A method of credible operation using digital site survey record credible model system
A model system and credible technology, which is applied in the field of credible operation using a digital survey and record credible model system, can solve the problems of unsolved supplementary signatures and proxy signatures, photos and videos are easily tampered, and prevent supplementary signatures. The effect of signature and proxy signature
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The present invention is described in further detail now in conjunction with accompanying drawing.
[0042] figure 1 A structural diagram of the trusted model is described. In the present invention, the trustworthy model of digital survey record is recorded as T, T=(E, A, DR, TR, Sign), where E is the entity in the model, E={S, C i}, S is the server, C i For the currently surveyed terminal equipment, S and C i They are connected through a wireless communication network; A is the set of cryptographic algorithms in the model; DR is the set of all digital survey records, DR={dr i |dr i ∈ {digital photo, digital transcript, video, audio}}; TR is a collection of credible digital survey records, TR={Sign(dr i )}; Sign is credible operation; DT is date and time; GPS is C i The current geographic coordinates of .
[0043] The process of using this system for trusted operations is as follows:
[0044] (1) Initialization process
[0045] Use RSA algorithm to generate pub...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


