CN112613062A - Judicial-assisted case data encryption protection method - Google Patents
Judicial-assisted case data encryption protection method Download PDFInfo
- Publication number
- CN112613062A CN112613062A CN202110130946.XA CN202110130946A CN112613062A CN 112613062 A CN112613062 A CN 112613062A CN 202110130946 A CN202110130946 A CN 202110130946A CN 112613062 A CN112613062 A CN 112613062A
- Authority
- CN
- China
- Prior art keywords
- data
- case data
- case
- judicial
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000013523 data management Methods 0.000 claims abstract description 12
- 238000013524 data verification Methods 0.000 claims abstract description 10
- 238000012795 verification Methods 0.000 claims description 15
- 238000013500 data storage Methods 0.000 claims description 3
- 230000006872 improvement Effects 0.000 abstract description 2
- 230000008569 process Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a judicial assistance case data encryption protection method, belonging to the technical field of judicial assistance case data encryption protection; the technical problem to be solved is as follows: the improvement of a judicial auxiliary case data encryption protection method is provided; the technical scheme for solving the technical problems is as follows: installing a case data encryption system at a server side, and respectively setting a data verification service and a data management service; adding a timestamp into the original data, keeping the original data complete and unchanged, starting a data verification service, controlling an encryption system to receive electronic case data information in judicial auxiliary work, verifying the received electronic case data information to form a new data value, and generating a data fingerprint of the original file; starting a data management service, controlling an encryption system to encrypt and store electronic case data which accord with working rules according to the corresponding working rules; decrypting and reading the encrypted and stored electronic case data; the invention is applied to judicial assistance case data protection.
Description
Technical Field
The invention discloses a judicial-assisted case data encryption protection method, and belongs to the technical field of judicial-assisted case data encryption protection.
Background
The promotion of the modernized construction of the national treatment system and the treatment capacity can be really implemented into the management standard of the notarization industry by the construction of the informatization standard system in the judicial assistance affairs work of the national court; at present, the protection of data generated, transmitted and processed in the judicial assistant working process is crucial, if the data is lost, the personal information of citizens is lost, and if the data is lost, confidential documents and internal conference files of the judicial department are lost; at present, more and more modern data processing and communication devices are used in the process of case handling and case checking, and the devices have the risks of unstable data transmission, data loss and loss, easy theft, stealing and tampering during working, and the risks should be avoided during judicial auxiliary informatization work, so a set of practical and reliable informatization data protection method is needed to overcome the defects and optimize the corresponding data management application process.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention aims to solve the technical problems that: an improvement of a judicial assistance case data encryption protection method is provided.
In order to solve the technical problems, the invention adopts the technical scheme that: a judicial-assisted case data encryption protection method comprises the following protection steps:
the method comprises the following steps: installing a case data encryption system at a server side, and respectively setting a data verification service and a data management service;
step two: adding a timestamp into the original data, keeping the original data complete and unchanged, starting a data verification service, controlling an encryption system to receive electronic case data information in judicial auxiliary work, and verifying the received electronic case data information to form a new data value; when the verification is finished, generating a data fingerprint of the electronic case data original file;
step three: starting a data management service, controlling an encryption system to encrypt the electronic case data which accord with the working rules according to the corresponding working rules, encrypting the electronic case data after each reading and new data storage return, and verifying the electronic case data by adopting a regular verification method;
step four: and carrying out corresponding encryption and storage operations on the electronic case data:
step 4.1: encrypting the A element in the case data X information by using a regular verification method, generating case ciphertext data A + of A after encryption, and storing the data A + into the original case data X information;
step 4.2: b elements in the case data X information are encrypted by a regular verification method and are simultaneously stored with the ciphertext data A + generated in the step 4.1;
step 4.3: repeatedly encrypting and storing the rest elements in the case data X information according to the contents of the step 4.1 and the step 4.2;
step five: and reading the encrypted and stored electronic case data, performing multiple decryption on the encrypted and fixed case data to obtain the fixed electronic case data, verifying the data MD5 value and the time stamp, and reading and using the fixed electronic case data as new data after verification.
And the data fingerprint generated in the step two identifies the corresponding case data original file, and stores the storage address of the case data original file, the corresponding user information and the generated data fingerprint.
And the data management service in the third step specifically encrypts and stores different types of elements of the same case information according to the elements of case storage.
Compared with the prior art, the invention has the beneficial effects that: the data encryption protection method provided by the invention applies multiple asymmetric encryption technology to judicial informatization work, effectively improves and stabilizes the security of case data through multiple times of encryption when transmitting important case data, constructs intensive judicial data application service based on the encryption mechanism of the judicial auxiliary case data, optimizes the traditional case handling data transmission mode, and improves the high efficiency and the security of case handling related information transmission.
Drawings
The invention is further described below with reference to the accompanying drawings:
FIG. 1 is a flowchart of the steps of the judicial assistance case data encryption protection method of the present invention.
Detailed Description
As shown in fig. 1, the present invention provides a judicial assistance case data encryption protection method, the implementation of which is based on the data verification service processing and data management service processing functions set in the management system;
the data verification service processing is used for receiving electronic case data information in judicial assistance work, verifying the received electronic case data information and then forming a new data value;
the data management service process verifies the case data by a regular verification method according to a specific working rule. And encrypting after the rule is met, and encrypting after reading and new data storage returning each time so as to prevent data tampering midway.
The data verification service adds the original data into a time stamp before data verification, and keeps the data complete and unchanged; and when the verification is finished, generating data fingerprints of the case data original files, wherein one data fingerprint identifies a corresponding case data file, and storing the storage address of the case data original file, the corresponding user information of the case data original file and the generated data fingerprint.
The data management service process encrypts and stores different types of elements of the same case information according to the elements of case storage.
The encryption and storage method comprises the following steps:
(1) and encrypting the A element in the case data X information by using a regular verification method, generating case ciphertext data A + of the A after encryption, and storing the case ciphertext data A + into the original case data X information.
(2) And encrypting the B element in the case data X information by using a regular verification method, and simultaneously storing the B element and the ciphertext data A + generated in the previous step.
(3) And repeating the steps according to the contents in the first two steps to sequentially encrypt and store the other elements in the case data information X according to the steps.
The judicial assistant informatization operation method provided by the invention is a case data reading method based on multiple asymmetric encryption technology, and is used for sequentially and respectively carrying out multiple decryption on fixed case data subjected to multiple asymmetric encryption to obtain the fixed case data and verifying an MD5 value and a timestamp, and new data reading and use can be carried out after error-free verification.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (3)
1. A judicial-assisted case data encryption protection method is characterized by comprising the following steps: the method comprises the following protection steps:
the method comprises the following steps: installing a case data encryption system at a server side, and respectively setting a data verification service and a data management service;
step two: adding a timestamp into the original data, keeping the original data complete and unchanged, starting a data verification service, controlling an encryption system to receive electronic case data information in judicial auxiliary work, and verifying the received electronic case data information to form a new data value; when the verification is finished, generating a data fingerprint of the electronic case data original file;
step three: starting a data management service, controlling an encryption system to encrypt the electronic case data which accord with the working rules according to the corresponding working rules, encrypting the electronic case data after each reading and new data storage return, and verifying the electronic case data by adopting a regular verification method;
step four: and carrying out corresponding encryption and storage operations on the electronic case data:
step 4.1: encrypting the A element in the case data X information by using a regular verification method, generating case ciphertext data A + of A after encryption, and storing the data A + into the original case data X information;
step 4.2: b elements in the case data X information are encrypted by a regular verification method and are simultaneously stored with the ciphertext data A + generated in the step 4.1;
step 4.3: repeatedly encrypting and storing the rest elements in the case data X information according to the contents of the step 4.1 and the step 4.2;
step five: and reading the encrypted and stored electronic case data, performing multiple decryption on the encrypted and fixed case data to obtain the fixed electronic case data, verifying the data MD5 value and the time stamp, and reading and using the fixed electronic case data as new data after verification.
2. The judicial assistance case data encryption protection method according to claim 1, wherein: and the data fingerprint generated in the step two identifies the corresponding case data original file, and stores the storage address of the case data original file, the corresponding user information and the generated data fingerprint.
3. The judicial assistance case data encryption protection method according to claim 1, wherein: and the data management service in the third step specifically encrypts and stores different types of elements of the same case information according to the elements of case storage.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110130946.XA CN112613062B (en) | 2021-01-30 | 2021-01-30 | Judicial auxiliary case data encryption protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110130946.XA CN112613062B (en) | 2021-01-30 | 2021-01-30 | Judicial auxiliary case data encryption protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112613062A true CN112613062A (en) | 2021-04-06 |
CN112613062B CN112613062B (en) | 2024-02-09 |
Family
ID=75254665
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110130946.XA Active CN112613062B (en) | 2021-01-30 | 2021-01-30 | Judicial auxiliary case data encryption protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112613062B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100211484A1 (en) * | 2009-02-13 | 2010-08-19 | Centergistic Solutions, Inc. | Electronic bankruptcy claims filing system |
CN106713336A (en) * | 2017-01-03 | 2017-05-24 | 厦门法信公证云科技有限公司 | Electronic data safekeeping system and method based on double and asymmetric encryption technology |
CN108090851A (en) * | 2018-02-07 | 2018-05-29 | 武汉上点点信息有限公司 | A kind of network arbitration movement confirms batch case operation system |
CN207753794U (en) * | 2018-01-31 | 2018-08-21 | 成都世纪智慧科技有限公司 | Electronic evidence-collecting equipment with remote collaboration function |
CN110109864A (en) * | 2019-04-17 | 2019-08-09 | 湖北瑞特威网络工程有限公司 | Folder document management method based on invisible two-dimensional codes as mark |
CN110392043A (en) * | 2019-06-21 | 2019-10-29 | 法信公证云(厦门)科技有限公司 | A kind of method and system for assigning electronic contract notarization and enforcing effect |
CN111275399A (en) * | 2020-01-20 | 2020-06-12 | 北京合信力科技有限公司 | Method and device for processing litigation case data |
CN111708658A (en) * | 2020-06-09 | 2020-09-25 | 孟磊 | Judicial-assisted case data risk management system and application method thereof |
CN111932413A (en) * | 2020-09-14 | 2020-11-13 | 平安国际智慧城市科技股份有限公司 | Case element extraction method, case element extraction device, case element extraction equipment and case element extraction medium |
CN111984989A (en) * | 2020-09-01 | 2020-11-24 | 上海梅斯医药科技有限公司 | Method, device, system and medium for verifying, issuing and accessing URL (uniform resource locator) |
-
2021
- 2021-01-30 CN CN202110130946.XA patent/CN112613062B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100211484A1 (en) * | 2009-02-13 | 2010-08-19 | Centergistic Solutions, Inc. | Electronic bankruptcy claims filing system |
CN106713336A (en) * | 2017-01-03 | 2017-05-24 | 厦门法信公证云科技有限公司 | Electronic data safekeeping system and method based on double and asymmetric encryption technology |
CN207753794U (en) * | 2018-01-31 | 2018-08-21 | 成都世纪智慧科技有限公司 | Electronic evidence-collecting equipment with remote collaboration function |
CN108090851A (en) * | 2018-02-07 | 2018-05-29 | 武汉上点点信息有限公司 | A kind of network arbitration movement confirms batch case operation system |
CN110109864A (en) * | 2019-04-17 | 2019-08-09 | 湖北瑞特威网络工程有限公司 | Folder document management method based on invisible two-dimensional codes as mark |
CN110392043A (en) * | 2019-06-21 | 2019-10-29 | 法信公证云(厦门)科技有限公司 | A kind of method and system for assigning electronic contract notarization and enforcing effect |
CN111275399A (en) * | 2020-01-20 | 2020-06-12 | 北京合信力科技有限公司 | Method and device for processing litigation case data |
CN111708658A (en) * | 2020-06-09 | 2020-09-25 | 孟磊 | Judicial-assisted case data risk management system and application method thereof |
CN111984989A (en) * | 2020-09-01 | 2020-11-24 | 上海梅斯医药科技有限公司 | Method, device, system and medium for verifying, issuing and accessing URL (uniform resource locator) |
CN111932413A (en) * | 2020-09-14 | 2020-11-13 | 平安国际智慧城市科技股份有限公司 | Case element extraction method, case element extraction device, case element extraction equipment and case element extraction medium |
Non-Patent Citations (1)
Title |
---|
李勋 等;: "司法鉴定报告多人签名技术研究", 电脑知识与技术, vol. 6, no. 25, pages 6959 - 6962 * |
Also Published As
Publication number | Publication date |
---|---|
CN112613062B (en) | 2024-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110324143B (en) | Data transmission method, electronic device and storage medium | |
US10904231B2 (en) | Encryption using multi-level encryption key derivation | |
US10374807B2 (en) | Storing and retrieving ciphertext in data storage | |
CN103530201A (en) | Safety data repetition removing method and system applicable to backup system | |
US7392402B2 (en) | Method and apparatus for data integration security | |
CN107612683B (en) | Encryption and decryption method, device, system, equipment and storage medium | |
CN106067874B (en) | It is a kind of by the method for data record to server end, terminal and server | |
US8885826B2 (en) | Transmission/reception system, transmission device, reception device, authentication device, user device, method executed by the aforementioned, and program | |
CN101436208A (en) | Ciphertext database privacy protection enquiring method | |
CN103095452A (en) | Random encryption method needing to adopt exhaustion method for deciphering | |
CN106778292B (en) | A kind of quick restoring method of Word encrypted document | |
CN110851843A (en) | Data management method and device based on block chain | |
CN114640523A (en) | Computer data security encryption algorithm and system | |
CN113660205B (en) | Encryption method for software authorization code | |
US9438429B2 (en) | Method for authentication and electronic device for performing the authentication | |
CN114553557B (en) | Key calling method, device, computer equipment and storage medium | |
CN112613062B (en) | Judicial auxiliary case data encryption protection method | |
CN115909560A (en) | Data encryption method, data decryption method and door lock system | |
CN111414341B (en) | Data normalization description method in Internet of things environment | |
CN112913184B (en) | Computing key rotation periods for block cipher based encryption scheme systems and methods | |
JP2011193161A (en) | System and method for encryption control | |
Ghassabi et al. | DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments | |
CN114374519B (en) | Data transmission method, system and equipment | |
CN110138811B (en) | Encryption method for data transmission of Internet of things | |
WO2023216403A1 (en) | Ciphertext restoration method for private set intersection based on homomorphic encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |