CN105975877A - Safe storage method for sensitive file - Google Patents

Safe storage method for sensitive file Download PDF

Info

Publication number
CN105975877A
CN105975877A CN201610505109.XA CN201610505109A CN105975877A CN 105975877 A CN105975877 A CN 105975877A CN 201610505109 A CN201610505109 A CN 201610505109A CN 105975877 A CN105975877 A CN 105975877A
Authority
CN
China
Prior art keywords
file
data
user
data block
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610505109.XA
Other languages
Chinese (zh)
Other versions
CN105975877B (en
Inventor
王富强
李昕
叶雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing City Branch Co Of China Joint Network Communication Co Ltd
Original Assignee
Chongqing City Branch Co Of China Joint Network Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing City Branch Co Of China Joint Network Communication Co Ltd filed Critical Chongqing City Branch Co Of China Joint Network Communication Co Ltd
Priority to CN201610505109.XA priority Critical patent/CN105975877B/en
Publication of CN105975877A publication Critical patent/CN105975877A/en
Application granted granted Critical
Publication of CN105975877B publication Critical patent/CN105975877B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a safe storage method for a sensitive file. The safe storage method comprises the following steps: S1, data segmentation is performed on the file; S2, random discretion is performed on data blocks obtained after segmentation; S3, the data blocks obtained after segmentation are stored safely according to discretion addresses; S4, authentication is performed according to the file which a user applies to access to. With the adoption of the safe storage method of the sensitive file, cross-application exchange and port behaviors of certain important sensitive data are effectively monitored in the operation and maintenance process, and disordered and uncontrollable flow of sensitive data is prevented.

Description

A kind of sensitive document stores safely way
Technical field
The present invention relates to information security, be specifically related to a kind of sensitive document and store safely way.
Background technology
Storage mode currently for sensitive document is all to use encipherment protection technology to realize, this skill The shortcoming of art implementation has: 1) the safeguard protection difficulty of key is big, in key transfer process Unsafe factor file can be caused to divulge a secret;2) file data body itself or dependence operation are The file system memory mechanism of system stores, and the safeguard protection of the file system of operating system The degree of depth Preservation tactics of the means complete refinement of shortage, and the access entrance of file system and technology Means all standard open, potential safety hazard is many.
Summary of the invention
For drawbacks described above and the problem of prior art, the technical problem to be solved is The access entrance of existing file system and technological means all standard open, potential safety hazard is many.
In order to achieve the above object, the present invention provides following technical scheme:
A kind of sensitive document stores safely way, comprises the following steps: S1, to file number According to segmentation: according to file size and configurable data block number, file data body is split, Forming the data block of predetermined quantity, File header information is as first data block, after segmentation Data block carries out label, by each data block of unique flowing water ID label this document;S2, point Cut the Random Discrete of rear data block: the data block of segmentation is carried out hash meter according to hash algorithm Calculate, obtain the random hash numerical value hash address as this data block of all partition data blocks, Sensitive document is created the hash address table of partition data block, including hash address and hereof Serial number, hash address table passes through encrypting storing;After S3, segmentation, data block is according to discretely Location carries out safe storage: in addition to the partition data block of first serial number, to remaining partition data Block is encrypted, and encryption key uses the File header information of this document, according to hash address table, Partition data block after the encryption of each sequence is stored corresponding recording mechanism guided by hash address In;S4, user access file application and authenticate: the file access application submitting user to, authentication First module carries out user identity verification, and next carries out the time rule school of user access activity Test, finally carry out the target file attributes rule verification of user's access, if authentication is passed through, will Access request for this user performs file data abstraction function, obtains number of files by extracting According to, submit to this access user.
In technique scheme, in step s 4, the verification of described user identity includes that verification is used Whether family account and the reliable and verification user department of identity information and post meet mandate rule Then, the time rule verification of described user access activity includes whether verifying the current access time Meeting the access time period rule of license, the target file attributes rule verification that user accesses includes Whether the file size of verification user's access, establishment time, base attribute, document source are being permitted Can rule access in.
In technique scheme, in step s 4, described file data extracting method is as follows: After authentication verification, system returns hash address subtabulation key;By hash address table Secret key decryption hash address table;This document each sequences segmentation bag is obtained by hash address table Storage hash address;Obtain the storage address of first sequence according to hash address, obtain first Sequences segmentation data block, i.e. File header information;The second sequence is obtained successively to according to serial number The segmentation blocks of data of rear sequence, and it is original bright to be decrypted formation with File header information as key Literary composition block data;Each sequence block data is merged according to sequence order, forms sensitive literary composition Number of packages evidence.
The invention provides the sensitive document method for secure storing of a kind of discrete safety storage.We The sensitive document storage method that method proposes be by carrying out sensitive document splitting, discrete after, right Discrete data slice is encrypted storage again, thus accomplishes the storage safety of file.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below The accompanying drawing used required in embodiment or description of the prior art will be briefly described, aobvious and Easily insight, the accompanying drawing in describing below is only some embodiments of the present invention, for this area From the point of view of those of ordinary skill, on the premise of not paying creative work, it is also possible to according to this A little accompanying drawings obtain other accompanying drawing.
Fig. 1 is that the user of the present invention accesses file application authorizing procedure figure;
Fig. 2 is the functional structure chart that the sensitive document security management and control of the present invention realizes example.
Detailed description of the invention
Below in conjunction with the accompanying drawing of the present invention, technical scheme is carried out clear, complete Ground describe, it is clear that described embodiment be only a part of embodiment of the present invention rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not having Make the every other embodiment obtained under creative work premise, broadly fall into present invention protection Scope.
Store safely way as a kind of sensitive document shown in embodiment to comprise the following steps:
S1, file is carried out data segmentation: according to file size and configurable data block number pair File data body is split, and forms the data block of predetermined quantity, and File header information is as first Individual data block, carries out label, by unique flowing water ID label this article to the data block after segmentation Each data block of part;
The Random Discrete of data block after S2, segmentation: the data block of segmentation is entered according to hash algorithm Row hash calculates, and obtains random hash numerical value the dissipating as this data block of all partition data blocks Column address, creates the hash address table of partition data block to sensitive document, including hash address and Serial number hereof, hash address table passes through encrypting storing;
After S3, segmentation, data block carries out safe storage according to discrete address: except first serial number Partition data block outside, remaining partition data block is encrypted, encryption key uses this document File header information, according to hash address table, partition data block after the encryption of each sequence is stored In the recording mechanism guided by corresponding hash address;
S4, user access file application and authenticate: the file access application submitting user to, authentication First module carries out user identity verification, and next carries out the time rule school of user access activity Test, finally carry out the target file attributes rule verification of user's access, if authentication is passed through, will Access request for this user performs file data abstraction function, obtains number of files by extracting According to, submit to this access user.
In step s 4, what user identity verification included verifying user account and identity information can By and verification user department and post whether meet authorization rule, the time of user access activity Rule verification includes verifying whether the current access time meets the access time period rule of license, The target file attributes rule verification that user accesses includes verifying file size, the wound that user accesses Build time, base attribute, document source whether in the rule of license accesses.
As it is shown in figure 1, in step s 4, file data extracting method is as follows: by authentication After checking, system returns hash address subtabulation key;By the key solution of hash address table Close hash address table;The storage being obtained this document each sequences segmentation bag by hash address table is hashed Address;Obtain the storage address of first sequence according to hash address, obtain First ray segmentation Data block, i.e. File header information;Obtain the second sequence according to serial number successively and arrive final nucleotide sequence Segmentation blocks of data, and it is decrypted formation original plaintext block count with File header information as key According to;Each sequence block data is merged according to sequence order, forms sensitive document data.
The sensitive document security management and control application example that the present invention realizes be implemented as follows Fig. 2:
File interface module receives needs to include in the file of security management and control, by file interface module Obtain file attribute information and the file body data of file.
File attribute information, including filename, file type, file size, the establishment time, The owner, by file identification information management Implement of Function Module management.
File identification information in file identification information management accesses door pair by file identification Outer opening, accesses for user and consults, and which file user checks by this access door, and The base attribute of file, and application can be checked by this door initiation file content.
File data segmentation module and file data memory module provide respectively according to side of the present invention Method realize file data segmentation and to segmentation data base according to discrete address table storage ground Location carries out the function of discrete encryption storage.
File data storage center realizes the All Files data of segmentation storage are unified pipe Reason, including the consistency maintenance of data, the security maintenance of data, the extraction of data accesses mirror The functions such as power.
File hash table administrative center is responsible for the hash address table of each file, hash address table Carrying out asymmetric encryption storage, encryption key is dynamically created by file hash table management center module Building, the encryption key of establishment is submitted to file discrete key management module and is managed collectively.
The file hash table encryption key unification that file hash table administrative center creates is by hash table Key management module is managed, key management module to the hash table encryption key of file by mould Secret algorithm within block carries out digest calculations, is submitted to by calculated summary data The key that file hash table administrative center encrypts as hash table.And create close with this encryption simultaneously The decruption key of key pairing, decruption key carries out segmentation storage in key management module.Generate and work as The data volume of certain file is checked that application obtains authenticating by rear by user, file hash table key The hash table decruption key of this document can be passed to safely file extraction module and enter by management module Row file data extracts.
User accesses door by file identification and checks the data of sensitive document and need first to send out Playing data application, file access authentication module, access authentication module foundation are submitted in data application In file authorizing management module the user file authorization rule of configuration carry out user is accessed legal Property authenticate, including user identity legitimacy verify, user department and the authority verification in post, User accesses the time period and accesses the authorization rule verification of file base attribute information.
By the file data application of authentication, file data extraction module will be submitted to and carry out correspondence File data extract realize.First data extraction module obtains the Hash table keys of this document and enters Row hash table is deciphered, and obtains the hash table of this document, then obtains File header information according to hash table, Extract partition data storehouse from hash table again and be decrypted, then according to sequence of blocks of data order is entered Row file data assembling reduction obtains complete file data.
Complete file data after assembling, before returning to access user, need to carry out file peace Full management and control, including the effect duration of file, the access of file and operating right, the network flow of file Turn authority etc..The authority configuration of security management and control is joined by file security management and control policy management module Putting, file security management and control module is according to the predetermined management and control strategy in file security management and control policy module Carry out security management and control.
The invention provides the sensitive document method for secure storing of a kind of discrete safety storage.We The sensitive document storage method that method proposes be by carrying out sensitive document splitting, discrete after, right Discrete data slice is encrypted storage again, thus accomplishes the storage safety of file;This method carries The sensitive document access method gone out be by visitor carried out proof of identity and authority authenticating after, Obtained the discrete index sequence of file by the tunnel that accesses of secret, and carry out broken according to discrete series Sheet extracts and reduction, then gives visitor after carrying out data assembling and read.It is quick that the present invention proposes Sense file safety storage method, has the feature that
The sensitive document method for secure storing that the present invention proposes, has and sensitive document is supplied to one The individual Fileview identification information management method unrelated with store path.Concrete implementation method is such as Under:
Sensitive document is supplied to a Fileview identification information management function, for each file There is provided the basic information management of Fileview mark, including filename, attribute, size, establishment Time, founder, file source information.
Fileview identification information is externally provided by file identification catalogue door and checks access, mesh Record door provides the logical directories that can freely create and combine, to realize the logical combination to file Management.
Fileview identification information includes Documents Logical catalogue, does not the most comprise depositing of file data body Storage address.The storage address of file data and access mode all cannot pass through file identification information bag Include Documents Logical directory information to obtain.
The sensitive document method for secure storing that the present invention proposes, has one and departs from Fileview mark The file data storage of knowledge information and logical directories information and access method.Concrete shows as, User is by checking that identification information checks the base attribute of file, it is impossible to directly obtain file data Content, only by data content of presenting a paper check application could by system after authentication specially Door extracts the data content obtaining this document.
What the present invention proposed carries out the method that safety stores to sensitive data file, compares current File encrypting method, has the advantages that:
1, the identification information of file is checked and is managed, with the storage position of file data with logical directories Put to obtain with file data and be kept completely separate so that the access of sensitive document data is safer, visits Ask that process is more controllable.
2, the storage of file data is by the discrete rear encryption storage of Hash rather than according to behaviour The standard file system pattern making system carries out file data storage and management so that sensitive data Storage mode more secret safety.
3, the sensitive document storage method proposed by the present invention so that sensitive document can only lead to Cross the file access instrument that the present invention is correlated with and carry out file data acquisition such that it is able to effectively management and control All access behaviors to sensitive document, stop the every other non-file being correlated with through the present invention The access approach of access tool such that it is able to further expand complete sensitive document on this basis The safety control measures of access process and file diffusion control measure.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is also Being not limited to this, any those familiar with the art is at the technology model that the invention discloses In enclosing, change can be readily occurred in or replace, all should contain within protection scope of the present invention. Therefore, protection scope of the present invention should described be as the criterion with scope of the claims.

Claims (3)

1. a sensitive document stores safely way, it is characterised in that comprise the following steps:
S1, file is carried out data segmentation: according to file size and configurable data block number to file data Body is split, and forms the data block of predetermined quantity, and File header information is as first data block, to segmentation After data block carry out label, by each data block of unique flowing water ID label this document;
The Random Discrete of data block after S2, segmentation: the data block of segmentation is carried out hash meter according to hash algorithm Calculate, obtain the random hash numerical value hash address as this data block of all partition data blocks, to sensitive literary composition Part creates the hash address table of partition data block, including hash address and serial number hereof, hash ground Location table passes through encrypting storing;
After S3, segmentation, data block carries out safe storage according to discrete address: except the segmentation number of first serial number Outside according to block, being encrypted remaining partition data block, encryption key uses the File header information of this document, presses According to hash address table, partition data block after the encryption of each sequence is stored corresponding note guided by hash address In record number;
S4, user access file application authentication: the file access application submitting user to, authentication module is first Carrying out user identity verification, next carries out the time rule verification of user access activity, finally carries out user's visit The target file attributes rule verification asked, if authentication is passed through, performs file by the access request for this user Data extraction function, obtains file data by extracting, submits to this access user.
A kind of sensitive document the most according to claim 1 stores safely way, it is characterised in that in step In rapid S4, the verification of described user identity includes the reliable and verification user verifying user account and identity information Whether department and post meet authorization rule, and the time rule verification of described user access activity includes that verification is worked as Whether the front access time meets the access time period rule of license, the target file attributes rule that user accesses Verification includes whether verifying the file size of user's access, establishment time, base attribute, document source perhaps Can rule access in.
A kind of sensitive document the most according to claim 1 stores safely way, it is characterised in that in step In rapid S4, described file data extracting method is as follows: after authentication verification, and system returns hash address table Encryption key;By the secret key decryption hash address table of hash address table;It is somebody's turn to do by hash address table The storage hash address of file each sequences segmentation bag;The storage address of first sequence is obtained according to hash address, Obtain First ray partition data block, i.e. File header information;The second sequence is obtained successively to according to serial number The segmentation blocks of data of rear sequence, and it is decrypted formation original plaintext block count with File header information as key According to;Each sequence block data is merged according to sequence order, forms sensitive document data.
CN201610505109.XA 2016-07-01 2016-07-01 A kind of sensitive document secure storage method Expired - Fee Related CN105975877B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610505109.XA CN105975877B (en) 2016-07-01 2016-07-01 A kind of sensitive document secure storage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610505109.XA CN105975877B (en) 2016-07-01 2016-07-01 A kind of sensitive document secure storage method

Publications (2)

Publication Number Publication Date
CN105975877A true CN105975877A (en) 2016-09-28
CN105975877B CN105975877B (en) 2019-06-21

Family

ID=56953526

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610505109.XA Expired - Fee Related CN105975877B (en) 2016-07-01 2016-07-01 A kind of sensitive document secure storage method

Country Status (1)

Country Link
CN (1) CN105975877B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789950A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Information protecting method, device and terminal
CN107122678A (en) * 2017-04-28 2017-09-01 上海与德科技有限公司 Protect the method and device of product parameters
CN107729766A (en) * 2017-09-30 2018-02-23 中国联合网络通信集团有限公司 Date storage method, method for reading data and its system
CN107908980A (en) * 2017-10-10 2018-04-13 芯海科技(深圳)股份有限公司 A kind of implementation method of memory data encipherment protection
CN108777685A (en) * 2018-06-05 2018-11-09 北京京东金融科技控股有限公司 Method and apparatus for handling information
CN109271800A (en) * 2018-09-19 2019-01-25 中国银联股份有限公司 A kind of document handling method and device
CN109450633A (en) * 2018-09-25 2019-03-08 平安科技(深圳)有限公司 Information encrypts sending method and device, electronic equipment, storage medium
CN109815710A (en) * 2018-12-14 2019-05-28 开放智能机器(上海)有限公司 A kind of guard method of intelligent algorithm model file
CN110287716A (en) * 2019-06-25 2019-09-27 北京邮电大学 Date storage method and device
CN111709040A (en) * 2020-06-04 2020-09-25 江苏智先生信息科技有限公司 Sensitive data oriented secure discrete storage method
CN111950027A (en) * 2020-08-21 2020-11-17 安徽高山科技有限公司 File sharing method based on block chain intelligent contracts
CN112016110A (en) * 2020-09-01 2020-12-01 三星电子(中国)研发中心 Method, device, equipment and storage medium for storing data
CN112214778A (en) * 2020-10-21 2021-01-12 上海英方软件股份有限公司 Method and system for realizing discrete encryption of local file through virtual file
CN113486374A (en) * 2021-07-14 2021-10-08 郑州轻工业大学 Computer data storage and reading method and system based on cloud computing

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070160198A1 (en) * 2005-11-18 2007-07-12 Security First Corporation Secure data parser method and system
CN103279694A (en) * 2013-05-31 2013-09-04 华为技术有限公司 Loading method, protecting method, loading device and protecting device for file system
CN103455764A (en) * 2013-08-27 2013-12-18 无锡华御信息技术有限公司 File segmentation and merging technology-based file encryption and decryption systems
CN103607393A (en) * 2013-11-21 2014-02-26 浪潮电子信息产业股份有限公司 Data safety protection method based on data partitioning
CN104615954A (en) * 2014-06-30 2015-05-13 腾讯科技(深圳)有限公司 Password storage method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070160198A1 (en) * 2005-11-18 2007-07-12 Security First Corporation Secure data parser method and system
CN103279694A (en) * 2013-05-31 2013-09-04 华为技术有限公司 Loading method, protecting method, loading device and protecting device for file system
CN103455764A (en) * 2013-08-27 2013-12-18 无锡华御信息技术有限公司 File segmentation and merging technology-based file encryption and decryption systems
CN103607393A (en) * 2013-11-21 2014-02-26 浪潮电子信息产业股份有限公司 Data safety protection method based on data partitioning
CN104615954A (en) * 2014-06-30 2015-05-13 腾讯科技(深圳)有限公司 Password storage method and device

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789950A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Information protecting method, device and terminal
CN107122678A (en) * 2017-04-28 2017-09-01 上海与德科技有限公司 Protect the method and device of product parameters
CN107729766A (en) * 2017-09-30 2018-02-23 中国联合网络通信集团有限公司 Date storage method, method for reading data and its system
CN107729766B (en) * 2017-09-30 2020-02-07 中国联合网络通信集团有限公司 Data storage method, data reading method and system thereof
CN107908980B (en) * 2017-10-10 2021-11-23 芯海科技(深圳)股份有限公司 Method for realizing encryption protection of memory data
CN107908980A (en) * 2017-10-10 2018-04-13 芯海科技(深圳)股份有限公司 A kind of implementation method of memory data encipherment protection
CN108777685A (en) * 2018-06-05 2018-11-09 北京京东金融科技控股有限公司 Method and apparatus for handling information
CN109271800A (en) * 2018-09-19 2019-01-25 中国银联股份有限公司 A kind of document handling method and device
CN109450633A (en) * 2018-09-25 2019-03-08 平安科技(深圳)有限公司 Information encrypts sending method and device, electronic equipment, storage medium
CN109450633B (en) * 2018-09-25 2022-10-21 平安科技(深圳)有限公司 Information encryption transmission method and device, electronic equipment and storage medium
CN109815710A (en) * 2018-12-14 2019-05-28 开放智能机器(上海)有限公司 A kind of guard method of intelligent algorithm model file
CN110287716A (en) * 2019-06-25 2019-09-27 北京邮电大学 Date storage method and device
CN110287716B (en) * 2019-06-25 2021-09-14 北京邮电大学 Data storage method and device
CN111709040A (en) * 2020-06-04 2020-09-25 江苏智先生信息科技有限公司 Sensitive data oriented secure discrete storage method
CN111950027A (en) * 2020-08-21 2020-11-17 安徽高山科技有限公司 File sharing method based on block chain intelligent contracts
CN112016110A (en) * 2020-09-01 2020-12-01 三星电子(中国)研发中心 Method, device, equipment and storage medium for storing data
CN112016110B (en) * 2020-09-01 2023-02-28 三星电子(中国)研发中心 Method, device, equipment and storage medium for storing data
CN112214778A (en) * 2020-10-21 2021-01-12 上海英方软件股份有限公司 Method and system for realizing discrete encryption of local file through virtual file
CN113486374A (en) * 2021-07-14 2021-10-08 郑州轻工业大学 Computer data storage and reading method and system based on cloud computing

Also Published As

Publication number Publication date
CN105975877B (en) 2019-06-21

Similar Documents

Publication Publication Date Title
CN105975877A (en) Safe storage method for sensitive file
CN107483498A (en) Academic authentication method and system based on block chain
EP3547203A1 (en) Method and system for managing access to personal data by means of an intelligent contract
US20180025145A1 (en) Computer-implemented method for controlling access
CN109417478A (en) Multilink cryptologic block chain
CN103310169B (en) A kind of method protecting SD card data and protection system
CN107070938A (en) Data access control system based on block chain
CN110175467A (en) Signature file store method, device and computer equipment based on block chain
CN102422296A (en) Method for authenticating access to a secured chip by a test device
CN103220141B (en) A kind of protecting sensitive data method and system based on group key strategy
CN109753817A (en) Medical information secure storage scheme based on block chain
JPWO2005117336A1 (en) Parent-child card authentication system
CN109858259A (en) The data protection of community health service alliance and sharing method based on HyperLedger Fabric
CN105991650A (en) Secret key acquisition method and identity card information transmission method and system
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
US20210142319A1 (en) Systems and methods for distributed data mapping
AU2018256929B2 (en) Systems and methods for identity atomization and usage
CN109379360A (en) Auditing method, electronic device and computer readable storage medium
CN101655893B (en) Manufacture method of intelligent blog lock, Blog access control method and system thereof
CN112102529B (en) Power facility protection system based on passive intelligent lock and execution process thereof
CN109302286A (en) A kind of generation method of Fido device keys index
KR102559101B1 (en) Power metering apparatus, power metering server and, power metering method base on block chain
CN108090371B (en) Data processing method, data tracking method, data processing device and data tracking device
CN106027256A (en) Identity card reading response system
CN116090024A (en) Reliable data storage device, system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190621

Termination date: 20200701