Announcement

Collapse
No announcement yet.

Details on PDF validation

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Details on PDF validation

    PDF files exported from RMS can be validated by uploading them back to RMS to confirm validity. If the PDF is editied in any way the 'validaton' fails if sucessful it gives the ok and confirms the unique doc ID.

    A customer has requested some more technical details on this process in terms of IT security / data integrity? Can you give any more details?

    Thanks

  • #2
    Hello, as I know, from an IT security and data integrity perspective, this process typically involves the following components:
    • Hashing: The system generates a unique digital fingerprint, known as a hash, for each PDF document. This hash is calculated using a cryptographic algorithm (such as MD5, SHA-256, etc.) and is based on the contents of the document. Even a minor change in the document's content will result in a different hash value.
    • Validation Process: When the PDF file is uploaded back to the system, the system recalculates the hash of the uploaded document and compares it with the initially generated hash. If the two hash values match, it indicates that the document has not been modified since it was exported. If the hash values differ, it means that the document has been edited or tampered with.
    • Secure Transmission: It is crucial to ensure the secure transmission of the PDF files during the export and upload process. This typically involves using secure protocols such as HTTPS or SFTP to encrypt the data in transit, preventing unauthorized access or tampering during transmission.
    • Access Controls: To maintain data integrity, it is important to have appropriate access controls in place. Only authorized individuals should have the ability to export or upload documents. Role-based access control (RBAC) mechanisms and user authentication can help enforce these access controls.
    • Audit Trail: It is recommended to maintain an audit trail of all document exports and validations. This allows for tracking and monitoring of activities related to the documents, providing an additional layer of security and accountability.
    Last edited by joelmendoza; 07-11-2023, 00:24.

    Comment


    • #3
      In terms of IT security and data integrity, more technical details may be needed to satisfy a customer's request.

      Comment

      Working...
      X