CN105975877A - Safe storage method for sensitive file - Google Patents
Safe storage method for sensitive file Download PDFInfo
- Publication number
- CN105975877A CN105975877A CN201610505109.XA CN201610505109A CN105975877A CN 105975877 A CN105975877 A CN 105975877A CN 201610505109 A CN201610505109 A CN 201610505109A CN 105975877 A CN105975877 A CN 105975877A
- Authority
- CN
- China
- Prior art keywords
- file
- data
- user
- data block
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000011218 segmentation Effects 0.000 claims abstract description 31
- 238000012795 verification Methods 0.000 claims description 26
- 238000005192 partition Methods 0.000 claims description 16
- 230000000694 effects Effects 0.000 claims description 7
- 238000013475 authorization Methods 0.000 claims description 4
- 230000015572 biosynthetic process Effects 0.000 claims description 3
- 238000013075 data extraction Methods 0.000 claims description 3
- 239000000203 mixture Substances 0.000 claims description 3
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 4
- 230000006399 behavior Effects 0.000 abstract description 3
- 238000012423 maintenance Methods 0.000 abstract description 3
- 238000007726 management method Methods 0.000 description 25
- 230000006870 function Effects 0.000 description 6
- 239000000284 extract Substances 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000013500 data storage Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000002596 correlated effect Effects 0.000 description 2
- 230000000875 corresponding effect Effects 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011217 control strategy Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000009792 diffusion process Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 239000002773 nucleotide Substances 0.000 description 1
- 125000003729 nucleotide group Chemical group 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a safe storage method for a sensitive file. The safe storage method comprises the following steps: S1, data segmentation is performed on the file; S2, random discretion is performed on data blocks obtained after segmentation; S3, the data blocks obtained after segmentation are stored safely according to discretion addresses; S4, authentication is performed according to the file which a user applies to access to. With the adoption of the safe storage method of the sensitive file, cross-application exchange and port behaviors of certain important sensitive data are effectively monitored in the operation and maintenance process, and disordered and uncontrollable flow of sensitive data is prevented.
Description
Technical field
The present invention relates to information security, be specifically related to a kind of sensitive document and store safely way.
Background technology
Storage mode currently for sensitive document is all to use encipherment protection technology to realize, this skill
The shortcoming of art implementation has: 1) the safeguard protection difficulty of key is big, in key transfer process
Unsafe factor file can be caused to divulge a secret;2) file data body itself or dependence operation are
The file system memory mechanism of system stores, and the safeguard protection of the file system of operating system
The degree of depth Preservation tactics of the means complete refinement of shortage, and the access entrance of file system and technology
Means all standard open, potential safety hazard is many.
Summary of the invention
For drawbacks described above and the problem of prior art, the technical problem to be solved is
The access entrance of existing file system and technological means all standard open, potential safety hazard is many.
In order to achieve the above object, the present invention provides following technical scheme:
A kind of sensitive document stores safely way, comprises the following steps: S1, to file number
According to segmentation: according to file size and configurable data block number, file data body is split,
Forming the data block of predetermined quantity, File header information is as first data block, after segmentation
Data block carries out label, by each data block of unique flowing water ID label this document;S2, point
Cut the Random Discrete of rear data block: the data block of segmentation is carried out hash meter according to hash algorithm
Calculate, obtain the random hash numerical value hash address as this data block of all partition data blocks,
Sensitive document is created the hash address table of partition data block, including hash address and hereof
Serial number, hash address table passes through encrypting storing;After S3, segmentation, data block is according to discretely
Location carries out safe storage: in addition to the partition data block of first serial number, to remaining partition data
Block is encrypted, and encryption key uses the File header information of this document, according to hash address table,
Partition data block after the encryption of each sequence is stored corresponding recording mechanism guided by hash address
In;S4, user access file application and authenticate: the file access application submitting user to, authentication
First module carries out user identity verification, and next carries out the time rule school of user access activity
Test, finally carry out the target file attributes rule verification of user's access, if authentication is passed through, will
Access request for this user performs file data abstraction function, obtains number of files by extracting
According to, submit to this access user.
In technique scheme, in step s 4, the verification of described user identity includes that verification is used
Whether family account and the reliable and verification user department of identity information and post meet mandate rule
Then, the time rule verification of described user access activity includes whether verifying the current access time
Meeting the access time period rule of license, the target file attributes rule verification that user accesses includes
Whether the file size of verification user's access, establishment time, base attribute, document source are being permitted
Can rule access in.
In technique scheme, in step s 4, described file data extracting method is as follows:
After authentication verification, system returns hash address subtabulation key;By hash address table
Secret key decryption hash address table;This document each sequences segmentation bag is obtained by hash address table
Storage hash address;Obtain the storage address of first sequence according to hash address, obtain first
Sequences segmentation data block, i.e. File header information;The second sequence is obtained successively to according to serial number
The segmentation blocks of data of rear sequence, and it is original bright to be decrypted formation with File header information as key
Literary composition block data;Each sequence block data is merged according to sequence order, forms sensitive literary composition
Number of packages evidence.
The invention provides the sensitive document method for secure storing of a kind of discrete safety storage.We
The sensitive document storage method that method proposes be by carrying out sensitive document splitting, discrete after, right
Discrete data slice is encrypted storage again, thus accomplishes the storage safety of file.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below
The accompanying drawing used required in embodiment or description of the prior art will be briefly described, aobvious and
Easily insight, the accompanying drawing in describing below is only some embodiments of the present invention, for this area
From the point of view of those of ordinary skill, on the premise of not paying creative work, it is also possible to according to this
A little accompanying drawings obtain other accompanying drawing.
Fig. 1 is that the user of the present invention accesses file application authorizing procedure figure;
Fig. 2 is the functional structure chart that the sensitive document security management and control of the present invention realizes example.
Detailed description of the invention
Below in conjunction with the accompanying drawing of the present invention, technical scheme is carried out clear, complete
Ground describe, it is clear that described embodiment be only a part of embodiment of the present invention rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not having
Make the every other embodiment obtained under creative work premise, broadly fall into present invention protection
Scope.
Store safely way as a kind of sensitive document shown in embodiment to comprise the following steps:
S1, file is carried out data segmentation: according to file size and configurable data block number pair
File data body is split, and forms the data block of predetermined quantity, and File header information is as first
Individual data block, carries out label, by unique flowing water ID label this article to the data block after segmentation
Each data block of part;
The Random Discrete of data block after S2, segmentation: the data block of segmentation is entered according to hash algorithm
Row hash calculates, and obtains random hash numerical value the dissipating as this data block of all partition data blocks
Column address, creates the hash address table of partition data block to sensitive document, including hash address and
Serial number hereof, hash address table passes through encrypting storing;
After S3, segmentation, data block carries out safe storage according to discrete address: except first serial number
Partition data block outside, remaining partition data block is encrypted, encryption key uses this document
File header information, according to hash address table, partition data block after the encryption of each sequence is stored
In the recording mechanism guided by corresponding hash address;
S4, user access file application and authenticate: the file access application submitting user to, authentication
First module carries out user identity verification, and next carries out the time rule school of user access activity
Test, finally carry out the target file attributes rule verification of user's access, if authentication is passed through, will
Access request for this user performs file data abstraction function, obtains number of files by extracting
According to, submit to this access user.
In step s 4, what user identity verification included verifying user account and identity information can
By and verification user department and post whether meet authorization rule, the time of user access activity
Rule verification includes verifying whether the current access time meets the access time period rule of license,
The target file attributes rule verification that user accesses includes verifying file size, the wound that user accesses
Build time, base attribute, document source whether in the rule of license accesses.
As it is shown in figure 1, in step s 4, file data extracting method is as follows: by authentication
After checking, system returns hash address subtabulation key;By the key solution of hash address table
Close hash address table;The storage being obtained this document each sequences segmentation bag by hash address table is hashed
Address;Obtain the storage address of first sequence according to hash address, obtain First ray segmentation
Data block, i.e. File header information;Obtain the second sequence according to serial number successively and arrive final nucleotide sequence
Segmentation blocks of data, and it is decrypted formation original plaintext block count with File header information as key
According to;Each sequence block data is merged according to sequence order, forms sensitive document data.
The sensitive document security management and control application example that the present invention realizes be implemented as follows Fig. 2:
File interface module receives needs to include in the file of security management and control, by file interface module
Obtain file attribute information and the file body data of file.
File attribute information, including filename, file type, file size, the establishment time,
The owner, by file identification information management Implement of Function Module management.
File identification information in file identification information management accesses door pair by file identification
Outer opening, accesses for user and consults, and which file user checks by this access door, and
The base attribute of file, and application can be checked by this door initiation file content.
File data segmentation module and file data memory module provide respectively according to side of the present invention
Method realize file data segmentation and to segmentation data base according to discrete address table storage ground
Location carries out the function of discrete encryption storage.
File data storage center realizes the All Files data of segmentation storage are unified pipe
Reason, including the consistency maintenance of data, the security maintenance of data, the extraction of data accesses mirror
The functions such as power.
File hash table administrative center is responsible for the hash address table of each file, hash address table
Carrying out asymmetric encryption storage, encryption key is dynamically created by file hash table management center module
Building, the encryption key of establishment is submitted to file discrete key management module and is managed collectively.
The file hash table encryption key unification that file hash table administrative center creates is by hash table
Key management module is managed, key management module to the hash table encryption key of file by mould
Secret algorithm within block carries out digest calculations, is submitted to by calculated summary data
The key that file hash table administrative center encrypts as hash table.And create close with this encryption simultaneously
The decruption key of key pairing, decruption key carries out segmentation storage in key management module.Generate and work as
The data volume of certain file is checked that application obtains authenticating by rear by user, file hash table key
The hash table decruption key of this document can be passed to safely file extraction module and enter by management module
Row file data extracts.
User accesses door by file identification and checks the data of sensitive document and need first to send out
Playing data application, file access authentication module, access authentication module foundation are submitted in data application
In file authorizing management module the user file authorization rule of configuration carry out user is accessed legal
Property authenticate, including user identity legitimacy verify, user department and the authority verification in post,
User accesses the time period and accesses the authorization rule verification of file base attribute information.
By the file data application of authentication, file data extraction module will be submitted to and carry out correspondence
File data extract realize.First data extraction module obtains the Hash table keys of this document and enters
Row hash table is deciphered, and obtains the hash table of this document, then obtains File header information according to hash table,
Extract partition data storehouse from hash table again and be decrypted, then according to sequence of blocks of data order is entered
Row file data assembling reduction obtains complete file data.
Complete file data after assembling, before returning to access user, need to carry out file peace
Full management and control, including the effect duration of file, the access of file and operating right, the network flow of file
Turn authority etc..The authority configuration of security management and control is joined by file security management and control policy management module
Putting, file security management and control module is according to the predetermined management and control strategy in file security management and control policy module
Carry out security management and control.
The invention provides the sensitive document method for secure storing of a kind of discrete safety storage.We
The sensitive document storage method that method proposes be by carrying out sensitive document splitting, discrete after, right
Discrete data slice is encrypted storage again, thus accomplishes the storage safety of file;This method carries
The sensitive document access method gone out be by visitor carried out proof of identity and authority authenticating after,
Obtained the discrete index sequence of file by the tunnel that accesses of secret, and carry out broken according to discrete series
Sheet extracts and reduction, then gives visitor after carrying out data assembling and read.It is quick that the present invention proposes
Sense file safety storage method, has the feature that
The sensitive document method for secure storing that the present invention proposes, has and sensitive document is supplied to one
The individual Fileview identification information management method unrelated with store path.Concrete implementation method is such as
Under:
Sensitive document is supplied to a Fileview identification information management function, for each file
There is provided the basic information management of Fileview mark, including filename, attribute, size, establishment
Time, founder, file source information.
Fileview identification information is externally provided by file identification catalogue door and checks access, mesh
Record door provides the logical directories that can freely create and combine, to realize the logical combination to file
Management.
Fileview identification information includes Documents Logical catalogue, does not the most comprise depositing of file data body
Storage address.The storage address of file data and access mode all cannot pass through file identification information bag
Include Documents Logical directory information to obtain.
The sensitive document method for secure storing that the present invention proposes, has one and departs from Fileview mark
The file data storage of knowledge information and logical directories information and access method.Concrete shows as,
User is by checking that identification information checks the base attribute of file, it is impossible to directly obtain file data
Content, only by data content of presenting a paper check application could by system after authentication specially
Door extracts the data content obtaining this document.
What the present invention proposed carries out the method that safety stores to sensitive data file, compares current
File encrypting method, has the advantages that:
1, the identification information of file is checked and is managed, with the storage position of file data with logical directories
Put to obtain with file data and be kept completely separate so that the access of sensitive document data is safer, visits
Ask that process is more controllable.
2, the storage of file data is by the discrete rear encryption storage of Hash rather than according to behaviour
The standard file system pattern making system carries out file data storage and management so that sensitive data
Storage mode more secret safety.
3, the sensitive document storage method proposed by the present invention so that sensitive document can only lead to
Cross the file access instrument that the present invention is correlated with and carry out file data acquisition such that it is able to effectively management and control
All access behaviors to sensitive document, stop the every other non-file being correlated with through the present invention
The access approach of access tool such that it is able to further expand complete sensitive document on this basis
The safety control measures of access process and file diffusion control measure.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is also
Being not limited to this, any those familiar with the art is at the technology model that the invention discloses
In enclosing, change can be readily occurred in or replace, all should contain within protection scope of the present invention.
Therefore, protection scope of the present invention should described be as the criterion with scope of the claims.
Claims (3)
1. a sensitive document stores safely way, it is characterised in that comprise the following steps:
S1, file is carried out data segmentation: according to file size and configurable data block number to file data
Body is split, and forms the data block of predetermined quantity, and File header information is as first data block, to segmentation
After data block carry out label, by each data block of unique flowing water ID label this document;
The Random Discrete of data block after S2, segmentation: the data block of segmentation is carried out hash meter according to hash algorithm
Calculate, obtain the random hash numerical value hash address as this data block of all partition data blocks, to sensitive literary composition
Part creates the hash address table of partition data block, including hash address and serial number hereof, hash ground
Location table passes through encrypting storing;
After S3, segmentation, data block carries out safe storage according to discrete address: except the segmentation number of first serial number
Outside according to block, being encrypted remaining partition data block, encryption key uses the File header information of this document, presses
According to hash address table, partition data block after the encryption of each sequence is stored corresponding note guided by hash address
In record number;
S4, user access file application authentication: the file access application submitting user to, authentication module is first
Carrying out user identity verification, next carries out the time rule verification of user access activity, finally carries out user's visit
The target file attributes rule verification asked, if authentication is passed through, performs file by the access request for this user
Data extraction function, obtains file data by extracting, submits to this access user.
A kind of sensitive document the most according to claim 1 stores safely way, it is characterised in that in step
In rapid S4, the verification of described user identity includes the reliable and verification user verifying user account and identity information
Whether department and post meet authorization rule, and the time rule verification of described user access activity includes that verification is worked as
Whether the front access time meets the access time period rule of license, the target file attributes rule that user accesses
Verification includes whether verifying the file size of user's access, establishment time, base attribute, document source perhaps
Can rule access in.
A kind of sensitive document the most according to claim 1 stores safely way, it is characterised in that in step
In rapid S4, described file data extracting method is as follows: after authentication verification, and system returns hash address table
Encryption key;By the secret key decryption hash address table of hash address table;It is somebody's turn to do by hash address table
The storage hash address of file each sequences segmentation bag;The storage address of first sequence is obtained according to hash address,
Obtain First ray partition data block, i.e. File header information;The second sequence is obtained successively to according to serial number
The segmentation blocks of data of rear sequence, and it is decrypted formation original plaintext block count with File header information as key
According to;Each sequence block data is merged according to sequence order, forms sensitive document data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610505109.XA CN105975877B (en) | 2016-07-01 | 2016-07-01 | A kind of sensitive document secure storage method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610505109.XA CN105975877B (en) | 2016-07-01 | 2016-07-01 | A kind of sensitive document secure storage method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105975877A true CN105975877A (en) | 2016-09-28 |
CN105975877B CN105975877B (en) | 2019-06-21 |
Family
ID=56953526
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610505109.XA Expired - Fee Related CN105975877B (en) | 2016-07-01 | 2016-07-01 | A kind of sensitive document secure storage method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105975877B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789950A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | Information protecting method, device and terminal |
CN107122678A (en) * | 2017-04-28 | 2017-09-01 | 上海与德科技有限公司 | Protect the method and device of product parameters |
CN107729766A (en) * | 2017-09-30 | 2018-02-23 | 中国联合网络通信集团有限公司 | Date storage method, method for reading data and its system |
CN107908980A (en) * | 2017-10-10 | 2018-04-13 | 芯海科技(深圳)股份有限公司 | A kind of implementation method of memory data encipherment protection |
CN108777685A (en) * | 2018-06-05 | 2018-11-09 | 北京京东金融科技控股有限公司 | Method and apparatus for handling information |
CN109271800A (en) * | 2018-09-19 | 2019-01-25 | 中国银联股份有限公司 | A kind of document handling method and device |
CN109450633A (en) * | 2018-09-25 | 2019-03-08 | 平安科技(深圳)有限公司 | Information encrypts sending method and device, electronic equipment, storage medium |
CN109815710A (en) * | 2018-12-14 | 2019-05-28 | 开放智能机器(上海)有限公司 | A kind of guard method of intelligent algorithm model file |
CN110287716A (en) * | 2019-06-25 | 2019-09-27 | 北京邮电大学 | Date storage method and device |
CN111709040A (en) * | 2020-06-04 | 2020-09-25 | 江苏智先生信息科技有限公司 | Sensitive data oriented secure discrete storage method |
CN111950027A (en) * | 2020-08-21 | 2020-11-17 | 安徽高山科技有限公司 | File sharing method based on block chain intelligent contracts |
CN112016110A (en) * | 2020-09-01 | 2020-12-01 | 三星电子(中国)研发中心 | Method, device, equipment and storage medium for storing data |
CN112214778A (en) * | 2020-10-21 | 2021-01-12 | 上海英方软件股份有限公司 | Method and system for realizing discrete encryption of local file through virtual file |
CN113486374A (en) * | 2021-07-14 | 2021-10-08 | 郑州轻工业大学 | Computer data storage and reading method and system based on cloud computing |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070160198A1 (en) * | 2005-11-18 | 2007-07-12 | Security First Corporation | Secure data parser method and system |
CN103279694A (en) * | 2013-05-31 | 2013-09-04 | 华为技术有限公司 | Loading method, protecting method, loading device and protecting device for file system |
CN103455764A (en) * | 2013-08-27 | 2013-12-18 | 无锡华御信息技术有限公司 | File segmentation and merging technology-based file encryption and decryption systems |
CN103607393A (en) * | 2013-11-21 | 2014-02-26 | 浪潮电子信息产业股份有限公司 | Data safety protection method based on data partitioning |
CN104615954A (en) * | 2014-06-30 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Password storage method and device |
-
2016
- 2016-07-01 CN CN201610505109.XA patent/CN105975877B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070160198A1 (en) * | 2005-11-18 | 2007-07-12 | Security First Corporation | Secure data parser method and system |
CN103279694A (en) * | 2013-05-31 | 2013-09-04 | 华为技术有限公司 | Loading method, protecting method, loading device and protecting device for file system |
CN103455764A (en) * | 2013-08-27 | 2013-12-18 | 无锡华御信息技术有限公司 | File segmentation and merging technology-based file encryption and decryption systems |
CN103607393A (en) * | 2013-11-21 | 2014-02-26 | 浪潮电子信息产业股份有限公司 | Data safety protection method based on data partitioning |
CN104615954A (en) * | 2014-06-30 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Password storage method and device |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789950A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | Information protecting method, device and terminal |
CN107122678A (en) * | 2017-04-28 | 2017-09-01 | 上海与德科技有限公司 | Protect the method and device of product parameters |
CN107729766A (en) * | 2017-09-30 | 2018-02-23 | 中国联合网络通信集团有限公司 | Date storage method, method for reading data and its system |
CN107729766B (en) * | 2017-09-30 | 2020-02-07 | 中国联合网络通信集团有限公司 | Data storage method, data reading method and system thereof |
CN107908980B (en) * | 2017-10-10 | 2021-11-23 | 芯海科技(深圳)股份有限公司 | Method for realizing encryption protection of memory data |
CN107908980A (en) * | 2017-10-10 | 2018-04-13 | 芯海科技(深圳)股份有限公司 | A kind of implementation method of memory data encipherment protection |
CN108777685A (en) * | 2018-06-05 | 2018-11-09 | 北京京东金融科技控股有限公司 | Method and apparatus for handling information |
CN109271800A (en) * | 2018-09-19 | 2019-01-25 | 中国银联股份有限公司 | A kind of document handling method and device |
CN109450633A (en) * | 2018-09-25 | 2019-03-08 | 平安科技(深圳)有限公司 | Information encrypts sending method and device, electronic equipment, storage medium |
CN109450633B (en) * | 2018-09-25 | 2022-10-21 | 平安科技(深圳)有限公司 | Information encryption transmission method and device, electronic equipment and storage medium |
CN109815710A (en) * | 2018-12-14 | 2019-05-28 | 开放智能机器(上海)有限公司 | A kind of guard method of intelligent algorithm model file |
CN110287716A (en) * | 2019-06-25 | 2019-09-27 | 北京邮电大学 | Date storage method and device |
CN110287716B (en) * | 2019-06-25 | 2021-09-14 | 北京邮电大学 | Data storage method and device |
CN111709040A (en) * | 2020-06-04 | 2020-09-25 | 江苏智先生信息科技有限公司 | Sensitive data oriented secure discrete storage method |
CN111950027A (en) * | 2020-08-21 | 2020-11-17 | 安徽高山科技有限公司 | File sharing method based on block chain intelligent contracts |
CN112016110A (en) * | 2020-09-01 | 2020-12-01 | 三星电子(中国)研发中心 | Method, device, equipment and storage medium for storing data |
CN112016110B (en) * | 2020-09-01 | 2023-02-28 | 三星电子(中国)研发中心 | Method, device, equipment and storage medium for storing data |
CN112214778A (en) * | 2020-10-21 | 2021-01-12 | 上海英方软件股份有限公司 | Method and system for realizing discrete encryption of local file through virtual file |
CN113486374A (en) * | 2021-07-14 | 2021-10-08 | 郑州轻工业大学 | Computer data storage and reading method and system based on cloud computing |
Also Published As
Publication number | Publication date |
---|---|
CN105975877B (en) | 2019-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105975877A (en) | Safe storage method for sensitive file | |
CN107483498A (en) | Academic authentication method and system based on block chain | |
EP3547203A1 (en) | Method and system for managing access to personal data by means of an intelligent contract | |
US20180025145A1 (en) | Computer-implemented method for controlling access | |
CN109417478A (en) | Multilink cryptologic block chain | |
CN103310169B (en) | A kind of method protecting SD card data and protection system | |
CN107070938A (en) | Data access control system based on block chain | |
CN110175467A (en) | Signature file store method, device and computer equipment based on block chain | |
CN102422296A (en) | Method for authenticating access to a secured chip by a test device | |
CN103220141B (en) | A kind of protecting sensitive data method and system based on group key strategy | |
CN109753817A (en) | Medical information secure storage scheme based on block chain | |
JPWO2005117336A1 (en) | Parent-child card authentication system | |
CN109858259A (en) | The data protection of community health service alliance and sharing method based on HyperLedger Fabric | |
CN105991650A (en) | Secret key acquisition method and identity card information transmission method and system | |
CN103914662A (en) | Access control method and device of file encrypting system on the basis of partitions | |
US20210142319A1 (en) | Systems and methods for distributed data mapping | |
AU2018256929B2 (en) | Systems and methods for identity atomization and usage | |
CN109379360A (en) | Auditing method, electronic device and computer readable storage medium | |
CN101655893B (en) | Manufacture method of intelligent blog lock, Blog access control method and system thereof | |
CN112102529B (en) | Power facility protection system based on passive intelligent lock and execution process thereof | |
CN109302286A (en) | A kind of generation method of Fido device keys index | |
KR102559101B1 (en) | Power metering apparatus, power metering server and, power metering method base on block chain | |
CN108090371B (en) | Data processing method, data tracking method, data processing device and data tracking device | |
CN106027256A (en) | Identity card reading response system | |
CN116090024A (en) | Reliable data storage device, system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190621 Termination date: 20200701 |