CN108363929B - System and method for generating information elimination report of storage device and preventing tampering - Google Patents

System and method for generating information elimination report of storage device and preventing tampering Download PDF

Info

Publication number
CN108363929B
CN108363929B CN201810134242.8A CN201810134242A CN108363929B CN 108363929 B CN108363929 B CN 108363929B CN 201810134242 A CN201810134242 A CN 201810134242A CN 108363929 B CN108363929 B CN 108363929B
Authority
CN
China
Prior art keywords
report
message
signature
storage device
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810134242.8A
Other languages
Chinese (zh)
Other versions
CN108363929A (en
Inventor
许瑞本
艾歆
邓本瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xuneng Information Technology Co ltd
Original Assignee
Guangzhou Xuneng Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xuneng Information Technology Co ltd filed Critical Guangzhou Xuneng Information Technology Co ltd
Priority to CN201810134242.8A priority Critical patent/CN108363929B/en
Publication of CN108363929A publication Critical patent/CN108363929A/en
Application granted granted Critical
Publication of CN108363929B publication Critical patent/CN108363929B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a system and a method for generating a storage device information elimination report and preventing falsification, wherein the system comprises a report generating module, a report generating module and a report generating module, wherein the report generating module is used for generating a falsification prevention report by using a plurality of levels of report embeds and unique abstract messages corresponding to the levels; the digital signature module is used for acquiring a global unique address code and carrying out encryption signature; and the biological characteristic identification module is used for biological characteristics. The method has the advantages that the multi-level anti-tampering report is obtained by combining the unique corresponding abstract message and the JSON report, wherein the corresponding abstract message is naturally inconsistent with the original embedded abstract message when any level is tampered as long as data change occurs.

Description

System and method for generating information elimination report of storage device and preventing tampering
Technical Field
The present invention relates to a system and a method for eliminating storage information in the field of computers, and more particularly, to a system and a method for generating an information elimination report of a storage device and preventing tampering.
Background
With the development and scale-up of computer and communication technologies, a large amount of electronic data needs to be stored and managed efficiently and reliably, and storage devices are storage carriers of electronic information. The information elimination of expired data information or non-public data information is an important ring in the electronic data management work.
In the process of erasing information from the storage device, information such as basic information, a read-write log, an erasing procedure, and time for executing erasing of the storage device needs to be summarized to form an information erasing report. The existing information elimination tool has the following defects in the method for generating the information elimination report and auditing and managing:
1. there is no valid verification of the operator who generated the report.
2. There is no valid verification of the cancellation device that generated the report.
3. There is no valid verification of the time at which the report was generated.
4. There is no effective tamper-proof protection and verification of the content of the generated report.
Disclosure of Invention
In order to solve the problems of the prior art, the present invention aims to provide a system and a method for generating a storage device information erasure report, which effectively prevent the erasure report from being tampered and effectively verify both the personnel and the device of the erasure operation.
The invention relates to a system for eliminating report generation and preventing falsification of storage equipment information, which comprises:
the report generation module is used for collecting and recording information data in the information elimination process and generating an anti-tampering report by using the embedded multi-level report and the unique abstract information corresponding to each level;
the digital signature module is used for acquiring the global unique address code, inputting the global unique address code into the report generating module, carrying out encryption signature on data specified by the report generating module and feeding back the content of the encryption signature to the report generating module;
and the biological characteristic identification module is used for acquiring the biological characteristics of the operator and feeding back the information of the operator to the report generation module.
Preferably, the digital signature module uses an asymmetric data encryption engine to refer to a private key to carry out encrypted signature on the specified data.
Preferably, the report generating module firstly generates a source report after collecting and recording information data, then outputs a first digest message uniquely corresponding to the source report, and encrypts and signs the first digest message as an encrypted message by using the digital signature module; then writing the encrypted message into the source report to obtain a signature report, and outputting a unique corresponding second abstract message to the signature report; and finally writing the second abstract message into the signature report to obtain the tamper-proof report.
Preferably, the report generation module outputs the summary message corresponding to each report by using a Hash algorithm.
Preferably, the source report, the signature report and the tamper-proof report are in a JSON format.
Preferably, the storage device information elimination report generation and tamper-proofing system writes the tamper-proofing report into the designated location of the corresponding monolithic storage device.
Preferably, the system for generating the storage device information removal report and preventing falsification further includes an auditing module, configured to perform level-by-level auditing on the tamper-resistant report.
Preferably, the audit module reads the tamper-proof report at the designated position of the corresponding single storage device, and splits the report into a signature report and a second abstract message; performing first verification, and comparing the unique abstract message of the signature report with the second abstract message, wherein the full text of the abstract message is consistent and passes the verification; splitting the signed report into a source report and an encrypted message; carrying out second verification, calculating the unique abstract message of the source report, and carrying out full text verification on the unique abstract message and the encrypted abstract message after decryption, wherein the full text is consistent as passing the verification; performing third verification, and performing consistency verification on the recorded single storage device basic information analyzed from the source report and the current audited single storage device basic information; and the audit is finished after the third check is passed.
A method of eliminating report generation and report generation for a tamper resistant system based on the storage device information, comprising the steps of:
s11, performing information elimination on the monomer storage equipment and collecting and recording information data in the information elimination process;
s12, generating a source report in a JSON format, wherein the source report comprises a timestamp, a UUID and operator information;
s13, outputting a first digest message which is uniquely corresponding to the source report by using a Hash algorithm, and using an asymmetric data encryption engine to quote a private key to encrypt and sign the first digest message to obtain an encrypted message;
s14, writing the encrypted message into the source report to obtain a signature report;
s15, outputting a second unique digest message to the signature report by using a Hash algorithm;
s16, writing the second abstract message into the signature report to obtain an anti-tampering report;
and S17, writing the anti-tampering report into the designated position of the monomer storage device.
An audit analysis method based on the storage device information elimination report generation and tamper-proofing method comprises the following steps:
s21, reading the anti-tampering report at the appointed position of the single storage device;
s22, splitting the tamper-proof report into a signature report and a second digest message;
s23, carrying out first verification: calculating the unique abstract message of the signature report by using a Hash algorithm, and comparing the unique abstract message with the second abstract message, wherein the full text of the abstract messages is consistent and passes the verification;
s24, splitting the signature report into a source report and an encrypted message;
s25, carrying out second verification: calculating the unique abstract message of the source report by using a Hash algorithm, and carrying out full-text verification on the unique abstract message and the encrypted abstract message after decryption, wherein the full-text is consistent as passing the verification;
s26, carrying out third check: analyzing the recorded basic information of the single storage equipment from the source report, carrying out consistency check on the basic information of the single storage equipment which is currently audited, and carrying out the next step after the check is passed;
and S27, analyzing the source report to obtain correct operator information, timestamp and UUID.
The system and the method for generating the information elimination report of the storage device and preventing the falsification have the advantages that the multi-level anti-falsification report is obtained by combining the unique corresponding abstract message and the JSON report, and the corresponding abstract message is naturally inconsistent with the original embedded abstract message as long as any level is falsified due to data change. And the summary message of one level is taken as an encrypted object, is encrypted and signed by the digital signature module and then is inserted into the corresponding report, so that the possibility that the data is cracked one by one level is avoided. The information of the operator who carries out the elimination operation, the timestamp and the UUID can be recorded in one anti-tampering report at one time, and the single storage equipment with the eliminated information can be effectively managed and audited. And finally, writing the generated anti-tampering report into a position appointed by the single storage device, and since the appointed position is not externally disclosed, the technical effect of hiding is generated from the initial step of tampering, and the anti-tampering effect is further improved.
Drawings
FIG. 1 is a schematic diagram of a storage device information elimination report generation and tamper-resistant system according to the present invention;
FIG. 2 is a report generation flow diagram of a storage device information elimination report generation and tamper resistance method of the present invention;
FIG. 3 is an audit trail flow diagram of a storage device information elimination report generation and tamper resistance method according to the present invention.
Detailed Description
As shown in fig. 1, the system for generating a storage device information erasure report and preventing tampering according to the present invention includes an erasure device 100 for directly performing an information erasure operation on a monolithic storage device 200, where the erasure device 100 further includes a report generation module 101, a digital signature module 102, a biometric identification module 103, and an audit module 104.
The report generation module 101 firstly generates a source report after collecting and recording information data, then outputs a first digest message uniquely corresponding to the source report, and encrypts and signs the first digest message as an encrypted message by using the digital signature module 102; then writing the encrypted message into the source report to obtain a signature report, and outputting a unique corresponding second abstract message to the signature report; and finally writing the second abstract message into the signature report to obtain the tamper-proof report. The digital signature module 102 obtains a Universally unique address code (UUID) belonging to the cancellation device 100 and inputs the UUID into the cancellation device 100. When the report generation module 101 needs to perform encryption signature on the specified data, the operation is completed by using the RSA reference private key of the asymmetric data encryption engine. Finally, the erasing device 100 writes the tamper-resistant report into the designated location of the corresponding single storage device 200, and the whole complete tamper-resistant report generation process is completed.
The biological characteristics collected by the biological characteristic recognition module 103 include, but are not limited to, fingerprints and face information, and the biological characteristics of the operator are collected and stored before the biological characteristic recognition module 103 is activated.
When the single storage device 200 needs to be audited, the auditing module 104 reads the tamper-proof report at the designated position of the corresponding single storage device 200, and splits the report into a signature report and a second abstract message. And performing first verification, and comparing the unique abstract message of the signature report with the second abstract message, wherein the full text of the abstract message is verified to be passed. And splitting the signature report into a source report and an encrypted message, performing second verification, calculating the unique abstract message of the source report, and performing full text verification on the unique abstract message and the encrypted abstract message after decryption, wherein the full text is consistent as the verification passes. Performing third verification, and performing consistency verification on the recorded single storage device 200 basic information analyzed from the source report and the currently audited single storage device 200 basic information; and the audit is finished after the third check is passed.
The working principle and the generating/auditing method of the storage device information elimination report generating and tamper-proofing system are shown in fig. 2 and 3.
When generating the tamper-proof report, the following steps are performed:
s11, performing information elimination on the monomer storage device 200 and collecting and recording information data of the information elimination process;
s12, generating a source report J1 in JSON format, wherein the source report J comprises a timestamp, a UUID and operator information;
s13, outputting a first unique digest message Z1 to the source report J1 by using a Hash algorithm, and using an asymmetric data encryption engine to quote a private key to encrypt and sign the first digest message Z1 to obtain an encrypted message Z1 m;
s14, writing the encrypted message Z1m into the source report J1 to obtain a signed report J2;
s15, outputting a unique corresponding second digest message Z2 to the signature report J2 by utilizing a Hash algorithm;
s16, writing the second digest message Z2 into the signature report J2 to obtain a tamper-proof report J3;
s17, writing the anti-tampering report J3 into the specified position of the single storage device 200; the whole generation flow of the tamper-proof report J3 is completed.
When the content of the tamper-proof report J3 in the monolithic storage device 200 needs to be audited and parsed, the following steps are performed:
s21, reading the anti-tampering report J3 at the designated position of the single storage device 200;
s22, splitting the tamper-resistant report J3 into a signature report J2 and a second digest message Z2;
s23, carrying out first verification: calculating the unique abstract message of the signature report J2 by using a Hash algorithm, and comparing the unique abstract message with a second abstract message Z2, wherein the full-text of the abstract messages are consistent and pass the verification;
s24, splitting the signature report J2 into a source report J1 and an encrypted message Z1 m;
s25, carrying out second verification: calculating the unique abstract message of the source report J1 by using a Hash algorithm, and carrying out full-text check on the unique abstract message and the abstract message decrypted by the encrypted message Z1m, wherein the full-text is consistent and passes the check;
the decryption process is to read out the public key from the digital signature module 102, decrypt the encrypted message Z1m by using the asymmetric data encryption algorithm used in generating the report, and output the decrypted digest information.
S26, carrying out third verification: analyzing the recorded basic information of the single storage device 200 from the source report J1, performing consistency check on the recorded basic information of the single storage device 200 and the basic information of the currently audited single storage device 200, and performing the next step after the check is passed;
and S27, finally, after passing the three tests, performing final analysis on the source report J1 to obtain correct complete information recorded previously, such as operator information, a timestamp, a UUID and the like, and completing the audit analysis process of the whole anti-tampering report.
It will be apparent to those skilled in the art that various other changes and modifications may be made in the above-described embodiments and concepts and all such changes and modifications are intended to be within the scope of the appended claims.

Claims (9)

1. A storage device information elimination report generation and tamper-proofing system, comprising:
the report generation module (101) is used for collecting and recording information data in the information elimination process, and generating an anti-tampering report by using a summary message which is embedded in the multi-level report and has uniqueness corresponding to each level;
after a multi-level report is embedded into information data collected and recorded by a report generating module (101), a source report comprising a timestamp, a globally unique address code UUID and operator information is generated firstly, then a first summary message which is uniquely corresponding to the source report is output, and a digital signature module (102) is used for carrying out encryption and signature on the first summary message to obtain an encrypted message; then writing the encrypted message into the source report to obtain a signature report, and outputting a unique corresponding second abstract message to the signature report; finally, writing the second abstract message into the signature report to obtain an anti-tampering report;
the digital signature module (102) is used for acquiring the UUID of the globally unique address code of the eliminating equipment, inputting the UUID into the report generating module (101), carrying out encryption signature on data specified by the report generating module (101) and feeding back the content of the encryption signature to the report generating module (101);
and the biological characteristic identification module (103) is used for acquiring the biological characteristics of the operator and feeding back the operator information to the report generation module (101).
2. The storage device information elimination report generation and tamper resistance system of claim 1, wherein said digital signature module (102) cryptographically signs the specified data using an asymmetric data encryption engine reference private key.
3. The system for eliminating report generation and tamper resistance for storage device information as claimed in claim 1, wherein said report generation module (101) outputs a digest message corresponding to each report by using a Hash algorithm.
4. The storage device information elimination report generation and tamper-proofing system of claim 1, wherein said source report, signature report, and tamper-proofing report are in JSON format.
5. The storage device information elimination report generation and tamper-proofing system according to claim 1, characterized in that the tamper-proofing report is written in a designated location of the corresponding monolithic storage device (200).
6. The storage device information elimination report generation and tamper-proofing system of claim 1, further comprising an audit module (104) for performing a level-by-level audit of tamper-proofing reports.
7. The system for eliminating report generation and tamper resistance of storage device information according to claim 6, wherein the audit module (104) reads the tamper resistance report at the designated location of the corresponding monolithic storage device (200) and splits the report into a signature report and a second digest message; performing first verification, and comparing the unique abstract message of the signature report with the second abstract message, wherein the full text of the abstract message is consistent and passes the verification; splitting the signed report into a source report and an encrypted message; carrying out second verification, calculating the unique abstract message of the source report, and carrying out full text verification on the unique abstract message and the encrypted abstract message after decryption, wherein the full text is consistent as passing the verification; thirdly, checking, and performing consistency check on the recorded basic information of the single storage equipment (200) analyzed from the source report and the current basic information of the audited single storage equipment (200); and the audit is finished after the third check is passed.
8. The method of storing a device information elimination report generation and tamper-proofing system of any of claims 1-7, comprising the steps of:
s11, eliminating information of the single storage device (200) and collecting and recording information data of the information elimination process;
s12, generating a source report in a JSON format, wherein the source report comprises a timestamp, a globally unique address code UUID and operator information;
s13, outputting a first digest message which is uniquely corresponding to the source report by using a Hash algorithm, and encrypting and signing the first digest message by using a private key which is quoted by using an asymmetric data encryption engine to obtain an encrypted message;
s14, writing the encrypted message into the source report to obtain a signature report;
s15, outputting a second unique digest message to the signature report by using a Hash algorithm;
s16, writing the second abstract message into the signature report to obtain an anti-tampering report;
and S17, writing the anti-tampering report into the specified position of the monomer storage device (200).
9. The method of storing a device information elimination report generation and tamper-resistant system of claim 8, comprising the steps of:
s21, reading the anti-tampering report at the appointed position of the single storage device (200);
s22, splitting the tamper-proof report into a signature report and a second abstract message;
s23, carrying out first verification: calculating the unique abstract message of the signature report by using a Hash algorithm, and comparing the unique abstract message with the second abstract message, wherein the full text of the abstract messages is consistent and passes the verification;
s24, splitting the signature report into a source report and an encrypted message;
s25, carrying out second verification: calculating the unique abstract message of the source report by using a Hash algorithm, and carrying out full-text verification on the unique abstract message and the encrypted abstract message after decryption, wherein the full-text is consistent as passing the verification;
s26, carrying out third check: analyzing the recorded basic information of the single storage equipment (200) from the source report, carrying out consistency check on the basic information of the single storage equipment (200) which is audited at present, and carrying out the next step after the check is passed;
and S27, analyzing the source report to obtain correct operator information, timestamp and UUID.
CN201810134242.8A 2018-02-09 2018-02-09 System and method for generating information elimination report of storage device and preventing tampering Active CN108363929B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810134242.8A CN108363929B (en) 2018-02-09 2018-02-09 System and method for generating information elimination report of storage device and preventing tampering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810134242.8A CN108363929B (en) 2018-02-09 2018-02-09 System and method for generating information elimination report of storage device and preventing tampering

Publications (2)

Publication Number Publication Date
CN108363929A CN108363929A (en) 2018-08-03
CN108363929B true CN108363929B (en) 2022-05-13

Family

ID=63005312

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810134242.8A Active CN108363929B (en) 2018-02-09 2018-02-09 System and method for generating information elimination report of storage device and preventing tampering

Country Status (1)

Country Link
CN (1) CN108363929B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063514B (en) * 2018-06-29 2022-01-25 阿波罗智联(北京)科技有限公司 Method, apparatus, device and computer-readable storage medium for preventing data tampering
US11457002B2 (en) 2019-10-10 2022-09-27 Baidu Usa Llc Method and system for encrypting data using a command
US11704390B2 (en) 2019-10-10 2023-07-18 Baidu Usa Llc Method and system for signing an artificial intelligence watermark using a query
US11637697B2 (en) * 2019-10-10 2023-04-25 Baidu Usa Llc Method and system for signing output using a kernel
US11775692B2 (en) 2019-10-10 2023-10-03 Baidu Usa Llc Method and system for encrypting data using a kernel
US11436305B2 (en) 2019-10-10 2022-09-06 Baidu Usa Llc Method and system for signing an artificial intelligence watermark using implicit data
US11537689B2 (en) 2019-10-10 2022-12-27 Baidu Usa Llc Method and system for signing an artificial intelligence watermark using a kernel

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462965A (en) * 2014-11-14 2015-03-25 华为技术有限公司 Method for verifying integrity of application program and network device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1617587A1 (en) * 2004-07-12 2006-01-18 International Business Machines Corporation Method, system and computer program product for privacy-protecting integrity attestation of computing platform
CN101458743A (en) * 2007-12-12 2009-06-17 中国长城计算机深圳股份有限公司 Method for protecting computer system
CN101702150A (en) * 2009-12-02 2010-05-05 江西金格网络科技有限责任公司 Method for protecting, verifying and repealing content of PDF document page
CN102622549B (en) * 2012-03-20 2014-07-09 天津书生软件技术有限公司 Electronic seal implementation system and method
GB2506622A (en) * 2012-10-04 2014-04-09 Ibm Anti-virus data management
CN104809490A (en) * 2015-04-27 2015-07-29 华中科技大学 Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
CN105553651B (en) * 2015-12-03 2019-05-14 小米科技有限责任公司 The endorsement method of disk mirroring file, device and equipment in Android system
CN107194266B (en) * 2017-05-12 2020-09-04 江苏诺安科技有限公司 Method for verifying whether paper certificate is tampered

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462965A (en) * 2014-11-14 2015-03-25 华为技术有限公司 Method for verifying integrity of application program and network device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function,";P.Garg 等;《2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)》;20140208;第334-339页 *

Also Published As

Publication number Publication date
CN108363929A (en) 2018-08-03

Similar Documents

Publication Publication Date Title
CN108363929B (en) System and method for generating information elimination report of storage device and preventing tampering
CN110839015B (en) Log storage and reading method, device, equipment and medium based on block chain
CN108076057B (en) Data security system and method based on block chain
US10841628B1 (en) System and techniques for digital data lineage verification
CN110378755B (en) Electronic invoice generation method and device, computer equipment and storage medium
US8904182B2 (en) Method and system to provide fine granular integrity to digital data
CN110932859B (en) User information processing method, device and equipment and readable storage medium
CN109308421B (en) Information tamper-proofing method and device, server and computer storage medium
CN101639903B (en) Method, device and system for stamping of electronic seal
CN111324901A (en) Method for creating and decrypting enterprise security encrypted file
CN102289607A (en) Universal serial bus (USB) device verification system and method
CN104951923A (en) Electronic signature system based on combination of PKI technology and anti-counterfeit technology of physical seal
JPWO2004068350A1 (en) Data alteration detection method, data alteration detection device, and data alteration detection program
CN110493011B (en) Block chain-based certificate issuing management method and device
CN112328975A (en) Product software authorization management method, terminal device and medium
CN104517203A (en) Stamping method, apparatus and system of electronic stamp
CN113297632B (en) System and method for managing traceable and field-verified paper report certificates based on blockchain
CN109858217B (en) Method and system for verifying authenticity of electronic file
CN109949889B (en) Electronic medical record nursing system
US7421078B2 (en) Valid medium management system
GB2596941A (en) Systems and processes for management of digital or physical assets via distributed ledger
CN115134143B (en) Global Internet of things equipment authentication method, device and storage medium
CN109977696A (en) The data security method and relevant apparatus and system of discipline inspection system
CN103577969A (en) Electronic seal stamping method
JP2000194262A (en) Completeness data collecting device, data verifying device, and plant data proving system using these

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant