Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for anti-tampering of electronic files

An electronic file and anti-tampering technology, which is applied in the direction of electrical components, digital data protection, transmission systems, etc., can solve the problems that it is difficult to guarantee the anti-tampering of electronic files, so as to improve the anti-tampering ability, reduce the success rate, and ensure privacy Effect

Active Publication Date: 2017-05-24
安徽中科晶格技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, its role is mainly limited to allowing the user to check that the downloaded file is consistent with the file provided by its server
It is worth noting that there is currently no effective and convenient mechanism to protect the hashed electronic file itself from being modified and deleted, that is, people inside and outside the system may replace the content of the electronic file and its corresponding hash at the same time, making it difficult to guarantee the security of the electronic file. Anti-tampering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for anti-tampering of electronic files
  • A method for anti-tampering of electronic files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Such as figure 1 As shown, an anti-tampering method for electronic files is that in a distributed network environment, there is a master node and n slave nodes. In this embodiment, the master node is a network server running an application service program, and the slave node is a client software running on a PC. The master and slave nodes are connected to each other through the Internet, and the communication is completed using the SOAP protocol based on standard TCP / IP. The n slave nodes are used to calculate the hash value corresponding to the electronic file, and send the hash value corresponding to the electronic file to the master node. Electronic files are electronic files in any format that the user system can recognize and read binary content, such as PDF, DOC, ZIP, EXE, JPG, AVI and other formats. There are no special restrictions on the size of the file. Calculate the corresponding hash of the electronic file, using common hash algorithms, such as SHA256, MD5, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electronic document tamper-proof method. The electronic document tamper-proof method is characterized by comprising the following steps that first, hashed values to be processed are packaged into hashed value packets by a master node and are released to slave nodes; second, the master node calculates the hashed values of the hashed value packets; third, the master node uses the new hashed values as new hashed values to be processed, and the new hashed values and the hashed values of the hashed value packets are together packaged into new hashed value packets and published by the master node; fourth, all the hashed value packets received by the slave nodes are connected into a hashed packet chain, and tamper-proof check of electronic documents is achieved through the hashed packet chain. According to the electronic document tamper-proof method, attack from a system manager can be effectively monitored and prevented, the probability that the electronic documents are tampered is reduced, the ability of preventing tamper of a large size of data is achieved through very small space cost and time cost, and meanwhile, privacy of the electronic documents is guaranteed.

Description

Technical field [0001] This application relates to anti-tampering technology, in particular to an anti-tampering method for electronic files. Background technique [0002] With the continuous development of the Internet, more and more users publish electronic files or upload files through the Internet, including some important electronic files such as written commercial contracts, technical documents, and published external statements and comments. Due to the digital characteristics of network electronic files and electronic files, they can easily be tampered with without being noticed. When users receive services, they usually can only passively choose to trust the capabilities and behaviors of the service provider. Current service providers, such as online disks, cloud disks, Weibo, WeChat, etc., have maximum rights in their systems, and their behavior cannot be effectively monitored. The system administrator can arbitrarily delete and modify the data in the system without be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08G06F21/64
Inventor 李晓风赵赫李芳谭海波孙怡宁刘冰
Owner 安徽中科晶格技术有限公司