Supercharge Your Innovation With Domain-Expert AI Agents!

Data verification system

A data verification and verification system technology, applied in the information field, can solve the problems of data security impact, data authenticity impact, and the authenticity of verification results cannot be guaranteed, so as to save space and prevent tampering.

Active Publication Date: 2021-04-16
CHONGQING AOXIONG INFORMATION TECH
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, CN201811285794.5 discloses a verification method based on a CA certificate, a system that sends a CA certification request, a resource access request, sends data, and receives a return result from a server of a third-party forensic appraisal institution to the server of a third-party forensic appraisal institution. If the three-party root certificate is stolen, the authenticity of all verification results cannot be guaranteed, and the authenticity of all data that needs to be verified will be affected
Moreover, if you completely rely on a single third-party organization for identification, it is not a safe choice from a technical point of view
Blockchain technology has been the focus of research and attention in recent years, but the reliability and security of this technology still need more time to verify, and its implementation method is still in the research and development stage. overall security of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data verification system
  • Data verification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] A data verification system includes a verification unit, a third-party verification unit and a terminal. The terminal includes a first interface module and a first public service module.

[0046] The verification unit includes a second interface module, a second public service module, a second database module and a second file system module.

[0047] The third-party verification unit includes a third interface module, a third public service module and a third database module.

[0048] Preferably, a third database module with encryption function is used.

[0049] The first public service module receives the encrypted data provided by the user and the serial number corresponding to the encrypted data.

[0050] The second database module stores plaintext data, including keys, key digests, and encrypted data image digests, and the second file system module stores ciphertext data, including encrypted data images.

[0051] Preferably, the second database module stores the p...

Embodiment 2

[0073] A data verification system includes a verification unit, a third-party verification unit and a terminal. The terminal includes a first interface module and a first public service module.

[0074] The verification unit includes a second interface module, a second public service module, a second database module and a second file system module.

[0075] The third-party verification unit includes a third interface module, a third public service module and a third database module.

[0076] Preferably, a third database module with encryption function is used.

[0077] The first public service module receives the encrypted data provided by the user and the serial number corresponding to the encrypted data.

[0078]The second database module stores plaintext data, including keys, key digests, and encrypted data image digests, and the second file system module stores ciphertext data, including encrypted data images.

[0079] The third database module stores plaintext data, inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data verification system, and the system comprises a verification unit, a third-party verification unit and a terminal. The terminal comprises a first interface module and a first public service module. The verification unit comprises a second interface module, a second public service module, a second database module and a second file system module. The third-party verification unit comprises a third interface module, a third public service module and a third database module. The second file system module stores plaintext data, and the second database module stores ciphertext data which respectively comprise an encrypted data mirror image and secret key, a secret key abstract and an encrypted data mirror image abstract. The third database module stores plaintext data, including an encrypted data mirror image abstract and a key mirror image abstract. An encrypted file is submitted through the terminal, and the privacy of a user is ensured while the authenticity of data is safely and effectively verified through processing of the modules.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a data verification system. Background technique [0002] With the popularization and maturity of Hypertext Transfer Security Protocol (HTTPS), link encryption technology can almost eliminate the possibility of man-in-the-middle attack (MITM) when the certificate authority is secure. It can be seen that the security of data transmission is no longer the main research direction of a secure storage system. At present, the authenticity of data is the main issue of data storage security. If there is a security problem when the data is generated, such as being tampered with, maliciously encrypted, etc., even if the link encryption ensures the security of transmission, the tampered or maliciously encrypted data will lose its original meaning. . [0003] On the other hand, data storage processing at a single location is not helpful for data security, because it has become a cons...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q50/18
Inventor 吴乐琴雷晓红
Owner CHONGQING AOXIONG INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More