to ensure the objective authenticity of the preserved electronic evidence
[0008] 2. There is no technical means to ensure the continuous effectiveness of the system
Existing electronic evidence preservation technologies and methods do not have corresponding technical means to ensure the continuous effectiveness of the system
[0009] 3. There is no technology and method to solve the problem of electronic evidence preservation and effective protection of users' commercial secrets and personal privacy
The existing preservation technologies, whether it is the preservation of electronic documents, electronic files, or the preservation of electronic transactions, have not solved the problem of electronic evidence preservation and state agencies, enterprises and institutions, or individual users based on commercial secrets and privacy protection considerations, and do not use electronic evidence. The contradiction between the original form of evidence stored in the third-party preservation agency that performs preservation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
  • Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence
  • Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] figure 1 Provided is the third-party authentication preservation system based on electronic evidence online preservation according to the present invention, from figure 1 It can be seen that the system is divided into client and server, and the client communicates with the server through the Internet.

[0028] The client terminal of the present invention includes: an identity authentication module B, an encryption and decryption module B, a security processing module B, an evidence storage module B, and an authentication module B. All modules of the client are integrated and installed in such as figure 1 on the client computer shown, where:

[0029] The identity authentication module B generates an identifier that uniquely identifies the user according to the user name / password, digital certificate, biometric feature, etc. When the user logs in, the identity authentication module B initiates an identity authentication request to the server according to the identifier;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a third-party authentication security protection system and a third-party authentication security protection method based on the online security protection of an electronic evidence and relates to an information processing technology of a computer. The method comprises the following steps that: after sending a security protection request to a server side, a client side generates a Hash value associated with electronic data which is subjected to security protection and transmits the Hash value to the server side for storage; the client side sends an authentication security protection request, and the server side compares a client side Hash value which is stored in the system with the Hash value which is transmitted by the client side to judge whether the security protection behaviors of the client side are objective and real; communication between the client side and the server side is encrypted by using a secure cryptographic algorithm; the server side carries out association processing on all Hash values in the system to ensure that the Hash value which is stored in the server side and associated with the electronic data cannot be falsified; and when the used cryptographic algorithm is decoded, the client side applies for updating of security protection, and carries out security protection processing on data to be required for security protection and result data generated by the last security protection application again so as to ensure the continuous security of the system.

Description

technical field [0001] The invention belongs to the technical field of computer information processing, and in particular relates to an electronic evidence-based online preservation system and method. Background technique [0002] Preservation of electronic evidence means that the party concerned applies to the preservation agency for review to confirm its objective authenticity, fixes and preserves the electronic evidence in order to prevent the loss, tampering and difficulty in obtaining the electronic evidence in the future. Third-party certified preservation is electronic evidence preservation conducted by an electronic evidence preservation institution established in accordance with the law and having specialized technical conditions. [0003] Today, when human beings have entered the network age, the electronic evidence preservation of third-party certification and preservation institutions is of great significance. This form of electronic evidence preservation can no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 熊志海黄永洪
Owner 重庆兴际云大数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products