CN112613062A - Judicial-assisted case data encryption protection method - Google Patents

Judicial-assisted case data encryption protection method Download PDF

Info

Publication number
CN112613062A
CN112613062A CN202110130946.XA CN202110130946A CN112613062A CN 112613062 A CN112613062 A CN 112613062A CN 202110130946 A CN202110130946 A CN 202110130946A CN 112613062 A CN112613062 A CN 112613062A
Authority
CN
China
Prior art keywords
data
case data
case
judicial
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110130946.XA
Other languages
Chinese (zh)
Other versions
CN112613062B (en
Inventor
孟磊
梁敏
王宇波
张振锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Ruiyun Micro Nano Technology Co ltd
Original Assignee
Shanxi Ruiyun Micro Nano Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Ruiyun Micro Nano Technology Co ltd filed Critical Shanxi Ruiyun Micro Nano Technology Co ltd
Priority to CN202110130946.XA priority Critical patent/CN112613062B/en
Publication of CN112613062A publication Critical patent/CN112613062A/en
Application granted granted Critical
Publication of CN112613062B publication Critical patent/CN112613062B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a judicial assistance case data encryption protection method, belonging to the technical field of judicial assistance case data encryption protection; the technical problem to be solved is as follows: the improvement of a judicial auxiliary case data encryption protection method is provided; the technical scheme for solving the technical problems is as follows: installing a case data encryption system at a server side, and respectively setting a data verification service and a data management service; adding a timestamp into the original data, keeping the original data complete and unchanged, starting a data verification service, controlling an encryption system to receive electronic case data information in judicial auxiliary work, verifying the received electronic case data information to form a new data value, and generating a data fingerprint of the original file; starting a data management service, controlling an encryption system to encrypt and store electronic case data which accord with working rules according to the corresponding working rules; decrypting and reading the encrypted and stored electronic case data; the invention is applied to judicial assistance case data protection.

Description

Judicial-assisted case data encryption protection method
Technical Field
The invention discloses a judicial-assisted case data encryption protection method, and belongs to the technical field of judicial-assisted case data encryption protection.
Background
The promotion of the modernized construction of the national treatment system and the treatment capacity can be really implemented into the management standard of the notarization industry by the construction of the informatization standard system in the judicial assistance affairs work of the national court; at present, the protection of data generated, transmitted and processed in the judicial assistant working process is crucial, if the data is lost, the personal information of citizens is lost, and if the data is lost, confidential documents and internal conference files of the judicial department are lost; at present, more and more modern data processing and communication devices are used in the process of case handling and case checking, and the devices have the risks of unstable data transmission, data loss and loss, easy theft, stealing and tampering during working, and the risks should be avoided during judicial auxiliary informatization work, so a set of practical and reliable informatization data protection method is needed to overcome the defects and optimize the corresponding data management application process.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention aims to solve the technical problems that: an improvement of a judicial assistance case data encryption protection method is provided.
In order to solve the technical problems, the invention adopts the technical scheme that: a judicial-assisted case data encryption protection method comprises the following protection steps:
the method comprises the following steps: installing a case data encryption system at a server side, and respectively setting a data verification service and a data management service;
step two: adding a timestamp into the original data, keeping the original data complete and unchanged, starting a data verification service, controlling an encryption system to receive electronic case data information in judicial auxiliary work, and verifying the received electronic case data information to form a new data value; when the verification is finished, generating a data fingerprint of the electronic case data original file;
step three: starting a data management service, controlling an encryption system to encrypt the electronic case data which accord with the working rules according to the corresponding working rules, encrypting the electronic case data after each reading and new data storage return, and verifying the electronic case data by adopting a regular verification method;
step four: and carrying out corresponding encryption and storage operations on the electronic case data:
step 4.1: encrypting the A element in the case data X information by using a regular verification method, generating case ciphertext data A + of A after encryption, and storing the data A + into the original case data X information;
step 4.2: b elements in the case data X information are encrypted by a regular verification method and are simultaneously stored with the ciphertext data A + generated in the step 4.1;
step 4.3: repeatedly encrypting and storing the rest elements in the case data X information according to the contents of the step 4.1 and the step 4.2;
step five: and reading the encrypted and stored electronic case data, performing multiple decryption on the encrypted and fixed case data to obtain the fixed electronic case data, verifying the data MD5 value and the time stamp, and reading and using the fixed electronic case data as new data after verification.
And the data fingerprint generated in the step two identifies the corresponding case data original file, and stores the storage address of the case data original file, the corresponding user information and the generated data fingerprint.
And the data management service in the third step specifically encrypts and stores different types of elements of the same case information according to the elements of case storage.
Compared with the prior art, the invention has the beneficial effects that: the data encryption protection method provided by the invention applies multiple asymmetric encryption technology to judicial informatization work, effectively improves and stabilizes the security of case data through multiple times of encryption when transmitting important case data, constructs intensive judicial data application service based on the encryption mechanism of the judicial auxiliary case data, optimizes the traditional case handling data transmission mode, and improves the high efficiency and the security of case handling related information transmission.
Drawings
The invention is further described below with reference to the accompanying drawings:
FIG. 1 is a flowchart of the steps of the judicial assistance case data encryption protection method of the present invention.
Detailed Description
As shown in fig. 1, the present invention provides a judicial assistance case data encryption protection method, the implementation of which is based on the data verification service processing and data management service processing functions set in the management system;
the data verification service processing is used for receiving electronic case data information in judicial assistance work, verifying the received electronic case data information and then forming a new data value;
the data management service process verifies the case data by a regular verification method according to a specific working rule. And encrypting after the rule is met, and encrypting after reading and new data storage returning each time so as to prevent data tampering midway.
The data verification service adds the original data into a time stamp before data verification, and keeps the data complete and unchanged; and when the verification is finished, generating data fingerprints of the case data original files, wherein one data fingerprint identifies a corresponding case data file, and storing the storage address of the case data original file, the corresponding user information of the case data original file and the generated data fingerprint.
The data management service process encrypts and stores different types of elements of the same case information according to the elements of case storage.
The encryption and storage method comprises the following steps:
(1) and encrypting the A element in the case data X information by using a regular verification method, generating case ciphertext data A + of the A after encryption, and storing the case ciphertext data A + into the original case data X information.
(2) And encrypting the B element in the case data X information by using a regular verification method, and simultaneously storing the B element and the ciphertext data A + generated in the previous step.
(3) And repeating the steps according to the contents in the first two steps to sequentially encrypt and store the other elements in the case data information X according to the steps.
The judicial assistant informatization operation method provided by the invention is a case data reading method based on multiple asymmetric encryption technology, and is used for sequentially and respectively carrying out multiple decryption on fixed case data subjected to multiple asymmetric encryption to obtain the fixed case data and verifying an MD5 value and a timestamp, and new data reading and use can be carried out after error-free verification.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (3)

1. A judicial-assisted case data encryption protection method is characterized by comprising the following steps: the method comprises the following protection steps:
the method comprises the following steps: installing a case data encryption system at a server side, and respectively setting a data verification service and a data management service;
step two: adding a timestamp into the original data, keeping the original data complete and unchanged, starting a data verification service, controlling an encryption system to receive electronic case data information in judicial auxiliary work, and verifying the received electronic case data information to form a new data value; when the verification is finished, generating a data fingerprint of the electronic case data original file;
step three: starting a data management service, controlling an encryption system to encrypt the electronic case data which accord with the working rules according to the corresponding working rules, encrypting the electronic case data after each reading and new data storage return, and verifying the electronic case data by adopting a regular verification method;
step four: and carrying out corresponding encryption and storage operations on the electronic case data:
step 4.1: encrypting the A element in the case data X information by using a regular verification method, generating case ciphertext data A + of A after encryption, and storing the data A + into the original case data X information;
step 4.2: b elements in the case data X information are encrypted by a regular verification method and are simultaneously stored with the ciphertext data A + generated in the step 4.1;
step 4.3: repeatedly encrypting and storing the rest elements in the case data X information according to the contents of the step 4.1 and the step 4.2;
step five: and reading the encrypted and stored electronic case data, performing multiple decryption on the encrypted and fixed case data to obtain the fixed electronic case data, verifying the data MD5 value and the time stamp, and reading and using the fixed electronic case data as new data after verification.
2. The judicial assistance case data encryption protection method according to claim 1, wherein: and the data fingerprint generated in the step two identifies the corresponding case data original file, and stores the storage address of the case data original file, the corresponding user information and the generated data fingerprint.
3. The judicial assistance case data encryption protection method according to claim 1, wherein: and the data management service in the third step specifically encrypts and stores different types of elements of the same case information according to the elements of case storage.
CN202110130946.XA 2021-01-30 2021-01-30 Judicial auxiliary case data encryption protection method Active CN112613062B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110130946.XA CN112613062B (en) 2021-01-30 2021-01-30 Judicial auxiliary case data encryption protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110130946.XA CN112613062B (en) 2021-01-30 2021-01-30 Judicial auxiliary case data encryption protection method

Publications (2)

Publication Number Publication Date
CN112613062A true CN112613062A (en) 2021-04-06
CN112613062B CN112613062B (en) 2024-02-09

Family

ID=75254665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110130946.XA Active CN112613062B (en) 2021-01-30 2021-01-30 Judicial auxiliary case data encryption protection method

Country Status (1)

Country Link
CN (1) CN112613062B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100211484A1 (en) * 2009-02-13 2010-08-19 Centergistic Solutions, Inc. Electronic bankruptcy claims filing system
CN106713336A (en) * 2017-01-03 2017-05-24 厦门法信公证云科技有限公司 Electronic data safekeeping system and method based on double and asymmetric encryption technology
CN108090851A (en) * 2018-02-07 2018-05-29 武汉上点点信息有限公司 A kind of network arbitration movement confirms batch case operation system
CN207753794U (en) * 2018-01-31 2018-08-21 成都世纪智慧科技有限公司 Electronic evidence-collecting equipment with remote collaboration function
CN110109864A (en) * 2019-04-17 2019-08-09 湖北瑞特威网络工程有限公司 Folder document management method based on invisible two-dimensional codes as mark
CN110392043A (en) * 2019-06-21 2019-10-29 法信公证云(厦门)科技有限公司 A kind of method and system for assigning electronic contract notarization and enforcing effect
CN111275399A (en) * 2020-01-20 2020-06-12 北京合信力科技有限公司 Method and device for processing litigation case data
CN111708658A (en) * 2020-06-09 2020-09-25 孟磊 Judicial-assisted case data risk management system and application method thereof
CN111932413A (en) * 2020-09-14 2020-11-13 平安国际智慧城市科技股份有限公司 Case element extraction method, case element extraction device, case element extraction equipment and case element extraction medium
CN111984989A (en) * 2020-09-01 2020-11-24 上海梅斯医药科技有限公司 Method, device, system and medium for verifying, issuing and accessing URL (uniform resource locator)

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100211484A1 (en) * 2009-02-13 2010-08-19 Centergistic Solutions, Inc. Electronic bankruptcy claims filing system
CN106713336A (en) * 2017-01-03 2017-05-24 厦门法信公证云科技有限公司 Electronic data safekeeping system and method based on double and asymmetric encryption technology
CN207753794U (en) * 2018-01-31 2018-08-21 成都世纪智慧科技有限公司 Electronic evidence-collecting equipment with remote collaboration function
CN108090851A (en) * 2018-02-07 2018-05-29 武汉上点点信息有限公司 A kind of network arbitration movement confirms batch case operation system
CN110109864A (en) * 2019-04-17 2019-08-09 湖北瑞特威网络工程有限公司 Folder document management method based on invisible two-dimensional codes as mark
CN110392043A (en) * 2019-06-21 2019-10-29 法信公证云(厦门)科技有限公司 A kind of method and system for assigning electronic contract notarization and enforcing effect
CN111275399A (en) * 2020-01-20 2020-06-12 北京合信力科技有限公司 Method and device for processing litigation case data
CN111708658A (en) * 2020-06-09 2020-09-25 孟磊 Judicial-assisted case data risk management system and application method thereof
CN111984989A (en) * 2020-09-01 2020-11-24 上海梅斯医药科技有限公司 Method, device, system and medium for verifying, issuing and accessing URL (uniform resource locator)
CN111932413A (en) * 2020-09-14 2020-11-13 平安国际智慧城市科技股份有限公司 Case element extraction method, case element extraction device, case element extraction equipment and case element extraction medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李勋 等;: "司法鉴定报告多人签名技术研究", 电脑知识与技术, vol. 6, no. 25, pages 6959 - 6962 *

Also Published As

Publication number Publication date
CN112613062B (en) 2024-02-09

Similar Documents

Publication Publication Date Title
CN110324143B (en) Data transmission method, electronic device and storage medium
US10904231B2 (en) Encryption using multi-level encryption key derivation
US10374807B2 (en) Storing and retrieving ciphertext in data storage
CN103530201A (en) Safety data repetition removing method and system applicable to backup system
US7392402B2 (en) Method and apparatus for data integration security
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
CN106067874B (en) It is a kind of by the method for data record to server end, terminal and server
US8885826B2 (en) Transmission/reception system, transmission device, reception device, authentication device, user device, method executed by the aforementioned, and program
CN101436208A (en) Ciphertext database privacy protection enquiring method
CN103095452A (en) Random encryption method needing to adopt exhaustion method for deciphering
CN106778292B (en) A kind of quick restoring method of Word encrypted document
CN110851843A (en) Data management method and device based on block chain
CN114640523A (en) Computer data security encryption algorithm and system
CN113660205B (en) Encryption method for software authorization code
US9438429B2 (en) Method for authentication and electronic device for performing the authentication
CN114553557B (en) Key calling method, device, computer equipment and storage medium
CN112613062B (en) Judicial auxiliary case data encryption protection method
CN115909560A (en) Data encryption method, data decryption method and door lock system
CN111414341B (en) Data normalization description method in Internet of things environment
CN112913184B (en) Computing key rotation periods for block cipher based encryption scheme systems and methods
JP2011193161A (en) System and method for encryption control
Ghassabi et al. DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments
CN114374519B (en) Data transmission method, system and equipment
CN110138811B (en) Encryption method for data transmission of Internet of things
WO2023216403A1 (en) Ciphertext restoration method for private set intersection based on homomorphic encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant