A security data authentication method, system and device

A data and authentication technology, applied in the field of navigation, can solve problems such as long waiting time, disappearance, and case delay, and achieve the effect of improving legitimacy and usability, improving real validity, and reducing time.

Inactive Publication Date: 2020-10-30
国信嘉宁数据技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (4) Electronic evidence is fragile. It is precisely because of the technicality of electronic evidence and the particularity of its storage method that it is extremely vulnerable to external damage during its storage, transmission and use, such as being attacked by viruses and hackers. , monitoring, eavesdropping, interception, tampering, deletion, etc., making it completely unrecognizable or even disappear
Compared with the rapid development of the Internet at present, electronic data security is very backward, and there is no legal electronic data security system, which has become a major problem in the development of the Internet
[0008] In view of the blank preservation of contemporary electronic evidence, the legal basis for legal electronic evidence cannot be generated conveniently and quickly. When legal disputes arise, the parties need to conduct judicial appraisal of electronic evidence on electronic data, and judicial appraisal is extremely expensive. Time-consuming and labor-intensive, long waiting time, causing delays in cases and other problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security data authentication method, system and device
  • A security data authentication method, system and device
  • A security data authentication method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] Embodiment 1 of the present invention provides an Internet data preservation method, the process of which is as follows figure 1 shown, including the following steps:

[0064] Step S101: Obtain the data to be preserved submitted by the user.

[0065] When users have data to be preserved, they can provide it to the certificate deposit server for certificate preservation. Users can upload their own electronic data with preservation needs to the certificate deposit server for certificate preservation, and they can also publish some data on the Internet, such as Infringement data that may infringe on one's own intellectual property rights is intercepted and uploaded to the certificate storage server for preservation and preservation for the purpose of rights protection.

[0066] Correspondingly, when the certificate storage server obtains the data to be preserved submitted by the user, it can obtain at least one file to be preserved submitted by the user or stored by itsel...

Embodiment 2

[0147] Embodiment 2 of the present invention provides a preserved data authentication method, which authenticates the electronic evidence preserved by the user, provides evidence legality proof for the user, and improves the usability and effectiveness of the electronic evidence. The process is as follows Figure 4 shown, including the following steps:

[0148] Step S401: Receive a user's authentication request for preserved data.

[0149] The certificate storage server receives the signed agreement file sent by the user; or the certificate deposit server receives the user's agreement signing request, provides the user with the agreement file for the user to sign, and obtains the signed agreement file uploaded by the user after signing online or offline.

[0150] In this step, when the user wants to authenticate the preserved data, he sends an authentication request to the certificate storage server. The user can directly sign the agreement file and send it to the certificate...

Embodiment 3

[0184] Based on the same inventive concept, Embodiment 3 of the present invention provides an Internet electronic data preservation system, the structure of which is as follows Figure 6 As shown, it includes: a client 601 , a certificate server 602 and an authentication server 603 .

[0185] The client 601 is used to submit the data to be preserved to the certificate server 602.

[0186] The deposit server 602 includes an Internet data preservation implementation device, which is used to obtain the data to be preserved submitted by the user, and generate the preservation verification information of the data to be preserved; generate a certificate electronic certificate information combination according to the data to be preserved and user information; The verification information, combination of stored electronic certificate information, user identification information and record information combination of stored certificate code are sent to the authentication server 603; Ce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a preserved data authentication method, system and device. The method comprises the following steps: receiving a user's authentication request aiming at preserved data, generating inspection material data according to the authentication request and the preserved data aimed by the authentication request, sending the inspection material data and an evidence-saving data package corresponding to the preserved data to an authentication server, receiving an authentication report successfully generated and returned by the authentication server according to the inspection material data and the evidence-saving data package, and providing the authentication report to a user. An electronic evidence capable of being preserved by the user can be authenticated, reliability and availability of the electronic evidence are improved, and convenience is provided for preservation and usage of the electronic evidence.

Description

technical field [0001] The invention relates to the technical field of navigation, in particular to a method, system and device for authentication of preserved data. Background technique [0002] There are great differences between electronic evidence and traditional legal evidence in terms of presentation, preservation and security. Summarizing the views of all parties, the characteristics of electronic evidence can basically be summed up in the following points: [0003] (1) Electronic evidence is technical. The high-tech nature of electronic evidence is a double-edged sword. On the one hand, the technology enables electronic evidence to have excellent characteristics such as rapid collection, easy storage, less space occupation, convenient transmission and transportation, and repeated reproduction. However, it must rely on certain It is a product of electronic technology. Without these storage technologies, computer technologies, and network technologies, electronic evi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/0876H04L63/123
Inventor 徐茂兰甄诚
Owner 国信嘉宁数据技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products