CN108833440A - A kind of Network Security Audit System and network security auditing method based on block chain - Google Patents

A kind of Network Security Audit System and network security auditing method based on block chain Download PDF

Info

Publication number
CN108833440A
CN108833440A CN201810807355.XA CN201810807355A CN108833440A CN 108833440 A CN108833440 A CN 108833440A CN 201810807355 A CN201810807355 A CN 201810807355A CN 108833440 A CN108833440 A CN 108833440A
Authority
CN
China
Prior art keywords
server
block
audit
network security
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810807355.XA
Other languages
Chinese (zh)
Other versions
CN108833440B (en
Inventor
邵俊
范渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN201810807355.XA priority Critical patent/CN108833440B/en
Publication of CN108833440A publication Critical patent/CN108833440A/en
Application granted granted Critical
Publication of CN108833440B publication Critical patent/CN108833440B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to a kind of Network Security Audit System and network security auditing method based on block chain, audit server generates server to Key Management server application public signature key to Key Management server application signature public private key pair and key, block chain block, and audit server acquisition is to Audit data and encrypts generationC 1 , generation is re-encrypted to encryption keyC 2 , with private key pairC 1 WithC 2 Digital signature generatesσ;Audit server generates server to block and sendsC 1 C 2 WithσAnd by block generate server with public key verifications it is effective after will to Audit data be placed in data buffer zone, block formation condition satisfaction then generate new block and broadcast, show end can to block generate server request check Audit data.The present invention uses block chain technology, and block chain is added in auditing system, and Audit data can not be distorted, and Information Security is promoted, and guarantees that Audit data only has authorized user's access to Audit data encryption in block chain, protects Audit data confidentiality.

Description

A kind of Network Security Audit System and network security auditing method based on block chain
Technical field
The present invention relates to the technical field of secret communication, in particular to one kind adds block chain portion in traditional audit system Part is to guarantee the Network Security Audit System and network security auditing method based on block chain that can not be distorted of Audit data.
Background technique
Computer network security audit is to utilize record, system activity and User Activity etc. according to certain security strategy Information checks, environment and the activity of examination and checked operation event, to find system vulnerability, intrusion behavior or improve system The process of performance, and examine assessment system security risk and take the process of corresponding measure.Network security audit remembers system Record and behavior carry out independent examination and estimation, play deterrence and warning to potential attacker that may be present, test macro Control situation simultaneously adjusts in time, and guarantee is harmonious with security strategy and operating instruction, makes and commenting to the destructive insident occurred The foundation for estimating and providing effective disaster recovery and calling to account carries out the change in system control, security strategy and regulation Evaluation and feedback assist system manager to find network system invasion or potential system in time to revise decisions and arrangements Loophole and hidden danger.
However, system manager being capable of additions and deletions Audit data, the Audit data of acquisition and reading in traditional auditing system Audit data out haves the defects that cannot ensure consistency, that is to say network security audit with the presence of may greatly lose it Meaning, can not Logistics networks safety.
Summary of the invention
Present invention solves the technical problem that be, in the prior art, system manager can additions and deletions Audit data, acquisition examines It counts and haves the defects that cannot ensure consistency with the Audit data read, for this purpose, the present invention provides a kind of bases of optimization In the Network Security Audit System and network security auditing method of block chain.
The technical scheme adopted by the invention is that a kind of network security auditing method based on block chain, the method packet Include following steps:
Step 1:Data initialization, any audit server to Key Management server application sign public private key pair(pka,ska) And keypkb, block chain block generates server to Key Management server application public signature keypka
Step 2:Audit server acquires original Audit datamAnd utilize encryption keykEncryption generatesC 1 , utilizepkbIt is rightkAdd It is close, it generatesC 2 , utilizeskaIt is rightC 1 WithC 2 It is digitally signed, generatesσ;Audit server generates server to block and sendsC 1 C 2 Withσ
Step 3:Block generates server by utilizingpkaVerifyingC 1 C 2 WithσValidity, if in vain, abandonC 1 C 2 Withσ, walked Rapid 5, it otherwise, willC 1 C 2 WithσIt is placed in data buffer zone, judges whether block formation condition meets, it is no if then carrying out in next step Then, return step 2;
Step 4:Block generates server and generates new block, and broadcasts, and new block includes original Audit datam
Step 5:Show that end generates server request to block and checks Audit data, when block generates the area of not auditing in server When block number is greater than 0, if decryption passes through, show that end obtains original Audit datam, otherwise, carry out in next step;
Step 6:Terminate.
Preferably, in the step 1, the signature public private key pair of any audit server(pka,ska)And keypkbIt is only One.
Preferably, in the step 1, show end to Key Management server application decrypted private keyskb
Preferably, in the step 5, in the step 5, show that end generates server request to block and checks audit number According to, when block generates the block counts of not auditing in server greater than 0, acquisitionC 1 WithC 2 , withskbIt is rightC 2 Decryption, obtains encrypting close Keyk, withkIt is rightC 1 Decryption, obtains original Audit datam
Preferably, the encryption keykFor symmetric key.
A kind of Network Security Audit System using the network security auditing method based on block chain, including be used for The audit server of Audit data and the displaying end for showing Audit data are acquired, the Network Security Audit System also wraps It includes:
One is added in block chain for verifying the validity of the collected Audit data of the audit server and being packaged in due course Block generate server;
One for key and signature public private key pair needed for managing and distribute audit server, block generation server and showing end Key Management server;
The audit server generates server with Key Management server and block respectively and is equipped with;The displaying end difference Server is generated with Key Management server and block to be equipped with;The block generate server also with Key Management server It is equipped with.
It preferably, include that one or more blocks generate server in the Network Security Audit System.
Preferably, when including that multiple blocks generate server in Network Security Audit System, multiple blocks generate service There is common recognition mechanism, the common recognition mechanism and either block generate server cooperation between device.
Preferably, it is computer group that the block, which generates server,.
The present invention provides the Network Security Audit System and network security auditing method based on block chain of a kind of optimization, Server is generated to close to sign public private key pair and key, block chain block of Key Management server application by audit server Key management server application public signature key, audit server acquire original Audit data and utilize encryption keys, generateC 1 , It is re-encrypted, is generated using key pair encryption keyC 2 , utilize private key pairC 1 WithC 2 It is digitally signed, generatesσ;Audit server Server is generated to block to sendC 1 C 2 WithσAnd server by utilizing public key verifications validity is generated by block, it will if effectivelyC 1 C 2 WithσIt is placed in data buffer zone, then generates new block when block formation condition meets, and broadcast, when block generates server In block counts of not auditing greater than 0 when, show that end can generate server request to block and check Audit data.The present invention uses area Block chain technology adds block chain part, to guarantee can not distorting for Audit data, the safety of data in traditional audit system Property be increased dramatically, and by ensure that block chain as distributed account book mode energy the Audit data encryption in block chain It works normally, Audit data only has authorized user's access, protects the confidentiality of Audit data.
Specific embodiment
The present invention is described in further detail below with reference to embodiment, but protection scope of the present invention is not limited to This.
The present invention relates to a kind of network security auditing methods based on block chain, and block chain is added in traditional audit system Component, to guarantee can not distorting for Audit data.
It the described method comprises the following steps.
Step 1:Data initialization, any audit server to Key Management server application sign public private key pair(pka, ska)And keypkb, block chain block generates server to Key Management server application public signature keypka
In the step 1, the signature public private key pair of any audit server(pka,ska)And keypkbIt is unique.
In the step 1, show end to Key Management server application decrypted private keyskb
In the present invention, public key is part disclosed in public private key pair, and private key is then private part, and public key and private key are The key pair obtained by algorithm under normal circumstances encrypts data with public key, is decrypted with private key, with private key pair Data are signed, and are verified with public key.
In the present invention, it is related to distributed account book, this is a kind of shared between network members, duplication and synchronous data Library, for recording the transaction between network participants, such as the exchange of assets or data.
Step 2:Audit server acquires original Audit datamAnd utilize encryption keykEncryption generatesC 1 , utilizepkbIt is rightkEncryption generatesC 2 , utilizeskaIt is rightC 1 WithC 2 It is digitally signed, generatesσ;Audit server generates server to block and sendsC 1 C 2 Withσ
In the present invention, block generates the block that server is block chain and generates server.
In the present invention, encryption keykFor according to demand, interim random generation.
Step 3:Block generates server by utilizingpkaVerifyingC 1 C 2 WithσValidity, if in vain, abandonC 1 C 2 Withσ, into Row step 5 otherwise willC 1 C 2 WithσIt is placed in data buffer zone, judges whether block formation condition meets, if then carrying out next Step, otherwise, return step 2.
In the present invention,pkaVerifyingC 1 C 2 WithσValidity be mainly used for verifying signature validity.
In the present invention, block formation condition be it is dynamic, can be according to those skilled in the art to actual conditions instantly Carry out control.
Step 4:Step 4:Block generates server and generates new block, and broadcasts, and new block includes original audit number According tom
Step 5:Show that end generates server request to block and checks Audit data, when unexamined in block generation server When counting block counts greater than 0, if decryption passes through, show that end obtains original Audit datam, otherwise, carry out in next step.
In the step 5, show that end generates server request to block and checks Audit data, when block generates in server Block counts of not auditing greater than 0 when, obtainC 1 WithC 2 , withskbIt is rightC 2 Decryption, obtains encryption keyk, withkIt is rightC 1 Decryption, obtains Original Audit datam
Step 6:Terminate.
In the present invention, using block chain technology, to Audit datamEncryption, and the key of encryption is re-encrypted, last It needs gradually to decrypt when obtaining data, has ensured Audit datamConfidentiality and safety.
The encryption keykFor symmetric key.
The invention further relates to a kind of network security audits using the network security auditing method based on block chain System, including the audit server for acquiring Audit data and the displaying end for showing Audit data, the network security Auditing system further includes:
One is added in block chain for verifying the validity of the collected Audit data of the audit server and being packaged in due course Block generate server;
One for key and signature public private key pair needed for managing and distribute audit server, block generation server and showing end Key Management server;
The audit server generates server with Key Management server and block respectively and is equipped with;The displaying end difference Server is generated with Key Management server and block to be equipped with;The block generate server also with Key Management server It is equipped with.
In the present invention, audit server is sent to block and generates server after data encryption is signed.
In the present invention, show end from block generate server block in extract data, be decrypted finally obtain it is original Audit data is simultaneously shown.
It include that one or more blocks generate server in the Network Security Audit System.
When including that multiple blocks generate server in Network Security Audit System, multiple blocks have between generating server Common recognition mechanism, the common recognition mechanism and either block generate server cooperation.
In the present invention, common recognition mechanism is the mechanism that block chain node reaches that the whole network is unanimously known together with regard to block information, Ke Yibao Demonstrate,prove newest block be accurately added to block chain, node storage block chain information unanimously not bifurcated in addition can resist malice attack It hits.
It is computer group that the block, which generates server,.
The present invention passes through audit server to Key Management server application signature public private key pair and key, block chain block Server is generated to Key Management server application public signature key, audit server acquires original Audit data and utilizes encryption close Key encryption, generatesC 1 , re-encrypted, generated using key pair encryption keyC 2 , utilize private key pairC 1 WithC 2 It is digitally signed, it is raw Atσ;Audit server generates server to block and sendsC 1 C 2 WithσAnd it is effective by block generation server by utilizing public key verifications Property, it will if effectivelyC 1 C 2 WithσIt is placed in data buffer zone, then generates new block when block formation condition meets, and broadcast, when When block generates the block counts of not auditing in server greater than 0, show that end can generate server request to block and check audit number According to.The present invention uses block chain technology, and block chain part is added in traditional audit system, so that guarantee Audit data can not It distorts, the safety of data is increased dramatically, and by ensure that block chain conduct to the Audit data encryption in block chain Distributed account book mode can work normally, and Audit data only has authorized user's access, protect the confidentiality of Audit data.

Claims (9)

1. a kind of network security auditing method based on block chain, it is characterised in that:It the described method comprises the following steps:
Step 1:Data initialization, any audit server to Key Management server application sign public private key pair(pka,ska) And keypkb, block chain block generates server to Key Management server application public signature keypka
Step 2:Audit server acquires original Audit datamAnd utilize encryption keykEncryption generatesC 1 , utilizepkbIt is rightkAdd It is close, it generatesC 2 , utilizeskaIt is rightC 1 WithC 2 It is digitally signed, generatesσ;Audit server generates server to block and sendsC 1 C 2 Withσ
Step 3:Block generates server by utilizingpkaVerifyingC 1 C 2 WithσValidity, if in vain, abandonC 1 C 2 Withσ, walked Rapid 5, it otherwise, willC 1 C 2 WithσIt is placed in data buffer zone, judges whether block formation condition meets, it is no if then carrying out in next step Then, return step 2;
Step 4:Block generates server and generates new block, and broadcasts, and new block includes original Audit datam
Step 5:Show that end generates server request to block and checks Audit data, when block generates the area of not auditing in server When block number is greater than 0, if decryption passes through, show that end obtains original Audit datam, otherwise, carry out in next step;
Step 6:Terminate.
2. a kind of network security auditing method based on block chain according to claim 1, it is characterised in that:The step In 1, the signature public private key pair of any audit server(pka,ska)And keypkbIt is unique.
3. a kind of network security auditing method based on block chain according to claim 1, it is characterised in that:The step In 1, show end to Key Management server application decrypted private keyskb
4. a kind of network security auditing method based on block chain according to claim 3, it is characterised in that:The step In 5, show that end generates server request to block and checks Audit data, when the block counts of not auditing in block generation server are big When 0, obtainC 1 WithC 2 , withskbIt is rightC 2 Decryption, obtains encryption keyk, withkIt is rightC 1 Decryption, obtains original Audit datam
5. a kind of network security auditing method based on block chain according to claim 1, it is characterised in that:The encryption KeykFor symmetric key.
6. a kind of network security audit using the network security auditing method based on block chain described in one of claim 1 ~ 5 System, including the audit server for acquiring Audit data and the displaying end for showing Audit data, it is characterised in that:Institute Stating Network Security Audit System further includes:
One is added in block chain for verifying the validity of the collected Audit data of the audit server and being packaged in due course Block generate server;
One for key and signature public private key pair needed for managing and distribute audit server, block generation server and showing end Key Management server;
The audit server generates server with Key Management server and block respectively and is equipped with;The displaying end difference Server is generated with Key Management server and block to be equipped with;The block generate server also with Key Management server It is equipped with.
7. a kind of Network Security Audit System of network security auditing method based on block chain according to claim 6, It is characterized in that:It include that one or more blocks generate server in the Network Security Audit System.
8. a kind of Network Security Audit System of network security auditing method based on block chain according to claim 7, It is characterized in that:When including that multiple blocks generate server in Network Security Audit System, multiple blocks are generated between server With common recognition mechanism, the common recognition mechanism and either block generate server cooperation.
9. a kind of Network Security Audit System of network security auditing method based on block chain according to claim 6, It is characterized in that:It is computer group that the block, which generates server,.
CN201810807355.XA 2018-07-21 2018-07-21 Block chain-based network security audit system and network security audit method Active CN108833440B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810807355.XA CN108833440B (en) 2018-07-21 2018-07-21 Block chain-based network security audit system and network security audit method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810807355.XA CN108833440B (en) 2018-07-21 2018-07-21 Block chain-based network security audit system and network security audit method

Publications (2)

Publication Number Publication Date
CN108833440A true CN108833440A (en) 2018-11-16
CN108833440B CN108833440B (en) 2021-03-30

Family

ID=64141090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810807355.XA Active CN108833440B (en) 2018-07-21 2018-07-21 Block chain-based network security audit system and network security audit method

Country Status (1)

Country Link
CN (1) CN108833440B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474599A (en) * 2018-11-19 2019-03-15 杭州安恒信息技术股份有限公司 Network protection method and device based on block chain
CN109729068A (en) * 2018-11-23 2019-05-07 北京丁牛科技有限公司 Security breaches auditing system based on block chain technology
CN109784920A (en) * 2018-12-27 2019-05-21 上海边界智能科技有限公司 A kind of Transaction Information auditing method and device based on block chain
CN110147995A (en) * 2019-05-06 2019-08-20 山东公链信息科技有限公司 A kind of auditing method based on key level
CN111143837A (en) * 2019-12-25 2020-05-12 天津南大通用数据技术股份有限公司 Method for storing database security audit record
CN113411191A (en) * 2021-08-20 2021-09-17 深圳前海微众银行股份有限公司 Data auditing method and device
CN114900373A (en) * 2022-07-11 2022-08-12 南京极域信息科技有限公司 Dynamic encryption system and method for realizing audit data storage

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566117A (en) * 2017-07-14 2018-01-09 浙商银行股份有限公司 A kind of block chain key management system and method
CN107592311A (en) * 2017-09-18 2018-01-16 西南石油大学 Towards the cloud storage medical treatment big data lightweight batch auditing method of wireless body area network
WO2018044304A1 (en) * 2016-08-30 2018-03-08 Workday, Inc. Secure storage audit verification system
CN108038389A (en) * 2017-12-08 2018-05-15 福建亿榕信息技术有限公司 Method and device based on the storage e-file audit-trail daily record of block chain
CN108076063A (en) * 2017-12-25 2018-05-25 天津理工大学 Network O&M auditing method, server terminal and client based on block chain
CN108111299A (en) * 2017-12-28 2018-06-01 上海唯链信息科技有限公司 A kind of real-time auditing traceability system based on block chain technology
CN108600199A (en) * 2018-04-08 2018-09-28 国网浙江省电力有限公司电力科学研究院 A kind of transmission method and system of the Audit data based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018044304A1 (en) * 2016-08-30 2018-03-08 Workday, Inc. Secure storage audit verification system
CN107566117A (en) * 2017-07-14 2018-01-09 浙商银行股份有限公司 A kind of block chain key management system and method
CN107592311A (en) * 2017-09-18 2018-01-16 西南石油大学 Towards the cloud storage medical treatment big data lightweight batch auditing method of wireless body area network
CN108038389A (en) * 2017-12-08 2018-05-15 福建亿榕信息技术有限公司 Method and device based on the storage e-file audit-trail daily record of block chain
CN108076063A (en) * 2017-12-25 2018-05-25 天津理工大学 Network O&M auditing method, server terminal and client based on block chain
CN108111299A (en) * 2017-12-28 2018-06-01 上海唯链信息科技有限公司 A kind of real-time auditing traceability system based on block chain technology
CN108600199A (en) * 2018-04-08 2018-09-28 国网浙江省电力有限公司电力科学研究院 A kind of transmission method and system of the Audit data based on block chain

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474599A (en) * 2018-11-19 2019-03-15 杭州安恒信息技术股份有限公司 Network protection method and device based on block chain
CN109729068A (en) * 2018-11-23 2019-05-07 北京丁牛科技有限公司 Security breaches auditing system based on block chain technology
CN109729068B (en) * 2018-11-23 2021-05-07 北京丁牛科技有限公司 Security vulnerability auditing system based on block chain technology
CN109784920A (en) * 2018-12-27 2019-05-21 上海边界智能科技有限公司 A kind of Transaction Information auditing method and device based on block chain
CN109784920B (en) * 2018-12-27 2023-07-18 上海边界智能科技有限公司 Transaction information auditing method and device based on blockchain
CN110147995A (en) * 2019-05-06 2019-08-20 山东公链信息科技有限公司 A kind of auditing method based on key level
CN111143837A (en) * 2019-12-25 2020-05-12 天津南大通用数据技术股份有限公司 Method for storing database security audit record
CN113411191A (en) * 2021-08-20 2021-09-17 深圳前海微众银行股份有限公司 Data auditing method and device
CN113411191B (en) * 2021-08-20 2021-11-23 深圳前海微众银行股份有限公司 Data auditing method and device
CN114900373A (en) * 2022-07-11 2022-08-12 南京极域信息科技有限公司 Dynamic encryption system and method for realizing audit data storage
CN114900373B (en) * 2022-07-11 2022-10-14 南京极域信息科技有限公司 Dynamic encryption system and method for realizing audit data storage

Also Published As

Publication number Publication date
CN108833440B (en) 2021-03-30

Similar Documents

Publication Publication Date Title
CN108833440A (en) A kind of Network Security Audit System and network security auditing method based on block chain
Schneier et al. Secure audit logs to support computer forensics
US7305564B2 (en) System and method to proactively detect software tampering
CN101159556B (en) Group key server based key management method in sharing encryption file system
US7770032B2 (en) Secure logging for irrefutable administration
CN101894238B (en) Double authentication-based word document electronic seal system and method
CN109376504A (en) A kind of picture method for secret protection based on block chain technology
US20050262321A1 (en) Information processing apparatus and method, and storage medium
US20080005034A1 (en) Method and Apparatus for Efficient Use of Trusted Third Parties for Additional Content-Sharing Security
JP2014222890A (en) Method for securely communicating information about location of compromised computing device
JPH10508438A (en) System and method for key escrow and data escrow encryption
JP2007511810A (en) Proof of execution using random number functions
CN110677234B (en) Privacy protection method and system based on homomorphic encryption blockchain
CN105740725A (en) File protection method and system
Accorsi Log data as digital evidence: What secure logging protocols have to offer?
CN101166095A (en) Saving and retrieving data based on public key encryption
CN113079140A (en) Cooperative spectrum sensing position privacy protection method based on block chain
CN113079177B (en) Remote sensing data sharing method based on time and decryption frequency limitation
KR102013415B1 (en) System and method for verifying integrity of personal information
CN117454442A (en) Anonymous security and traceable distributed digital evidence obtaining method and system
CN109644185A (en) Method and apparatus for carrying out secure electronic data communication
Said et al. A multi-factor authentication-based framework for identity management in cloud applications
Nam et al. Secure checkpointing
CN112673591B (en) System and method for providing authorized third parties with secure key escrow access to a secret public ledger
CN101261662A (en) Method, device and system for license share

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant