CN106295406A - A kind of block chain that is used for is from safe storage system and method thereof - Google Patents
A kind of block chain that is used for is from safe storage system and method thereof Download PDFInfo
- Publication number
- CN106295406A CN106295406A CN201610665287.9A CN201610665287A CN106295406A CN 106295406 A CN106295406 A CN 106295406A CN 201610665287 A CN201610665287 A CN 201610665287A CN 106295406 A CN106295406 A CN 106295406A
- Authority
- CN
- China
- Prior art keywords
- transaction
- self
- data
- storage system
- intrusion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operations
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
本发明提供了一种用于区块链的自安全存储系统及其方法,包括:(1)守护进程模块,安装在客户端,用于为文件访问服务;(2)原数据演进模块,用于为每个访问文件的原数据创建一个新版本;(3)监视窗,用于把所有数据和原数据纪录下来,用于溯源和分析任何不适宜的访问;(4)交易数据完整性维护模块,用于对任何时间发生在监视窗监视下的入侵,系统能够保证到入侵点处的所有交易数据的完整性;(5)隔离模块,用于确保用户不会受到被质疑信任度存在问题的交易文件,所述交易文件在入侵过程中会丢失交易数据,并且不会让用户不知情的访问被入侵者更改后的文件。采用该区块链的自安全存储系统及方法,可以更快更完整的恢复被入侵的交易数据文件。
This invention provides a self-secure storage system and method for blockchain, comprising: (1) a daemon module, installed on the client, for providing file access services; (2) a source data evolution module, for creating a new version of the source data for each accessed file; (3) a monitoring window, for recording all data and source data for tracing and analyzing any inappropriate access; (4) a transaction data integrity maintenance module, for ensuring the integrity of all transaction data up to the point of intrusion by any intrusion occurring under the monitoring window; and (5) an isolation module, for ensuring that users are not exposed to transaction files whose trustworthiness is questionable, as these transaction files will lose transaction data during the intrusion process, and users will not be allowed to access files modified by the intruder without their knowledge. Using this self-secure storage system and method for blockchain, intruded transaction data files can be recovered more quickly and completely.
Description
技术领域technical field
本发明涉及区块链的交易数据安全问题,特别是一种区块链的自安全存储系统及其方法。The invention relates to the transaction data security problem of the block chain, in particular to a self-safe storage system and method of the block chain.
背景技术Background technique
2009年比特币的出现带来了一种颠覆性的成果--区块链技术,区块链是一个安全的帐簿类数据库,由一个个数据区块组成,使用者可以在这个不断更新升级的平台查找数据,对于金融机构来说,区块链能加快交易处理过程、降低成本、减少中间人、提高市场洞察力,增加业务透明度。The emergence of Bitcoin in 2009 brought a subversive result - block chain technology, block chain is a secure ledger database, composed of data blocks, users can continuously update and upgrade For financial institutions, blockchain can speed up transaction processing, reduce costs, reduce middlemen, improve market insight, and increase business transparency.
计算和存储是计算机系统的两大基本任务,随着信息的爆炸性增长,存储部件会经历基于单服务器的直连存储,到基于局域网的集群网格存储,最后发展到基于广域网的数据网格,区块链技术是目前发展的最末端,这种数据存储介质的本征特质包括智能化的存储,存储服务质量可以保证为用户应用提供服务区分和性能保证,存储是面向对象的海量存储,以及网络存储必须保证是机密完整和安全的,现有的互联网还没有很好的或者方便的办法保证区块链传输过程中的数据和保存在存储设备上的数据的保密性、完整性、可用性、不可抵赖性以及整个网络存储系统的可靠性能,尤其是近年来区块链可信计算技术的产生,对网络存储安全又提出更高的要求。Computing and storage are the two basic tasks of computer systems. With the explosive growth of information, storage components will experience direct-connected storage based on a single server, cluster grid storage based on a LAN, and finally develop into a data grid based on a wide area network. Blockchain technology is at the very end of the current development. The intrinsic characteristics of this data storage medium include intelligent storage, storage service quality can guarantee service differentiation and performance guarantee for user applications, storage is object-oriented mass storage, and Network storage must be guaranteed to be confidential, complete and secure. The existing Internet does not have a good or convenient way to ensure the confidentiality, integrity, availability, and Non-repudiation and the reliable performance of the entire network storage system, especially the emergence of blockchain trusted computing technology in recent years, have put forward higher requirements for network storage security.
发明内容Contents of the invention
本发明的目的在于提供一种用于区块链的自安全存储系统及其方法,包括:(1)守护进程模块,安装在客户端,用于为文件访问服务;(2)原数据演进模块,用于为每个访问文件的原数据创建一个新版本;(3)监视窗,用于把所有数据和原数据纪录下来,除了记录各种修改数据的显性写操作外,每次对文件的访问都会通过更新文件的日志而被记录下来,用于溯源和分析任何不适宜的访问;(4)交易数据完整性维护模块,用于对在任何时间发生在监视窗监视下的入侵,系统能够保证到入侵点处的所有交易数据的完整性;(5)隔离模块,用于确保用户不会受到被质疑信任度存在问题的交易文件,所述交易文件在入侵过程中会丢失交易数据,并且不会让用户不知情的访问被入侵者更改后的文件。The purpose of the present invention is to provide a self-safe storage system and method for blockchain, including: (1) daemon module, installed on the client, for file access services; (2) original data evolution module , used to create a new version for the original data of each accessed file; (3) the monitoring window, used to record all data and original data, except for recording the explicit write operations of various modified data, every time the file is All visits will be recorded by updating the log of the file, which is used to trace and analyze any inappropriate visits; (4) the transaction data integrity maintenance module is used to monitor the intrusion that occurs under the monitoring window at any time, the system Can guarantee the integrity of all transaction data at the intrusion point; (5) an isolation module, used to ensure that the user will not be questioned by transaction files with trustworthiness problems, and the transaction files will lose transaction data during the intrusion process, And it will not allow users to access files changed by intruders without knowing it.
优选的,还包括一个二次交易数据恢复模块,用于恢复发生在入侵时和发现入侵之间的合法更改所导致的交易数据丢失。Preferably, a secondary transaction data recovery module is also included, which is used to recover the loss of transaction data caused by legitimate changes between the time of the intrusion and the discovery of the intrusion.
优选的,交易文件能够可靠的恢复到入侵之前的最后一个访问,并且在验证单个交易文件的访问日志后,如果没有发现不适宜的异常记录,这些交易文件可以被完整地恢复。Preferably, the transaction files can be reliably restored to the last access before the intrusion, and after verifying the access logs of individual transaction files, if no inappropriate abnormal records are found, these transaction files can be completely restored.
优选的,从时间和空间两方面进行记录交易文件,一种是使用基于日志的原交易数据时间记录法,第二种是基于多版本日志的二进制树空间记录法。Preferably, the transaction files are recorded from two aspects of time and space, one is to use the log-based original transaction data time recording method, and the second is to use the binary tree space recording method based on multi-version logs.
优选的,区块链的自安全存储系统不提供保证机密性的模块,假设这些自安全磁盘和一个使用标准认证协议的交易文件服务器连接,所有发送到该自安全存储系统的请求不需要额外的认证和加密。Preferably, the self-secure storage system of the blockchain does not provide a module to ensure confidentiality. Assuming that these self-secure disks are connected to a transaction file server using a standard authentication protocol, all requests sent to the self-secure storage system do not require additional Authentication and encryption.
采用该区块链的自安全存储系统,可以更快更完整的恢复被入侵的交易数据文件。Using the self-secure storage system of the blockchain, the hacked transaction data files can be recovered faster and more completely.
本发明的。of the present invention.
根据下文结合附图对本发明具体实施例的详细描述,本领域技术人员将会更加明了本发明的上述以及其他目的、优点和特征。Those skilled in the art will be more aware of the above and other objects, advantages and features of the present invention according to the following detailed description of specific embodiments of the present invention in conjunction with the accompanying drawings.
附图说明Description of drawings
后文将参照附图以示例性而非限制性的方式详细描述本发明的一些具体实施例。附图中相同的附图标记标示了相同或类似的部件或部分。本领域技术人员应该理解,这些附图未必是按比例绘制的。本发明的目标及特征考虑到如下结合附图的描述将更加明显,附图中:Hereinafter, some specific embodiments of the present invention will be described in detail by way of illustration and not limitation with reference to the accompanying drawings. The same reference numerals in the drawings designate the same or similar parts or parts. Those skilled in the art will appreciate that the drawings are not necessarily drawn to scale. The objectives and features of the present invention will be more apparent in consideration of the following description in conjunction with the accompanying drawings, in the accompanying drawings:
图1为根据本发明实施例的区块链自安全存储系统的结构示意图。Fig. 1 is a schematic structural diagram of a blockchain self-secure storage system according to an embodiment of the present invention.
具体实施方式detailed description
在进行具体实施方式的说明之前,为了更为清楚的表达所论述的内容,首先定义一些非常重要的概念。Before describing the specific implementation manners, in order to express the discussed content more clearly, some very important concepts are firstly defined.
交易:交易的实质是个关系数据结构,这个数据结构中包含交易参与者价值转移的相关信息。这些交易信息被称为记账总账簿。交易需经过三个创建、验证、写入区块链。交易必须经过数字签名,保证交易的合法性。Transaction: The essence of a transaction is a relational data structure, which contains information about the value transfer of transaction participants. These transaction information is called ledger ledger. Transactions need to go through three steps of creating, verifying, and writing to the blockchain. The transaction must be digitally signed to ensure the legality of the transaction.
区块:所有的交易信息存放于区块中,一条交易信息就是一条记录,作为一个独立的记录存放于区块链中。区块由区块头部和数据部分组成,区块头字段包含区块本身的各种特性,例如前一区块信息,merkle值及时间戳等。其中区块头哈希值和区块高度是标识区块最主要的两个指标。区块主标识符是它的加密哈希值,一个通过SHA算法对区块头进行二次哈希计算而得到的数字指纹。产生的32字节哈希值被称为区块哈希值,或者区块头哈希值,只有区块头被用于计算。区块哈希值可以唯一、明确地标识一个区块,并且任何节点通过简单地对区块头进行哈希计算都可以独立地获取该区块哈希值。Block: All transaction information is stored in the block, and a transaction information is a record, which is stored in the blockchain as an independent record. A block consists of a block header and a data part. The block header field contains various characteristics of the block itself, such as the previous block information, merkle value and timestamp. Among them, the block header hash value and block height are the two most important indicators for identifying blocks. The block master identifier is its encrypted hash value, a digital fingerprint obtained by hashing the block header twice through the SHA algorithm. The resulting 32-byte hash is called the block hash, or block header hash, and only the block header is used for the calculation. The block hash value can uniquely and unambiguously identify a block, and any node can independently obtain the block hash value by simply hashing the block header.
区块链:由区块按照链式结构有序链接起来的数据结构。区块链就像一个垂直的堆栈,第一个区块作为栈底的首区块,随后每个区块都被放置在其他区块之上。当区块写入区块链后将永远不会改变,并且备份到其他的区块链服务器上。Blockchain: A data structure in which blocks are linked in an orderly manner according to a chain structure. A blockchain is like a vertical stack, with the first block being the first block at the bottom of the stack, and each subsequent block being placed on top of the others. When the block is written into the blockchain, it will never change and is backed up to other blockchain servers.
实施例:Example:
任何系统的机密性实际上都会被打破,因此首要目标是防止交易数据遭到破坏,并且通过检测和诊断捕获入侵区块链系统的来源。参见图1,一种用于区块链的自安全存储系统,存储原理基于对主机操作系统的不信任,需要一些基本的运算来管理文件系统,在客户端安装一个守护进程模块,服务于文件访问。该自安全存储系统不提供保证机密性的措施,它假设这些自安全磁盘和一个使用标准认证协议的交易文件服务器连接,所有发送到该自安全存储系统的请求不需要额外的认证和加密。Confidentiality of any system can be breached in practice, so the primary goal is to prevent the breach of transaction data and capture the source of intrusion into the blockchain system through detection and diagnostics. See Figure 1, a self-secure storage system for blockchain. The storage principle is based on the distrust of the host operating system. Some basic operations are required to manage the file system. A daemon module is installed on the client to serve the file system. access. The self-secure storage system does not provide measures to ensure confidentiality. It assumes that these self-secure disks are connected to a transaction file server using a standard authentication protocol, and all requests sent to the self-secure storage system do not require additional authentication and encryption.
区块链的自安全存储系统包括原数据演进模块,用于为每个访问文件的原数据创建一个新版本。The blockchain's self-secure storage system includes an original data evolution module for creating a new version of the original data for each accessed file.
并且还包括一个监视窗,用于把所有数据和原数据纪录下来,除了记录各种修改数据的显性写操作外,每次对文件的访问都会通过更新文件的日志而被记录下来,这样任何不适宜的访问都可以得到溯源和分析,一旦设置监视窗,就不可避免接近数据时不备监视,从而排除入侵者以不被察觉的方式更改数据。还包括交易数据完整性维护模块,用于对在任何时间发生在监视窗监视下的入侵,系统能够保证到入侵点处的所有交易数据的完整性,通过详尽的记录,在区块链管理员发现入侵后,文件能够可靠的恢复到入侵之前的最后一个访问,此外,在验证单个交易文件的访问日志后,如果没有发现不适宜的异常记录,这些交易文件可以被完整地恢复。And it also includes a monitoring window, which is used to record all data and original data. In addition to recording the explicit write operations of various modified data, each access to the file will be recorded by updating the log of the file, so that any Unsuitable access can be traced and analyzed. Once the monitoring window is set, it is inevitable to be unprepared to monitor when approaching the data, thereby preventing intruders from changing the data in an undetected manner. It also includes a transaction data integrity maintenance module, which is used for intrusions that occur under the monitoring of the monitoring window at any time. The system can ensure the integrity of all transaction data at the point of intrusion. Through detailed records, the blockchain administrator After an intrusion is discovered, the files can be reliably restored to the last access before the intrusion. In addition, after verifying the access logs of individual transaction files, if no inappropriate abnormal records are found, these transaction files can be completely restored.
还包括隔离模块,那些被质疑信任度存在问题的交易文件就会在入侵过程中丢失交易数据,由自安全存储系统的隔离机构确保用户不能接收这些有问题的文件,并且不会让用户不知情的访问被入侵者更改后的文件。It also includes an isolation module. Those transaction files that are questioned about their trustworthiness will lose transaction data during the intrusion process. The isolation mechanism of the self-secure storage system ensures that users cannot receive these problematic files and will not let users know. access to files altered by intruders.
还可以包括一个二次交易数据恢复模块,用于恢复发生在入侵时和发现入侵之间的合法更改所导致的交易数据丢失,从而提高交易数据可用性,损失最小化。A secondary transaction data recovery module may also be included, which is used to recover the loss of transaction data caused by legitimate changes between the time of the intrusion and the detection of the intrusion, thereby improving the availability of transaction data and minimizing losses.
鉴于为每个交易文件访问都需要做一个日志,本实施例从时间和空间两方面进行记录,一种是使用基于日志的原交易数据时间记录法,第二种是基于多版本日志的二进制树空间记录法。通过对某一份交易文件的入侵后交易数据的恢复时间和恢复状况来看,该系统能够获得比传统系统大约1倍以上的速度改进,100%恢复交易数据。In view of the need to make a log for each transaction file access, this embodiment records from two aspects of time and space, one is to use the time recording method of the original transaction data based on the log, and the second is to use the binary tree based on the multi-version log Spatial recording method. Judging from the recovery time and recovery status of the transaction data after the intrusion of a certain transaction file, the system can achieve a speed improvement of more than twice that of the traditional system, and 100% recovery of transaction data.
虽然本发明已经参考特定的说明性实施例进行了描述,但是不会受到这些实施例的限定而仅仅受到附加权利要求的限定。本领域技术人员应当理解可以在不偏离本发明的保护范围和精神的情况下对本发明的实施例能够进行改动和修改。While the invention has been described with reference to certain illustrative embodiments, it is not to be limited by these embodiments but only by the appended claims. Those skilled in the art should understand that changes and modifications can be made to the embodiments of the present invention without departing from the protection scope and spirit of the present invention.
Claims (10)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610665287.9A CN106295406A (en) | 2016-08-13 | 2016-08-13 | A kind of block chain that is used for is from safe storage system and method thereof |
| PCT/CN2016/095580 WO2018032376A1 (en) | 2016-08-13 | 2016-08-16 | Self-securing storage system and method for block chain |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610665287.9A CN106295406A (en) | 2016-08-13 | 2016-08-13 | A kind of block chain that is used for is from safe storage system and method thereof |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN106295406A true CN106295406A (en) | 2017-01-04 |
Family
ID=57670625
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201610665287.9A Pending CN106295406A (en) | 2016-08-13 | 2016-08-13 | A kind of block chain that is used for is from safe storage system and method thereof |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN106295406A (en) |
| WO (1) | WO2018032376A1 (en) |
Cited By (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107241360A (en) * | 2017-08-04 | 2017-10-10 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
| CN107329888A (en) * | 2017-05-31 | 2017-11-07 | 深圳前海微众银行股份有限公司 | Intelligent contract command code coverage rate computational methods and system |
| CN107943833A (en) * | 2017-10-25 | 2018-04-20 | 华南农业大学 | A kind of storage of non-stop layer distributed document and search method based on block chain |
| CN108521434A (en) * | 2018-05-29 | 2018-09-11 | 广西电网有限责任公司 | A kind of network security intrusion detecting system based on block chain technology |
| CN109558064A (en) * | 2017-09-25 | 2019-04-02 | 航天信息股份有限公司 | A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain |
| CN109829297A (en) * | 2017-11-23 | 2019-05-31 | 财团法人资讯工业策进会 | Monitoring device, method and its computer storage medium |
| CN110019235A (en) * | 2017-12-29 | 2019-07-16 | 百度在线网络技术(北京)有限公司 | Data storage, restoration methods, device, equipment and medium based on block chain |
| CN110163007A (en) * | 2019-04-23 | 2019-08-23 | 西安邮电大学 | Data integrity verification method, equipment and storage medium based on block chain |
| CN110309166A (en) * | 2019-07-10 | 2019-10-08 | 中国电子科技集团公司第二十八研究所 | A Traceable Completion Method for Geographical Elevation Data |
| WO2020010763A1 (en) * | 2018-07-12 | 2020-01-16 | 中国科学院深圳先进技术研究院 | Blockchain spatio-temporal data querying method and system, and electronic apparatus |
| CN114331451A (en) * | 2021-10-27 | 2022-04-12 | 东北大学 | Data modification method on block chain based on double hash chains |
| CN114553488A (en) * | 2022-01-24 | 2022-05-27 | 四川华西集采电子商务有限公司 | Square encryption bidding method and system |
| CN115080538A (en) * | 2022-06-14 | 2022-09-20 | 蚂蚁区块链科技(上海)有限公司 | Block chain version verification method and device |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109741064B (en) * | 2019-01-10 | 2023-05-05 | 广东工业大学 | A review attack processing method, system, electronic equipment and storage medium |
| CN110781531B (en) * | 2019-09-04 | 2023-04-07 | 安徽省粮油信息中心(安徽粮食批发交易市场管委会) | Tamper-proof grain depot data secure storage system and method |
| CN111680111B (en) * | 2020-05-29 | 2023-09-01 | 泰康保险集团股份有限公司 | Billing method and device, computer equipment and computer readable storage medium |
| US11803864B2 (en) * | 2020-09-28 | 2023-10-31 | Bank Of America Corporation | Distributed ledgers for enhanced chain of custody certification |
| CN113570384A (en) * | 2021-07-26 | 2021-10-29 | 大连民族大学 | Agricultural product tracing method and system based on block chain |
| CN115437852B (en) * | 2022-11-07 | 2023-02-03 | 四川大学 | A fast blockchain system and method based on disaster recovery and file partition table |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101403988A (en) * | 2008-11-05 | 2009-04-08 | 中国科学院计算技术研究所 | File back-up system and method of computer system |
| CN102082704A (en) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团河北有限公司 | Safety monitoring method and system |
| CN102339321A (en) * | 2011-11-09 | 2012-02-01 | 上海盛霄云计算技术有限公司 | Network file system with version control and method using same |
| CN104392405A (en) * | 2014-11-14 | 2015-03-04 | 杭州银江智慧医疗集团有限公司 | Electronic medical record safety system |
| CN105844505A (en) * | 2016-03-17 | 2016-08-10 | 深圳市新世纪启航科技开发有限公司 | Method of carrying out digital currency trading through block chain technology |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8799247B2 (en) * | 2011-02-11 | 2014-08-05 | Purdue Research Foundation | System and methods for ensuring integrity, authenticity, indemnity, and assured provenance for untrusted, outsourced, or cloud databases |
| CN102981945B (en) * | 2012-12-31 | 2016-02-10 | 北京京东世纪贸易有限公司 | A kind of unfailing performance supervisory system and method |
| CN104281808B (en) * | 2014-09-25 | 2017-09-01 | 中国科学院信息工程研究所 | A general Android malicious behavior detection method |
| CN105183609B (en) * | 2015-09-16 | 2017-03-15 | 焦点科技股份有限公司 | A kind of real-time monitoring system for being applied to software system and method |
-
2016
- 2016-08-13 CN CN201610665287.9A patent/CN106295406A/en active Pending
- 2016-08-16 WO PCT/CN2016/095580 patent/WO2018032376A1/en not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101403988A (en) * | 2008-11-05 | 2009-04-08 | 中国科学院计算技术研究所 | File back-up system and method of computer system |
| CN102082704A (en) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团河北有限公司 | Safety monitoring method and system |
| CN102339321A (en) * | 2011-11-09 | 2012-02-01 | 上海盛霄云计算技术有限公司 | Network file system with version control and method using same |
| CN104392405A (en) * | 2014-11-14 | 2015-03-04 | 杭州银江智慧医疗集团有限公司 | Electronic medical record safety system |
| CN105844505A (en) * | 2016-03-17 | 2016-08-10 | 深圳市新世纪启航科技开发有限公司 | Method of carrying out digital currency trading through block chain technology |
Cited By (22)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107329888A (en) * | 2017-05-31 | 2017-11-07 | 深圳前海微众银行股份有限公司 | Intelligent contract command code coverage rate computational methods and system |
| CN107329888B (en) * | 2017-05-31 | 2019-10-18 | 深圳前海微众银行股份有限公司 | Smart contract operation code coverage calculation method and system |
| CN107241360B (en) * | 2017-08-04 | 2019-01-18 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
| CN107241360A (en) * | 2017-08-04 | 2017-10-10 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
| CN109558064A (en) * | 2017-09-25 | 2019-04-02 | 航天信息股份有限公司 | A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain |
| CN109558064B (en) * | 2017-09-25 | 2022-06-07 | 航天信息股份有限公司 | Electronic invoice data chain synchronization method, device, medium and electronic equipment |
| CN107943833A (en) * | 2017-10-25 | 2018-04-20 | 华南农业大学 | A kind of storage of non-stop layer distributed document and search method based on block chain |
| CN109829297B (en) * | 2017-11-23 | 2022-04-19 | 财团法人资讯工业策进会 | Monitoring device, method and computer storage medium thereof |
| CN109829297A (en) * | 2017-11-23 | 2019-05-31 | 财团法人资讯工业策进会 | Monitoring device, method and its computer storage medium |
| CN110019235A (en) * | 2017-12-29 | 2019-07-16 | 百度在线网络技术(北京)有限公司 | Data storage, restoration methods, device, equipment and medium based on block chain |
| CN110019235B (en) * | 2017-12-29 | 2021-08-17 | 百度在线网络技术(北京)有限公司 | Block chain based data storage and recovery method, device, equipment and medium |
| CN108521434A (en) * | 2018-05-29 | 2018-09-11 | 广西电网有限责任公司 | A kind of network security intrusion detecting system based on block chain technology |
| WO2020010763A1 (en) * | 2018-07-12 | 2020-01-16 | 中国科学院深圳先进技术研究院 | Blockchain spatio-temporal data querying method and system, and electronic apparatus |
| CN110163007A (en) * | 2019-04-23 | 2019-08-23 | 西安邮电大学 | Data integrity verification method, equipment and storage medium based on block chain |
| CN110163007B (en) * | 2019-04-23 | 2021-05-04 | 西安邮电大学 | Blockchain-based data integrity verification method, device and storage medium |
| CN110309166A (en) * | 2019-07-10 | 2019-10-08 | 中国电子科技集团公司第二十八研究所 | A Traceable Completion Method for Geographical Elevation Data |
| CN110309166B (en) * | 2019-07-10 | 2021-10-01 | 中国电子科技集团公司第二十八研究所 | A Traceable Geographical Elevation Data Completion Method |
| CN114331451A (en) * | 2021-10-27 | 2022-04-12 | 东北大学 | Data modification method on block chain based on double hash chains |
| CN114331451B (en) * | 2021-10-27 | 2024-12-06 | 东北大学 | A data modification method on blockchain based on double hash chain |
| CN114553488A (en) * | 2022-01-24 | 2022-05-27 | 四川华西集采电子商务有限公司 | Square encryption bidding method and system |
| CN114553488B (en) * | 2022-01-24 | 2025-02-18 | 四川华西集采电子商务有限公司 | A method and system for four-party encrypted bidding |
| CN115080538A (en) * | 2022-06-14 | 2022-09-20 | 蚂蚁区块链科技(上海)有限公司 | Block chain version verification method and device |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2018032376A1 (en) | 2018-02-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106295406A (en) | A kind of block chain that is used for is from safe storage system and method thereof | |
| US12099606B2 (en) | Systems and methods for protecting against malware attacks | |
| US12566879B2 (en) | Replacing distinct data in a relational database with a distinct reference to that data and distinct de-referencing of database data | |
| CN113326317B (en) | Blockchain evidence storage method and system based on homogeneous multi-chain architecture | |
| US10366247B2 (en) | Replacing distinct data in a relational database with a distinct reference to that data and distinct de-referencing of database data | |
| US12088583B2 (en) | Permissions for backup-related operations | |
| Zawoad et al. | OCF: an open cloud forensics model for reliable digital forensics | |
| CN103226675B (en) | A kind of traceability system and method analyzing intrusion behavior | |
| CN107563199A (en) | It is a kind of that software detection and defence method in real time are extorted based on file request monitoring | |
| US11803461B2 (en) | Validation of log files using blockchain system | |
| CN106302720B (en) | survivable storage system and method for block chain | |
| CN102739774B (en) | Method and system for obtaining evidence under cloud computing environment | |
| WO2018032379A1 (en) | Untrusted remote transaction file secure storage system for block chain | |
| WO2020237874A1 (en) | Project data verification method, device, computer apparatus and storage medium | |
| US10735457B2 (en) | Intrusion investigation | |
| US8745010B2 (en) | Data storage and archiving spanning multiple data storage systems | |
| US20250021997A1 (en) | Distributed Ledgers for Enhanced Chain of Custody Certification | |
| CN120822215B (en) | Audit evidence obtaining method, device and equipment based on virtual desktop infrastructure log | |
| US20250080551A1 (en) | Remote operations forensics | |
| US20260039675A1 (en) | Data-aware anomaly detection | |
| Joshi et al. | An Improved Mechanism to Maintain Data Integrity and Anomaly Detection in Cloud Storage | |
| CN120675747A (en) | Log auditing method, system, device, electronic equipment and medium | |
| CN119918048A (en) | Ransomware detection method, device, equipment, storage medium and product | |
| CN115857815A (en) | A data security management system in the open sharing of scientific data | |
| Zeng | Research on Forensics Method based on Log on SaaS |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170104 |