Method and apparatus for verifying authenticity of electronic archives

An electronic file and verification method technology, applied in the field of data security, can solve the problems of inability to effectively ensure the accuracy of verification results and low security, and achieve the effect of being difficult to forge and ensuring accuracy

Active Publication Date: 2017-09-15
北京市档案局 +1
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a verification method, device, medium and computing equipment for the authenticity of electronic archives, which are used to solve the problem that

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for verifying authenticity of electronic archives
  • Method and apparatus for verifying authenticity of electronic archives
  • Method and apparatus for verifying authenticity of electronic archives

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0041] In the specific implementation step S104, when acquiring the ID card of the electronic file used for verifying the authenticity of the electronic file to be verified, the following two implementation manners are included, specifically:

Embodiment approach 1

[0042] Implementation mode one, "online" acquisition

[0043] Obtain the file number of the electronic file to be verified from the metadata of the electronic file to be verified, and obtain the ID card of the electronic file used to verify the authenticity of the electronic file to be verified from the server storing the electronic file ID according to the file number.

[0044] It should be noted that the ID card of the electronic file in this embodiment is obtained from the server, which is commonly referred to as "online" acquisition. Since the ID card of the electronic file is stored in the server, it is difficult to forge or tamper with. Therefore, this implementation The method is suitable for scenarios with high security requirements. However, the ID card of the electronic file in this embodiment is stored in the server. When obtaining the ID card of the electronic file from the server, it is necessary to access the server online to obtain it.

Embodiment approach 2

[0045] Implementation mode two, "offline" acquisition

[0046] Obtain from the data package of the electronic file to be verified the identity card of the electronic file used to verify the authenticity of the electronic file to be verified.

[0047] It should be noted that, corresponding to the “online” acquisition, in this embodiment, the ID card of the electronic file is included in the data packet of the electronic file to be verified. When the ID card of the electronic file is obtained, it can be directly obtained from the electronic file to be verified. In the process of obtaining the ID card of the electronic file, there is no need to access the server, which is commonly referred to as "offline" acquisition. The "offline" acquisition method has lower security than the "online" acquisition method in the first embodiment. Therefore, this embodiment is suitable for application scenarios with lower security requirements.

[0048] It is worth noting that, in order to further impro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and apparatus for verifying the authenticity of electronic archives for solving the problems that the method for verifying the authenticity of electronic archives in the prior art is relatively simple, the security is relatively low, and that the accuracy of the verification results cannot be ensured effectively. The method for verifying the authenticity of electronic archives comprises the following steps: obtaining a to-be-verified electronic archive and metadata of the to-be-verified electronic archive; generating a digital digest of the to-be-verified electronic archive; extracting core metadata of the to-be-verified electronic archive; obtaining an identity card of the electronic archive, analyzing the identity card of the electronic archive, and extracting an identity card serial number of the electronic archive, a public key certificate of a receiving unit receiving the electronic archive and a signature value from the analysis result; and based on the public key certificate of the receiving unit, the signature value, the digital digest of the to-be-verified electronic archive and the core metadata of the to-be-verified electronic archive, performing digital signature verification by using an asymmetric algorithm to determine the authenticity of the to-be-verified electronic archive.

Description

Technical field [0001] The present invention relates to the technical field of data security, in particular to a method, device, medium and computing equipment for authenticating electronic archives. Background technique [0002] With the continuous use of computer network technology, digital technology and multimedia technology in file management, electronic file information has emerged. [0003] In the prior art, when ensuring the uniqueness, originality and authenticity of electronic files, the usual method is to encrypt the electronic files. When encrypting electronic files, the method in the prior art is to encrypt the electronic files themselves. Or directly encrypt the electronic archives and the metadata of the electronic archives to generate secure information. Accordingly, when verifying the authenticity of the electronic file, the security information of the electronic file is directly decrypted, and then the decrypted electronic file is compared with the electronic fil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06F17/30
CPCG06F16/164H04L9/3247H04L63/0807H04L63/0823H04L63/0876H04L63/12
Inventor 陶水龙薛四新徐华侯彦华王海燕田雷李超王贞宋红崔伟陈伟王立钱毅杨中营姜海舟柳晶姚磊李学强
Owner 北京市档案局
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products