CN106503571B - Educational administration's core data guard method based on physical isolation and image encryption - Google Patents
Educational administration's core data guard method based on physical isolation and image encryption Download PDFInfo
- Publication number
- CN106503571B CN106503571B CN201611085636.6A CN201611085636A CN106503571B CN 106503571 B CN106503571 B CN 106503571B CN 201611085636 A CN201611085636 A CN 201611085636A CN 106503571 B CN106503571 B CN 106503571B
- Authority
- CN
- China
- Prior art keywords
- educational administration
- core data
- memory space
- data
- dimensional code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
Educational administration's core data guard method based on physical isolation and image encryption that the invention discloses a kind of, for the rights client that different operation settings is different in this method, including the first rights client, second rights client and the second rights client, and corresponding two dimensional code is formed according to educational administration's core data, it is stored by the first rights client to main storage space, the educational administration's core data and two dimensional code of main storage space are stored to application memory space by the second rights client, the data of application memory space and two dimensional code are backed up into back up memory space by third client again, and application memory space is only connected in backup with back up memory space.The present invention substantially increases modification difficulty by Role Management and rights management, it is possible to prevente effectively from educational administration's core data is destroyed or distorts, carries out image encryption using two dimensional code, and using encrypted transmission mode, data is effectively prevent to be tampered.
Description
Technical field
The present invention relates to teaching management technological system technical fields, and in particular to one kind is based on physical isolation and image encryption
Educational administration's core data guard method.
Background technique
Educational Affairs Office is important teaching operations functional department, school, is the pivot that each teaching unit of school is connected each other and linked up
Knob, the important administrative department for promoting reform in education and teaching, guaranteeing Talent-cultivating Quality.Affairs involved in teaching reform in university are non-
It is often many and diverse, it is related to the part management work of school Educational Affairs Office, the teaching management of each system, the educational administration of teacher and student.Therefore
Supervision and management that educational administration management system should be conducive to Educational Affairs Office is conducive to each system again and teacher shares out the work and helps one another, and takes into account religion
Teacher and two class of student use object.The major function of educational administration management system includes: school teaching management, is teaching management, Jiao Shijiao
Business, student, which take make-up exam, rebuilds and takes as an elective course management, and main includes the safety and rights management, data inputting, data maintenance, browsing of system
The modules such as management, print management, achievement publication are taken as an elective course in query function, statistical analysis, make-up examination and reconditioning management.
Educational administration's core data is the significant data that Educational Affairs Office is formed during teaching management, mostly in the form of electronic record
It is stored in the educational administration management system of each colleges and universities local.Electronic record can greatly improve data storage and processing capacity, still
It also will increase various risks accordingly, such as virus, Trojan Horse invasion, and not from other of network-external or internal progress
Authorized access so that educational archives are in generation, storage, processing and exchange process, all exist divulge a secret or by intercept, steal
A possibility that listening, alter and forging.Therefore, the safety of the safety of educational administration's core data and internet security and computer system
The safety of property and operating system, network system is closely connected, mutually supports.
As what the development of educational undertaking and University Education were reformed gos deep into, the educational administration's core formed during teaching management
Data are more and more, more and more important.The protection of educational administration's core data has become the important component of Educational Affairs Office work, religion
The quality for core data management work of being engaged in, by the reality of the performance for directly influencing Educational Affairs Office function and expected management objectives of imparting knowledge to students
It is existing, or even influence the reputation of school.It is limited for the safeguard measure of educational administration's core data in existing educational administration management system,
Teaching management core data is caused to there is very big security risk.Therefore, institute is used to prevent educational administration's core data illegal
Caused by leaking data, change or destruction, reduce or avoid as all kinds of disasters or malicious attack and caused by educational administration's core
The loss of data improves the safety and reliability of educational administration's core data there is an urgent need to protect to educational administration's core data.
Summary of the invention
In view of the deficiencies of the prior art, the present invention provides a kind of based on the educational administration's core number being physically isolated with image encryption
According to guard method.
A kind of educational administration's core data guard method based on physical isolation and image encryption, includes the following steps:
(1) educational administration's core data is inputted using the first rights client, two dimension is generated according to educational administration's core data of input
Code, and educational administration's core data and corresponding two dimensional code are stored to main storage space;
(2) the first modification application from the first rights client is received in the public notification period of setting, when public notification period knot
Shu Hou audits the modification application of each item first using the second rights client, audit by then by the second rights client according to
The first modification application updates corresponding educational administration's core data and corresponding two dimensional code in main storage space;
(3) by main storage space core data and synchronous two-dimension code to application memory space, and by application memory sky
Between in educational administration's core data and two dimensional code backup to back up memory space, and proceed as follows:
(a) it after receiving from the second modification application of the first rights client, is examined using third rights client
Core the second modification application, audit, which passes through, then updates application memory sky according to the second modification application by third rights client
Between in corresponding educational administration's core data and two dimensional code;
(b) quantity of the educational administration's core data updated at set time intervals or in the time interval of the setting is super
The quantity of educational administration's core data of preset update amount threshold or input is crossed more than after preset input amount threshold, will be applied
Updated educational administration's core data and two dimensional code backup to back up memory space in memory space.
For any modification application (including the first modification application and the second modification are applied) in the present invention, if audit is not
Pass through, then without updating or modifying operation accordingly.
It is synchronous in educational administration's core data guard method of the invention to generate, transmission, update educational administration's core data and two dimensional code,
The reliability of educational administration's core data transmission is improved, to further improve the reliability of educational administration's core data storage, also according to
The amount threshold of time threshold or educational administration's core data of modification is by the educational administration's core data modified in application memory space
And corresponding two dimensional code backups to back up memory space.
The first rights client, the second rights client, third rights client in the present invention use logon rights, tie up
Determine the methods of IP, the operation of special messenger's U-shield, Role Management and rights management setting, the characteristics of according to teaching management, can set different
Client is the first rights client, the second rights client and third rights client, can also pass through logon rights, binding
IP, the operation of special messenger's U-shield, Role Management and method, realize the first rights client, the second rights client in a client
With the function of third rights client.
User in step (2) and step (3) in corresponding authority passes through the first rights client according to demand and submits first
Modification application or the second application modification, if not needing, do not propose to modify.For step (2) if in public notification period, corresponding authority
User do not submit the first modification application, then after public notification period, be directly entered step (3) without follow-up checks and update
The operation of corresponding educational administration's core data and corresponding two dimensional code in main storage space.Similarly, for step (3), if corresponding power
The user of limit does not submit the second modification application, then does not execute step (a).In step (b) three conditions meet wherein any one
It is then backed up, to prevent loss of data.
Signified audit in the present invention refers to that the user of corresponding authority utilizes corresponding client (the second rights client
Or third rights client carries out publicity, if doubtful point is not received in public notification period, then it is assumed that audit passes through, otherwise it is assumed that audit is not
Pass through.For each modification application (including the first modification application and second modification application), only audit is by carrying out accordingly
Update.
Main storage space, application memory space and back up memory space can be storage server in the present invention, wherein standby
Part memory space can also be the storage devices such as USB flash disk, mobile hard disk.
For the reliability for guaranteeing educational administration's core data, in the present invention after each step, the user of corresponding permission is
It needs to print last educational administration's core data, and will be saved after the signature of the paper of printing as paper shelves.
For the educational administration's core data being originally inputted and every time, modified educational administration's core data can be given birth in the present invention
At two dimensional code, and all two dimensional codes retain, and multiple two dimensional codes may be corresponded to by just having deformed educational administration's core data in this way
Situation can change the modification process of educational administration's core data according to the variation of two dimensional code in this way with tracking.
Preferably, educational administration's core data of input includes data content and data directory.
Setting index be convenient for data query, subsequent operating process easy to accomplish, the present invention in data directory can for should
The title of educational administration's core data.
The first modification application includes the data directory and replacement data content for needing the educational administration's core data modified.
The described second modification application include the data directory for needing the educational administration's core data modified, replacement data content with
And modification reason.
First modification application and the second modification application occur in the different stages, the characteristics of according to educational administration's core data, no
The same stage, also different to the modification occurrence frequency of educational administration's core data, corresponding modification requires also different.It flexibly sets different
Modification application, increases the application range of educational administration's core data guard method of the invention.First modification application and second are repaired
When changing application audit, the first modification application and the second modification application are directly subjected to publicity, if not having within certain publicity time limit
Receive doubtful point, then it is assumed that audit passes through.Corresponding memory space (the first modification Shen is inquired using data directory after the approval
Please inquire main storage space, the second modification application inquiry application memory space) determine the educational administration's core data for needing to modify, it is used in combination
Replacement data content replaces the data content of educational administration's core data.
Educational administration's core data and two dimensional code are backuped into backup storage sky by the way of encrypted transmission in the step (3)
Between.
By encrypted transmission mode, prevents educational administration's core data to be stolen by others or distort in transmission process, increase
The safety of educational administration's core data transmission.
Further include operating as follows after the completion of backup to further increase safety and reliability:
The educational administration's core data and two dimensional code that backup in back up memory space are decrypted, and obtained according to decryption
The corresponding relationship of educational administration's core data and two dimensional code determines whether educational administration's core data is correct in back up memory space:
If the two is corresponding, then it is assumed that educational administration's core data is correct in back up memory space;
Otherwise it is assumed that educational administration's core data is incorrect in back up memory space, again by the educational administration in application memory space
Core data and two dimensional code backup to back up memory space.
Two dimensional code is mainly used as identifying code to verify the correctness of educational administration's core data, as a kind of identifying code in the present invention
It can also be realized using the identifying code of other classes.
Preferably, the application memory space and back up memory space only connects in backup procedure.
Disconnect application memory space and back up memory space to reach physical isolation, i.e. transient state is fixed
Phase is synchronous, normality isolation, when can prevent entire educational administration management system from disaster occurs in this way, still is able to guarantee that backup storage is empty
Between in content do not lose, improve redundancy ability.
The time interval and the amount threshold of setting (including updating amount threshold and input amount threshold) are related to application
The frequency of memory space and back up memory space, the two can dynamic regulations according to the actual situation.
Preferably, the time interval is 7~20 days, and the update amount threshold 50~100, the input
Amount threshold 500~1000.
Compared with prior art, the present invention has the advantage that
Educational administration's core data is made a backup store, and for backing up the back up memory space stored and being used to store source document
The application memory space of part is physically isolated, and when disaster occurs for entire educational administration management system, guarantees the number in back up memory space
According to not losing;
Image encryption is carried out using two dimensional code, and is using encrypted transmission mode, data is effectively prevent to be tampered;
Backed up in synchronization educational administration core data and corresponding two dimensional code, two dimensional code are not easy to be tampered in transmission process, finally
By the corresponding relationship of educational administration's core data and two dimensional code in back up memory space, the correctness of backup is determined, it is incorrect, it weighs
New backup, can educational administration's core data in back up memory space it is synchronous in application memory space;
For the different rights client of different operation settings, is substantially increased and repaired by Role Management and rights management
Change difficulty, it is possible to prevente effectively from educational administration's core data is destroyed or distorts.
Detailed description of the invention
Fig. 1 is the flow chart of educational administration's core data guard method of the present embodiment.
Specific embodiment
Below in conjunction with the drawings and specific embodiments, the present invention will be described in detail.
Educational administration's core data guard method of the invention is implemented on following educational administration management system, the educational administration management system packet
It includes:
Three memory spaces, respectively main storage space, application memory space and back up memory space;
Three kinds of rights clients, are respectively as follows:
First rights client generates two dimensional code according to educational administration's core data of input for inputting educational administration's core data,
And educational administration's core data and the storage of corresponding two dimensional code will be inputted to the first number memory space, it is also used to input in public notification period
First modification application inputs the second modification application after first;
Second rights client, after public notification period, audit the first modification application, audit according to this by then first repairing
Change application and updates corresponding educational administration's core data and two dimensional code in main storage space;
Third rights client, for auditing the second modification application, audit according to the first modification application by then updating
Corresponding educational administration's core data and two dimensional code in application memory space;
Master Control Center, for the data in application memory space to be backuped to back up memory space, the first limit client of setting
End, the second limit client and third rights client;
Wherein, the first rights client, the second rights client, third rights client are arranged using logon rights, are tied up
Determine the methods of IP, the operation of special messenger's U-shield setting, main storage space, application memory space and back up memory space are storage server,
Application memory space and back up memory space are only in network connection state in data backup, are hereafter in an off state.
A kind of educational administration's core data guard method based on physical isolation and image encryption, as shown in Figure 1, including following step
It is rapid:
(1) educational administration's core data is inputted using the first rights client, two dimension is generated according to educational administration's core data of input
Code, and educational administration's core data and corresponding two dimensional code are stored to main storage space.
Step (1) corresponds to the typing stage, and educational administration core data producer logs in the first rights client, utilizes the first visitor
Family end inputs and proofreads educational administration's core data, and two dimensional code is generated after collated correct and generates corresponding two dimensional code, and will be after check and correction
Educational administration's core data and corresponding two dimensional code are uploaded to main storage space.In addition, also printing educational administration's core number after the completion of check and correction
According to, and carry out paper archive.
Educational administration's core data of the check and correction printing input of the present embodiment, and be compared and modify according to the input data.
(2) it receives in the public notification period of setting (being 10 days in the present embodiment) and is repaired from the first of the first rights client
Change application, after public notification period, the second rights client audits the modification application of each item first, audit by then according to this first
Modification application updates corresponding educational administration's core data and corresponding two dimensional code in main storage space.
Step (2) corresponds to the publicity stage, carries out inquiry check and correction using publicity method towards masses within the publicity stage, when
Masses' discovery educational administration's core data reacts when wrong to corresponding educational administration's core data producer, and educational administration's core data logs in first
Rights client proposes corresponding first modification application, and the department manager of educational administration core data producer logs in the second permission client
The first modification application is audited at end end, checking method are as follows: the first modification application is carried out publicity, publicity is not asked
Topic, then the first modification application audit passes through.Further, corresponding educational administration in main storage space is updated according to the first modification application
Core data, and proofreaded, two dimensional code is regenerated according to modified educational administration's core data after collated correct, before replacement
Two dimensional code.In addition, further including the educational administration's core data for printing collated correct, and archive of signing.
(3) by main storage space core data and synchronous two-dimension code to application memory space, and by application memory sky
Between in educational administration's core data and two dimensional code back up memory space is backuped to by the way of encrypted transmission, and grasped as follows
Make:
(a) after receiving from the second modification application of the first rights client, the audit of third rights client should
Second modification application, audit is by then updating phase in main storage space according to the second modification application by third rights client
Educational administration's core data for answering simultaneously forms new two dimensional code;
(b) by educational administration's core data updated in application memory space and corresponding two dimension after meeting preset condition
Code is synchronized to application memory space and backups to back up memory space.
Preset condition is as follows in the present embodiment:
The educational administration for reaching the time interval (in the present embodiment for 1 month) of setting or being updated in the time interval of the setting
The quantity of core data is more than educational administration's core number of preset update amount threshold (increase newly in the present embodiment is 50) or input
According to quantity be more than preset input amount threshold (increase newly in the present embodiment is 1000).
Further include every time following steps after the completion of backup for the reliability for further increasing educational administration's core data:
(S1) network connection of application memory space and back up memory space is disconnected;
(S2) to the educational administration's core data and two dimensional code backuped in back up memory space, and the educational administration obtained according to decryption
The corresponding relationship of core data and two dimensional code determines whether educational administration's core data is correct in back up memory space:
If the two is corresponding, then it is assumed that educational administration's core data is correct in back up memory space;
Otherwise it is assumed that educational administration's core data is incorrect in back up memory space, again by the educational administration in application memory space
Core data and two dimensional code backup to back up memory space.
Step (3) corresponds to the stabilization sub stage, enters the stabilization sub stage after public notification period, stage educational administration's core data is still
It may so need to modify, but modify relatively fewer.At this stage, educational administration's core data in main storage space is synchronized to first
Application memory space is achieved, and by the content backup in application memory space to back up memory space.When needing to modify,
It is identical as the publicity stage still to propose that the second modification is applied using the first rights client by educational administration core data producer, it is different
Be by Educational Affairs Office be responsible for log in third rights client to this second modification application audit, by this second modification apply into
Row publicity, publicity is without doubtful point, then it is assumed that the second modification application audit passes through.After the approval according to the second modification application modification
Corresponding educational administration core data in application memory space, further proofreads modified educational administration's core data, proofreads nothing
Two dimensional code is regenerated according to modified educational administration's core data after accidentally.In addition, further including the educational administration's core for printing collated correct
Data, and archive of signing.
The educational administration's core data inputted in the present embodiment includes data content and data directory.First modification application includes needing
The data directory and replacement data content of the educational administration's core data to be modified.Second modification application includes the educational administration's core for needing to modify
Data directory, replacement data content and the modification reason of calculation evidence.
Technical solution of the present invention and beneficial effect is described in detail in above-described specific embodiment, Ying Li
Solution is not intended to restrict the invention the foregoing is merely presently most preferred embodiment of the invention, all in principle model of the invention
Interior done any modification, supplementary, and equivalent replacement etc. are enclosed, should all be included in the protection scope of the present invention.
Claims (9)
1. a kind of educational administration's core data guard method based on physical isolation and image encryption, which is characterized in that including walking as follows
It is rapid:
(1) educational administration's core data is inputted using the first rights client, two dimensional code is generated according to educational administration's core data of input, and
Educational administration's core data and corresponding two dimensional code are stored to main storage space;
(2) the first modification application from the first rights client is received in the public notification period of setting, after public notification period,
Audit the modification application of each item first using the second rights client, audit by then by the second rights client according to this first
Modification application updates corresponding educational administration's core data in main storage space and forms new two dimensional code;
(3) by main storage space core data and synchronous two-dimension code to application memory space, and will be in application memory space
Educational administration's core data and two dimensional code backup to back up memory space, and proceed as follows:
It (a), should using the audit of third rights client after receiving from the second modification application of the first rights client
Second modification application, audit is by then updating phase in main storage space according to the second modification application by third rights client
Educational administration's core data for answering simultaneously forms new two dimensional code;
(b) quantity of the educational administration's core data updated at set time intervals or in the time interval of the setting is more than pre-
If update amount threshold or input educational administration's core data quantity be more than preset input amount threshold after, primary storage is empty
Between in updated educational administration's core data and synchronous two-dimension code to application memory space and backup to back up memory space;Described
Application memory space and back up memory space only connect in backup procedure.
2. educational administration's core data guard method based on physical isolation and image encryption, feature exist as described in claim 1
In educational administration's core data of input includes data content and data directory.
3. educational administration's core data guard method based on physical isolation and image encryption, feature exist as described in claim 1
In the first modification application includes the data directory and replacement data content for needing the educational administration's core data modified.
4. educational administration's core data guard method based on physical isolation and image encryption, feature exist as described in claim 1
In the second modification application includes the data directory for needing the educational administration's core data modified, replacement data content and repairs
Change reason.
5. educational administration's core based on physical isolation and image encryption as described in any one of Claims 1 to 4 claim
Data guard method, which is characterized in that by educational administration's core data and two dimensional code by the way of encrypted transmission in the step (3)
Backup to back up memory space.
6. educational administration's core data guard method based on physical isolation and image encryption, feature exist as claimed in claim 5
In the time interval is 7~20 days.
7. educational administration's core data guard method based on physical isolation and image encryption, feature exist as claimed in claim 5
In the update amount threshold 50~100.
8. educational administration's core data guard method based on physical isolation and image encryption, feature exist as claimed in claim 5
In the input amount threshold 500~1000.
9. educational administration's core data guard method based on physical isolation and image encryption, feature exist as claimed in claim 5
In backup further includes after the completion operating as follows:
The educational administration that the educational administration's core data and two dimensional code that backup in back up memory space are decrypted, and obtained according to decryption
The corresponding relationship of core data and two dimensional code determines whether educational administration's core data is correct in back up memory space:
If the two is corresponding, then it is assumed that educational administration's core data is correct in back up memory space;
Otherwise it is assumed that educational administration's core data is incorrect in back up memory space, again by educational administration's core in application memory space
Data and two dimensional code backup to back up memory space.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085636.6A CN106503571B (en) | 2016-11-30 | 2016-11-30 | Educational administration's core data guard method based on physical isolation and image encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085636.6A CN106503571B (en) | 2016-11-30 | 2016-11-30 | Educational administration's core data guard method based on physical isolation and image encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106503571A CN106503571A (en) | 2017-03-15 |
CN106503571B true CN106503571B (en) | 2019-04-16 |
Family
ID=58327738
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611085636.6A Active CN106503571B (en) | 2016-11-30 | 2016-11-30 | Educational administration's core data guard method based on physical isolation and image encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106503571B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102521078A (en) * | 2011-12-01 | 2012-06-27 | 北京邮电大学 | Educational administration resource grade backup method based on third party cloud |
CN105554714A (en) * | 2015-04-13 | 2016-05-04 | 三峡大学 | Secret-involved internal network secure short message gateway based on two-dimensional code |
CN105847290A (en) * | 2016-05-17 | 2016-08-10 | 江苏飞搏软件股份有限公司 | Data transmission method and data transmission system for physical isolation network |
-
2016
- 2016-11-30 CN CN201611085636.6A patent/CN106503571B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102521078A (en) * | 2011-12-01 | 2012-06-27 | 北京邮电大学 | Educational administration resource grade backup method based on third party cloud |
CN105554714A (en) * | 2015-04-13 | 2016-05-04 | 三峡大学 | Secret-involved internal network secure short message gateway based on two-dimensional code |
CN105847290A (en) * | 2016-05-17 | 2016-08-10 | 江苏飞搏软件股份有限公司 | Data transmission method and data transmission system for physical isolation network |
Non-Patent Citations (1)
Title |
---|
基于ASP+Oracle的学生统一信息管理平台设计;朱希伟;《工业和信息化教育》;20150430;第87-95页 |
Also Published As
Publication number | Publication date |
---|---|
CN106503571A (en) | 2017-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7330596B2 (en) | BLOCKCHAIN DATA ARCHIVING METHOD, BLOCKCHAIN DATA ARCHIVING DEVICE, ELECTRONIC DEVICE, AND COMPUTER PROGRAM | |
EP3610383B1 (en) | Data isolation in blockchain networks | |
KR102247658B1 (en) | Processing of blockchain data based on smart contract behavior executed in a trusted execution environment | |
CN102170440B (en) | Method suitable for safely migrating data between storage clouds | |
CN110602147B (en) | Data encryption safe storage method, system and storage medium based on cloud platform | |
EP3669522A2 (en) | Managing cybersecurity vulnerabilities using blockchain networks | |
US20130305054A1 (en) | Truly anonymous cloud key broker | |
CN100449501C (en) | Computer network datarecovering method | |
CN101827101A (en) | Information asset protection method based on credible isolated operating environment | |
WO2020258858A1 (en) | Authorization method, system, apparatus and device in blockchain-type account book | |
CN107871081A (en) | A kind of computer information safe system | |
CN107040520A (en) | A kind of cloud computing data-sharing systems and method | |
CN111488331B (en) | Database connection method and device and computer equipment | |
AU2017296038B2 (en) | Digital asset architecture | |
CN110555682B (en) | Multi-channel implementation method based on alliance chain | |
CN106503571B (en) | Educational administration's core data guard method based on physical isolation and image encryption | |
CN109254872A (en) | A kind of security access system for education big data | |
CN106575341A (en) | Composite document access | |
Carter et al. | Securing SQL Server | |
CN110689463A (en) | Teaching management platform | |
CN116090020B (en) | Block chain-based information storage method and device, electronic equipment and storage medium | |
CN110049054A (en) | The plaintext shared data auditing method and system for supporting privacy information hiding | |
Lubis et al. | IT Risk Analysis Based on Risk Management Using ISO 31000: Case study Registration Application at University XYZ | |
US20220222367A1 (en) | Data aggregation for analysis and secure storage | |
Kumar et al. | Data security framework for data-centers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |