CN107919953A - Data notarization method, apparatus, equipment, medium and server - Google Patents

Data notarization method, apparatus, equipment, medium and server Download PDF

Info

Publication number
CN107919953A
CN107919953A CN201711194898.0A CN201711194898A CN107919953A CN 107919953 A CN107919953 A CN 107919953A CN 201711194898 A CN201711194898 A CN 201711194898A CN 107919953 A CN107919953 A CN 107919953A
Authority
CN
China
Prior art keywords
data
hash
default
information
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711194898.0A
Other languages
Chinese (zh)
Inventor
杨逸尘
蒋华超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Long Zheng Network Technology Co Ltd
SHANGHAI BESTONE INFORMATION TECHNOLOGY Co Ltd
Original Assignee
Shanghai Long Zheng Network Technology Co Ltd
SHANGHAI BESTONE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Long Zheng Network Technology Co Ltd, SHANGHAI BESTONE INFORMATION TECHNOLOGY Co Ltd filed Critical Shanghai Long Zheng Network Technology Co Ltd
Priority to CN201711194898.0A priority Critical patent/CN107919953A/en
Publication of CN107919953A publication Critical patent/CN107919953A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of data notarization method, including:Hash computings are carried out to the initial data that needs are notarized according to default a variety of hash algorithms, obtain multigroup hash value of same initial data;Random salt is added according to default mode to multigroup hash value and carries out data obfuscation;Standard time when evidence obtaining is added to the result after data obfuscation stabs and initial data size information;Hash value computing is carried out by default hash algorithm, obtains verification data;The information of all hash algorithms used, random salt information, timestamp information, data size information and verification data are combined with set form, form comparison data;Comparison data is deposited into card comparing with what is prestored, if completely the same, is notarized successfully.Moreover, it relates to a kind of data notarization device, equipment, medium and server.The present invention can effectively prevent from depositing distorting for card data, raising security.

Description

Data notarization method, apparatus, equipment, medium and server
Technical field
The present invention relates to a kind of data notarization method, apparatus, equipment, medium and server.
Background technology
As internet industry develops rapidly, electronic data is more and more wider in the application of judicial domain as evidence, however, In judicial process, the easy seamless modification of electronic data, easy the features such as lossing, as influence, its became the greatest problem of evidence again. At present, common directly consign to data copy of in the market independent deposit the mode that card side preserves and is on the one hand difficult to ensure that data Safety, on the other hand, the data volume of base data replicas may be very big, and it is more to take resource, is unfavorable for the height of deposit system Effectization.Further, since initial data often relates to individual privacy or business secret, party is not intended to initial data by Three people are known.
The content of the invention
It is an object of the invention to overcome disadvantages described above, there is provided a kind of safe and reliable electronic data deposits card scheme.
The first aspect of the application provides a kind of data notarization method, including:
Hash computings are carried out to the initial data that needs are notarized according to default a variety of hash algorithms, obtain same original number According to multigroup hash value;
Random salt is added according to default mode to multigroup hash value and carries out data obfuscation;
Standard time when evidence obtaining is added to the result after data obfuscation stabs and initial data size information;
Hash value computing is carried out by default hash algorithm, obtains verification data;
By the information of all hash algorithms used, random salt information, timestamp information, data size information and verification Data are combined with set form, form comparison data;
Comparison data is deposited into card comparing with what is prestored, if completely the same, is notarized successfully.
Compared with prior art, the present invention carries out a variety of computings formation for electronics initial data and deposits card data, is notarizing When, according to default method when depositing card, the initial data preserved in user's hand is formed into comparison data and deposits card comparing with original, Ensure that data can not tamper.
Further, before the initial data notarized to needs carries out Hash computings, further include original to needing to notarize The step of data are obscured in advance according to predetermined manner.
Further, further include and the step of card data are decrypted according to default algorithm is deposited to original.
Increase further increases number for the final operation for producing data and decryption being encrypted on the basis of above computing According to security.
The second aspect of the application provides a kind of data notarization device, including:
Hash arithmetic elements, for carrying out Hash fortune to the initial data that needs are notarized according to default a variety of hash algorithms Calculate, obtain multigroup hash value of same initial data;
Data obfuscation unit, data obfuscation is carried out for adding random salt according to default mode to multigroup hash value;
Extra cell, standard time stamp and initial data size during for adding evidence obtaining to the result after data obfuscation Information;
Verification unit, for carrying out hash value computing by default hash algorithm, obtains verification data;
Comparison data forms unit, for the information, random salt information, timestamp of all hash algorithms used to be believed Breath, data size information and verification data are combined with set form, form comparison data;
Comparing unit, for comparison data to be deposited card comparing with what is prestored, if completely the same, notarizes successfully.
Further, which further includes pre- obfuscation unit, for carrying out Hash fortune in the initial data notarized to needs Before calculation, the initial data notarized to needs is obscured in advance according to predetermined manner.
Further, which further includes decryption unit, is decrypted for depositing card data to original according to default algorithm.
The third aspect of the application provides a kind of computing device, which includes processor, memory, and processor is with depositing Reservoir establishes communication connection;
Processor, for reading the program in memory, to perform any realization of aforementioned first aspect or first aspect The method that mode provides.
The fourth aspect of the application provides a kind of non-volatile memory medium, is stored in the non-volatile memory medium Program, when which is run by computing device, any implementation of computing device aforementioned first aspect or first aspect The method of offer.
The aspect of the application the 5th provides a kind of server, including the equipment that the foregoing third aspect provides.
Notarization method provided by the invention maintains secrecy data providing and the unrelated third party, and deposit card during preset Polyalgorithm, gradually forms comparison data during notarization according to default algorithm, be effectively ensured deposit card data can not tamper, Meanwhile the side for preserving data does not contact initial data, has fully ensured that the privacy of user.
Brief description of the drawings
Fig. 1 is the flow chart of data notarization method according to an embodiment of the invention.
Fig. 2 is the block diagram of data notarization device according to an embodiment of the invention.
Embodiment
With reference to specific embodiments and the drawings, the present invention will be further described.It is it is understood that described herein Specific embodiment is of the invention just for the sake of explaining, rather than limitation of the invention.In addition, for the ease of describing, in attached drawing only Show part related to the present invention and not all structure or process.
Data according to an embodiment of the invention are introduced first and deposit card method, as shown in Figure 1.
After data providing obtains initial data, first, step S101, randomly chooses from preset hash algorithm storehouse Many algorithms obtain multigroup Hash of same initial data to needing the initial data for depositing card to carry out Hash (hash function) computing Value.Wherein, can include in preset hash algorithm storehouse:Md5, sha1, sha224, sha256, sha384 and sha512 etc. are each The common hash algorithm of kind.
Then, step S102, adds multigroup hash value random random salt and carries out data obfuscation, and recording noise addition position Put and mode.Then, step S103, standard time when evidence obtaining is added to the result after data obfuscation stabs and initial data is big Small information.Then, step S104, a kind of hash algorithm of random selection carry out hash value computings to confusion result, obtain all data The check bit data of information.
External system can further be resisted to depositing card data by modes such as above-mentioned increase Obfuscating Algorithms, increase check bit The statistical analysis of progress reaches reckoning or cracking trajectory effect, and card security is deposited in raising.
Then, step S105, will selectively hash algorithm information, random salt information, timestamp information, size of data believe Breath and verification data are combined with default set form, and formation is deposited card data and preserved.The data preserved at this time are compared to original For beginning data, data volume greatly reduces, and is effectively saved resource.And a series of computing then considerably increases and cracks difficulty, Improve the security for depositing card data.
Selectively, before step S101 is to needing the initial data for depositing card to carry out Hash computings, can also include to needing The step of initial data of card is obscured is deposited, the security of data can be further improved.Similarly, step S105 it Afterwards, it can also be encrypted by asymmetric or symmetric Encryption Algorithm to depositing card data, with further encapsulation of data, increase data Security.
Notarization method according to the present invention is described below.According to an embodiment of the invention, the foregoing machine for depositing card data is preserved Structure can be notary organs.By using this disclosed technology of Hash computings, when data generate, i.e., by foregoing a series of Operation is encrypted, and correlative code numerical value is stored on the related Data Services device by certification.Above step is not right Data providing opens, and thus, for the angle of data providing, belongs to black box for the processing procedure of electronics initial data Mode, user are only responsible for submitting needing to deposit the initial data of card, by depositing card component to the progress computing of electronics initial data and depositing card Operation, generates that final " electronic data DNA " deposits card to electronic data.
When user needs these data as notarization evidence or judicial expertise material, oneself can be retained original Progressively computing to form comparison data, specifically includes default algorithm when data copy is by depositing card:Step S111, is demonstrate,proved according to depositing During a variety of hash algorithms for selecting Hash computings are carried out to the initial data that needs are notarized, obtain the more of same initial data Group hash value;
Then, step S112, adds random salt and carries out data obfuscation in the way of being recorded to multigroup hash value when card is deposited. Then, step S113, standard time when evidence obtaining is added to the result after data obfuscation stabs and initial data size information.With Afterwards, step S114, the hash algorithm that by depositing card when selects carry out hash value computings to confusion result, obtain all data messages Check bit data.
Then, step S115, by hash algorithm information, random salt information, timestamp information, data size information and school Default set form is combined when testing data to deposit card, forms comparison data.
Then, step S116, which is compared with the card data of depositing to prestore, if completely the same, is illustrated The base data replicas retained in user's hand is identical with the initial data for depositing card at that time, not by any modification, notarizes successfully; If comparison result is inconsistent, illustrate that data in user's hand deposit that card data are different, and notarization fails from original.
If having carried out data when depositing card in advance to obscure, in step S111 to needing the initial data for depositing card to carry out Hash computings Before, it should also include the security that data to the step of needing to deposit the initial data of card to be obscured in advance, can be further improved. Similarly, if having carried out depositing the encryption of card data when depositing card, after step S115, card data should be also deposited to original according to pre- If algorithm be decrypted, followed by comparison.
The present invention for electronics initial data carries out a variety of computings and is formed to deposit card data, in notarization, according to pre- when depositing card If method, the initial data preserved in user's hand is formed into comparison data and original and deposits card comparing, ensure that data not Can tamper.Whole process is all closing to data providing and the unrelated third party, effectively prevents data providing malice and usurps Change the possibility for depositing card data.
According to another embodiment of the invention, a kind of data notarization device is additionally provided, its structure is as shown in Fig. 2, bag Include Hash arithmetic elements 1, data obfuscation unit 2, extra cell 3, verification unit 4, comparison data and form unit 5 and comparing unit 6。
Wherein, Hash arithmetic elements 1 be used for from according to default a variety of hash algorithms to the initial data notarized of needs into Row Hash computings, obtain multigroup hash value of same initial data.Data obfuscation unit 2 be used for multigroup hash value according to Default mode adds random salt and carries out data obfuscation.When extra cell 3 is for adding the result after data obfuscation evidence obtaining Standard time stabs and initial data size information.Verification unit 4 was used for by default hash algorithm to the additional standard time Confusion result after stamp and initial data size information carries out hash value computing, obtains verification data.Comparison data forms list Member 5, for the hash algorithm information, random salt information, timestamp information, data size information and verification data to be consolidated Determine format combination, form comparison data.Comparing unit 6, for the comparison data to be deposited card comparing with what is prestored, if complete It is complete consistent, then notarize successfully.
Selectively, which can also include pre- obfuscation unit and decryption unit, and pre- obfuscation unit is used for needing Before the initial data of notarization carries out Hash computings, the initial data notarized to needs is obscured.Decryption unit is used to deposit original Card data are decrypted according to default algorithm.
According to another embodiment of the invention, a kind of computing device, including processor and memory are additionally provided, is handled Device and memory establish communication connection, processor, for reading the program in memory, to perform the data notarization side in Fig. 1 Method.
According to another embodiment of the invention, a kind of server, including aforementioned computing device are additionally provided.
According to another embodiment of the invention, a kind of non-volatile memory medium is additionally provided, non-volatile memories are situated between Program is stored in matter, when which is run by computing device, the data notarization method in computing device Fig. 1.
The data transmission system developed can be linked into each required by the present invention by the Data entries of customization Application scenarios in, such as the relevant entrance of any data creation of wechat, webpage etc., have sizable applicability and Operability.By encrypted transmission device, the depositing card data after processing are uploaded to and are stored by the server of certification, When client needs, the related data before being transferred by system, and comparison data is produced through similarly calculation process, logarithm will be compared It is compared according to card data are deposited with original, the data for proving to transfer if very consistent are not tampered with or change, and are effective Initial data.
The whole process of the present invention is all closing to data providing and the unrelated third party, ensure that evidence obtaining environment and deposits The spatter property of card process, while effectively prevent the possibility that data providing malice distorts notarial data.And a side of data is preserved, Such as notary organs, initial data is not contacted, can fully ensure that the privacy of user.
The embodiment of the present invention is elaborated above in conjunction with attached drawing, but the use of technical solution of the present invention is not only The various applications referred in this patent embodiment are confined to, various structures and modification can refer to technical solution of the present invention easily Ground is implemented, to reach various beneficial effects mentioned in this article.Within the knowledge of a person skilled in the art, The various change made on the premise of present inventive concept is not departed from, should all belong to patent covering scope of the present invention.

Claims (9)

  1. A kind of 1. data notarization method, it is characterised in that including:
    Hash computings are carried out to the initial data that needs are notarized according to default a variety of hash algorithms, obtain same initial data Multigroup hash value;
    Random salt is added according to default mode to multigroup hash value and carries out data obfuscation;
    Standard time when evidence obtaining is added to the result after data obfuscation stabs and initial data size information;
    Hash value computing is carried out by default hash algorithm, obtains verification data;
    By the information of all hash algorithms used, random salt information, timestamp information, data size information and verification data Combined with set form, form comparison data;
    The comparison data is deposited into card comparing with what is prestored, if completely the same, is notarized successfully.
  2. 2. data notarization method according to claim 1, it is characterised in that to it is described need the initial data notarized into Before row Hash computings, the step of being obscured in advance according to predetermined manner the initial data for needing to notarize is further included.
  3. 3. data notarization method according to claim 1, it is characterised in that further include and card data are deposited to original according to default The step of algorithm is decrypted.
  4. A kind of 4. data notarization device, it is characterised in that including:
    Hash arithmetic elements, for carrying out Hash computings to the initial data that needs are notarized according to default a variety of hash algorithms, Obtain multigroup hash value of same initial data;
    Data obfuscation unit, data obfuscation is carried out for adding random salt according to default mode to multigroup hash value;
    Extra cell, standard time stamp and initial data size letter during for adding evidence obtaining to the result after data obfuscation Breath;
    Verification unit, for carrying out hash value computing by default hash algorithm, obtains verification data;
    Comparison data forms unit, for by the information of all hash algorithms used, random salt information, timestamp information, number Combined according to size information and verification data with set form, form comparison data;
    Comparing unit, for the comparison data to be deposited card comparing with what is prestored, if completely the same, notarizes successfully.
  5. 5. data notarization device according to claim 4, it is characterised in that pre- obfuscation unit is further included, for institute Before the initial data that stating needs to notarize carries out Hash computings, the initial data for needing to notarize is carried out in advance according to predetermined manner Obscure.
  6. 6. data notarization device according to claim 4, it is characterised in that decryption unit is further included, for depositing card to original Data are decrypted according to default algorithm.
  7. 7. a kind of computing device, it is characterised in that including processor, memory, the processor is established logical with the memory Letter connection;
    The processor, for reading the program in the memory, to perform such as claim 1-3 any one of them sides Method.
  8. 8. a kind of non-volatile memory medium, it is characterised in that store program in the non-volatile memory medium, the program When being run by computing device, method of the computing device as any one of claim 1-3.
  9. 9. a kind of server, it is characterised in that including equipment as claimed in claim 7.
CN201711194898.0A 2017-11-24 2017-11-24 Data notarization method, apparatus, equipment, medium and server Pending CN107919953A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711194898.0A CN107919953A (en) 2017-11-24 2017-11-24 Data notarization method, apparatus, equipment, medium and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711194898.0A CN107919953A (en) 2017-11-24 2017-11-24 Data notarization method, apparatus, equipment, medium and server

Publications (1)

Publication Number Publication Date
CN107919953A true CN107919953A (en) 2018-04-17

Family

ID=61896896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711194898.0A Pending CN107919953A (en) 2017-11-24 2017-11-24 Data notarization method, apparatus, equipment, medium and server

Country Status (1)

Country Link
CN (1) CN107919953A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639436A (en) * 2019-01-04 2019-04-16 平安科技(深圳)有限公司 The data property held verification method and terminal device based on salt figure
WO2020006998A1 (en) * 2018-12-25 2020-01-09 钟杰东 Information notarisation management system and management method therefor

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475664A (en) * 2013-09-18 2013-12-25 北京工业大学 Credible extraction method for digital evidence of Android
CN105262589A (en) * 2014-07-16 2016-01-20 阿里巴巴集团控股有限公司 Data security check method and apparatus and check device
CN105260677A (en) * 2015-10-28 2016-01-20 南京邮电大学 Multiple-attribute-based electronic data fixing system and method
US20170060936A1 (en) * 2015-08-26 2017-03-02 Ultralight Technologies Inc. Monitoring alignment of computer file states across a group of users
CN106685640A (en) * 2016-12-15 2017-05-17 周影 Generating method of electronic evidence fixed information and electronic evidence fixed server
CN106713297A (en) * 2016-12-15 2017-05-24 周影 Electronic data fixing platform based on cloud service
CN106790250A (en) * 2017-01-24 2017-05-31 郝孟 Data processing, encryption, integrity checking method and authentication identifying method and system
CN107171787A (en) * 2017-06-08 2017-09-15 杭州云证网络科技有限公司 A kind of blind label of data based on multiple hash algorithm deposit card method and system
CN107256243A (en) * 2017-05-31 2017-10-17 杭州云证网络科技有限公司 A kind of data access card method and its device based on multiple hash algorithm
CN107273514A (en) * 2017-06-21 2017-10-20 杭州云证网络科技有限公司 A kind of inspection method and application its inspect subsystem and data deposit signed certificate administration chain-circuit system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475664A (en) * 2013-09-18 2013-12-25 北京工业大学 Credible extraction method for digital evidence of Android
CN105262589A (en) * 2014-07-16 2016-01-20 阿里巴巴集团控股有限公司 Data security check method and apparatus and check device
US20170060936A1 (en) * 2015-08-26 2017-03-02 Ultralight Technologies Inc. Monitoring alignment of computer file states across a group of users
CN105260677A (en) * 2015-10-28 2016-01-20 南京邮电大学 Multiple-attribute-based electronic data fixing system and method
CN106685640A (en) * 2016-12-15 2017-05-17 周影 Generating method of electronic evidence fixed information and electronic evidence fixed server
CN106713297A (en) * 2016-12-15 2017-05-24 周影 Electronic data fixing platform based on cloud service
CN106790250A (en) * 2017-01-24 2017-05-31 郝孟 Data processing, encryption, integrity checking method and authentication identifying method and system
CN107256243A (en) * 2017-05-31 2017-10-17 杭州云证网络科技有限公司 A kind of data access card method and its device based on multiple hash algorithm
CN107171787A (en) * 2017-06-08 2017-09-15 杭州云证网络科技有限公司 A kind of blind label of data based on multiple hash algorithm deposit card method and system
CN107273514A (en) * 2017-06-21 2017-10-20 杭州云证网络科技有限公司 A kind of inspection method and application its inspect subsystem and data deposit signed certificate administration chain-circuit system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020006998A1 (en) * 2018-12-25 2020-01-09 钟杰东 Information notarisation management system and management method therefor
CN109639436A (en) * 2019-01-04 2019-04-16 平安科技(深圳)有限公司 The data property held verification method and terminal device based on salt figure

Similar Documents

Publication Publication Date Title
JP7454035B2 (en) Methods and systems implemented by blockchain
Kaaniche et al. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
Gupta et al. Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions
Gupta et al. Layer-based privacy and security architecture for cloud data sharing
CN110881063B (en) Storage method, device, equipment and medium of private data
US9372987B1 (en) Apparatus and method for masking a real user controlling synthetic identities
US20180262326A1 (en) Protecting white-box feistel network implementation against fault attack
CN113691502B (en) Communication method, device, gateway server, client and storage medium
CN106888081B (en) Wide coding of intermediate values within white-box implementations
CN107426165A (en) A kind of bidirectional safe cloud storage data integrity detection method for supporting key updating
US11489660B2 (en) Re-encrypting data on a hash chain
CN109040134A (en) A kind of design method and relevant apparatus of information encryption
CN116318617A (en) Medical rescue material charity donation method based on RFID and blockchain
CN107919953A (en) Data notarization method, apparatus, equipment, medium and server
CN114499875A (en) Service data processing method and device, computer equipment and storage medium
CN107026729B (en) Method and device for transmitting software
CN116049802B (en) Application single sign-on method, system, computer equipment and storage medium
CN111475690A (en) Character string matching method and device, data detection method and server
Zhou et al. VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things
Degambur et al. A Study of Security Impacts and Cryptographic Techniques in Cloud-based e-Learning Technologies
CN108011710A (en) Data deposit card method, apparatus, equipment, medium and server
Ulybyshev Data Protection in Transit and at Rest with Leakage Detection
CN115664852B (en) Data management method and system based on block chain technology
Guziur et al. Light blockchain communication protocol for secure data transfer integrity
Nugroho et al. Pseudonym-based privacy protection for steppy application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180417

RJ01 Rejection of invention patent application after publication