CN106503571B - Educational administration's core data guard method based on physical isolation and image encryption - Google Patents

Educational administration's core data guard method based on physical isolation and image encryption Download PDF

Info

Publication number
CN106503571B
CN106503571B CN201611085636.6A CN201611085636A CN106503571B CN 106503571 B CN106503571 B CN 106503571B CN 201611085636 A CN201611085636 A CN 201611085636A CN 106503571 B CN106503571 B CN 106503571B
Authority
CN
China
Prior art keywords
educational administration
core data
memory space
data
dimensional code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611085636.6A
Other languages
Chinese (zh)
Other versions
CN106503571A (en
Inventor
刘向东
叶青松
谢桂红
郑红建
张胜宇
戴革萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengfang Software Co Ltd
Zhejiang University ZJU
Original Assignee
Zhengfang Software Co Ltd
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengfang Software Co Ltd, Zhejiang University ZJU filed Critical Zhengfang Software Co Ltd
Priority to CN201611085636.6A priority Critical patent/CN106503571B/en
Publication of CN106503571A publication Critical patent/CN106503571A/en
Application granted granted Critical
Publication of CN106503571B publication Critical patent/CN106503571B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

Educational administration's core data guard method based on physical isolation and image encryption that the invention discloses a kind of, for the rights client that different operation settings is different in this method, including the first rights client, second rights client and the second rights client, and corresponding two dimensional code is formed according to educational administration's core data, it is stored by the first rights client to main storage space, the educational administration's core data and two dimensional code of main storage space are stored to application memory space by the second rights client, the data of application memory space and two dimensional code are backed up into back up memory space by third client again, and application memory space is only connected in backup with back up memory space.The present invention substantially increases modification difficulty by Role Management and rights management, it is possible to prevente effectively from educational administration's core data is destroyed or distorts, carries out image encryption using two dimensional code, and using encrypted transmission mode, data is effectively prevent to be tampered.

Description

Educational administration's core data guard method based on physical isolation and image encryption
Technical field
The present invention relates to teaching management technological system technical fields, and in particular to one kind is based on physical isolation and image encryption Educational administration's core data guard method.
Background technique
Educational Affairs Office is important teaching operations functional department, school, is the pivot that each teaching unit of school is connected each other and linked up Knob, the important administrative department for promoting reform in education and teaching, guaranteeing Talent-cultivating Quality.Affairs involved in teaching reform in university are non- It is often many and diverse, it is related to the part management work of school Educational Affairs Office, the teaching management of each system, the educational administration of teacher and student.Therefore Supervision and management that educational administration management system should be conducive to Educational Affairs Office is conducive to each system again and teacher shares out the work and helps one another, and takes into account religion Teacher and two class of student use object.The major function of educational administration management system includes: school teaching management, is teaching management, Jiao Shijiao Business, student, which take make-up exam, rebuilds and takes as an elective course management, and main includes the safety and rights management, data inputting, data maintenance, browsing of system The modules such as management, print management, achievement publication are taken as an elective course in query function, statistical analysis, make-up examination and reconditioning management.
Educational administration's core data is the significant data that Educational Affairs Office is formed during teaching management, mostly in the form of electronic record It is stored in the educational administration management system of each colleges and universities local.Electronic record can greatly improve data storage and processing capacity, still It also will increase various risks accordingly, such as virus, Trojan Horse invasion, and not from other of network-external or internal progress Authorized access so that educational archives are in generation, storage, processing and exchange process, all exist divulge a secret or by intercept, steal A possibility that listening, alter and forging.Therefore, the safety of the safety of educational administration's core data and internet security and computer system The safety of property and operating system, network system is closely connected, mutually supports.
As what the development of educational undertaking and University Education were reformed gos deep into, the educational administration's core formed during teaching management Data are more and more, more and more important.The protection of educational administration's core data has become the important component of Educational Affairs Office work, religion The quality for core data management work of being engaged in, by the reality of the performance for directly influencing Educational Affairs Office function and expected management objectives of imparting knowledge to students It is existing, or even influence the reputation of school.It is limited for the safeguard measure of educational administration's core data in existing educational administration management system, Teaching management core data is caused to there is very big security risk.Therefore, institute is used to prevent educational administration's core data illegal Caused by leaking data, change or destruction, reduce or avoid as all kinds of disasters or malicious attack and caused by educational administration's core The loss of data improves the safety and reliability of educational administration's core data there is an urgent need to protect to educational administration's core data.
Summary of the invention
In view of the deficiencies of the prior art, the present invention provides a kind of based on the educational administration's core number being physically isolated with image encryption According to guard method.
A kind of educational administration's core data guard method based on physical isolation and image encryption, includes the following steps:
(1) educational administration's core data is inputted using the first rights client, two dimension is generated according to educational administration's core data of input Code, and educational administration's core data and corresponding two dimensional code are stored to main storage space;
(2) the first modification application from the first rights client is received in the public notification period of setting, when public notification period knot Shu Hou audits the modification application of each item first using the second rights client, audit by then by the second rights client according to The first modification application updates corresponding educational administration's core data and corresponding two dimensional code in main storage space;
(3) by main storage space core data and synchronous two-dimension code to application memory space, and by application memory sky Between in educational administration's core data and two dimensional code backup to back up memory space, and proceed as follows:
(a) it after receiving from the second modification application of the first rights client, is examined using third rights client Core the second modification application, audit, which passes through, then updates application memory sky according to the second modification application by third rights client Between in corresponding educational administration's core data and two dimensional code;
(b) quantity of the educational administration's core data updated at set time intervals or in the time interval of the setting is super The quantity of educational administration's core data of preset update amount threshold or input is crossed more than after preset input amount threshold, will be applied Updated educational administration's core data and two dimensional code backup to back up memory space in memory space.
For any modification application (including the first modification application and the second modification are applied) in the present invention, if audit is not Pass through, then without updating or modifying operation accordingly.
It is synchronous in educational administration's core data guard method of the invention to generate, transmission, update educational administration's core data and two dimensional code, The reliability of educational administration's core data transmission is improved, to further improve the reliability of educational administration's core data storage, also according to The amount threshold of time threshold or educational administration's core data of modification is by the educational administration's core data modified in application memory space And corresponding two dimensional code backups to back up memory space.
The first rights client, the second rights client, third rights client in the present invention use logon rights, tie up Determine the methods of IP, the operation of special messenger's U-shield, Role Management and rights management setting, the characteristics of according to teaching management, can set different Client is the first rights client, the second rights client and third rights client, can also pass through logon rights, binding IP, the operation of special messenger's U-shield, Role Management and method, realize the first rights client, the second rights client in a client With the function of third rights client.
User in step (2) and step (3) in corresponding authority passes through the first rights client according to demand and submits first Modification application or the second application modification, if not needing, do not propose to modify.For step (2) if in public notification period, corresponding authority User do not submit the first modification application, then after public notification period, be directly entered step (3) without follow-up checks and update The operation of corresponding educational administration's core data and corresponding two dimensional code in main storage space.Similarly, for step (3), if corresponding power The user of limit does not submit the second modification application, then does not execute step (a).In step (b) three conditions meet wherein any one It is then backed up, to prevent loss of data.
Signified audit in the present invention refers to that the user of corresponding authority utilizes corresponding client (the second rights client Or third rights client carries out publicity, if doubtful point is not received in public notification period, then it is assumed that audit passes through, otherwise it is assumed that audit is not Pass through.For each modification application (including the first modification application and second modification application), only audit is by carrying out accordingly Update.
Main storage space, application memory space and back up memory space can be storage server in the present invention, wherein standby Part memory space can also be the storage devices such as USB flash disk, mobile hard disk.
For the reliability for guaranteeing educational administration's core data, in the present invention after each step, the user of corresponding permission is It needs to print last educational administration's core data, and will be saved after the signature of the paper of printing as paper shelves.
For the educational administration's core data being originally inputted and every time, modified educational administration's core data can be given birth in the present invention At two dimensional code, and all two dimensional codes retain, and multiple two dimensional codes may be corresponded to by just having deformed educational administration's core data in this way Situation can change the modification process of educational administration's core data according to the variation of two dimensional code in this way with tracking.
Preferably, educational administration's core data of input includes data content and data directory.
Setting index be convenient for data query, subsequent operating process easy to accomplish, the present invention in data directory can for should The title of educational administration's core data.
The first modification application includes the data directory and replacement data content for needing the educational administration's core data modified.
The described second modification application include the data directory for needing the educational administration's core data modified, replacement data content with And modification reason.
First modification application and the second modification application occur in the different stages, the characteristics of according to educational administration's core data, no The same stage, also different to the modification occurrence frequency of educational administration's core data, corresponding modification requires also different.It flexibly sets different Modification application, increases the application range of educational administration's core data guard method of the invention.First modification application and second are repaired When changing application audit, the first modification application and the second modification application are directly subjected to publicity, if not having within certain publicity time limit Receive doubtful point, then it is assumed that audit passes through.Corresponding memory space (the first modification Shen is inquired using data directory after the approval Please inquire main storage space, the second modification application inquiry application memory space) determine the educational administration's core data for needing to modify, it is used in combination Replacement data content replaces the data content of educational administration's core data.
Educational administration's core data and two dimensional code are backuped into backup storage sky by the way of encrypted transmission in the step (3) Between.
By encrypted transmission mode, prevents educational administration's core data to be stolen by others or distort in transmission process, increase The safety of educational administration's core data transmission.
Further include operating as follows after the completion of backup to further increase safety and reliability:
The educational administration's core data and two dimensional code that backup in back up memory space are decrypted, and obtained according to decryption The corresponding relationship of educational administration's core data and two dimensional code determines whether educational administration's core data is correct in back up memory space:
If the two is corresponding, then it is assumed that educational administration's core data is correct in back up memory space;
Otherwise it is assumed that educational administration's core data is incorrect in back up memory space, again by the educational administration in application memory space Core data and two dimensional code backup to back up memory space.
Two dimensional code is mainly used as identifying code to verify the correctness of educational administration's core data, as a kind of identifying code in the present invention It can also be realized using the identifying code of other classes.
Preferably, the application memory space and back up memory space only connects in backup procedure.
Disconnect application memory space and back up memory space to reach physical isolation, i.e. transient state is fixed Phase is synchronous, normality isolation, when can prevent entire educational administration management system from disaster occurs in this way, still is able to guarantee that backup storage is empty Between in content do not lose, improve redundancy ability.
The time interval and the amount threshold of setting (including updating amount threshold and input amount threshold) are related to application The frequency of memory space and back up memory space, the two can dynamic regulations according to the actual situation.
Preferably, the time interval is 7~20 days, and the update amount threshold 50~100, the input Amount threshold 500~1000.
Compared with prior art, the present invention has the advantage that
Educational administration's core data is made a backup store, and for backing up the back up memory space stored and being used to store source document The application memory space of part is physically isolated, and when disaster occurs for entire educational administration management system, guarantees the number in back up memory space According to not losing;
Image encryption is carried out using two dimensional code, and is using encrypted transmission mode, data is effectively prevent to be tampered;
Backed up in synchronization educational administration core data and corresponding two dimensional code, two dimensional code are not easy to be tampered in transmission process, finally By the corresponding relationship of educational administration's core data and two dimensional code in back up memory space, the correctness of backup is determined, it is incorrect, it weighs New backup, can educational administration's core data in back up memory space it is synchronous in application memory space;
For the different rights client of different operation settings, is substantially increased and repaired by Role Management and rights management Change difficulty, it is possible to prevente effectively from educational administration's core data is destroyed or distorts.
Detailed description of the invention
Fig. 1 is the flow chart of educational administration's core data guard method of the present embodiment.
Specific embodiment
Below in conjunction with the drawings and specific embodiments, the present invention will be described in detail.
Educational administration's core data guard method of the invention is implemented on following educational administration management system, the educational administration management system packet It includes:
Three memory spaces, respectively main storage space, application memory space and back up memory space;
Three kinds of rights clients, are respectively as follows:
First rights client generates two dimensional code according to educational administration's core data of input for inputting educational administration's core data, And educational administration's core data and the storage of corresponding two dimensional code will be inputted to the first number memory space, it is also used to input in public notification period First modification application inputs the second modification application after first;
Second rights client, after public notification period, audit the first modification application, audit according to this by then first repairing Change application and updates corresponding educational administration's core data and two dimensional code in main storage space;
Third rights client, for auditing the second modification application, audit according to the first modification application by then updating Corresponding educational administration's core data and two dimensional code in application memory space;
Master Control Center, for the data in application memory space to be backuped to back up memory space, the first limit client of setting End, the second limit client and third rights client;
Wherein, the first rights client, the second rights client, third rights client are arranged using logon rights, are tied up Determine the methods of IP, the operation of special messenger's U-shield setting, main storage space, application memory space and back up memory space are storage server, Application memory space and back up memory space are only in network connection state in data backup, are hereafter in an off state.
A kind of educational administration's core data guard method based on physical isolation and image encryption, as shown in Figure 1, including following step It is rapid:
(1) educational administration's core data is inputted using the first rights client, two dimension is generated according to educational administration's core data of input Code, and educational administration's core data and corresponding two dimensional code are stored to main storage space.
Step (1) corresponds to the typing stage, and educational administration core data producer logs in the first rights client, utilizes the first visitor Family end inputs and proofreads educational administration's core data, and two dimensional code is generated after collated correct and generates corresponding two dimensional code, and will be after check and correction Educational administration's core data and corresponding two dimensional code are uploaded to main storage space.In addition, also printing educational administration's core number after the completion of check and correction According to, and carry out paper archive.
Educational administration's core data of the check and correction printing input of the present embodiment, and be compared and modify according to the input data.
(2) it receives in the public notification period of setting (being 10 days in the present embodiment) and is repaired from the first of the first rights client Change application, after public notification period, the second rights client audits the modification application of each item first, audit by then according to this first Modification application updates corresponding educational administration's core data and corresponding two dimensional code in main storage space.
Step (2) corresponds to the publicity stage, carries out inquiry check and correction using publicity method towards masses within the publicity stage, when Masses' discovery educational administration's core data reacts when wrong to corresponding educational administration's core data producer, and educational administration's core data logs in first Rights client proposes corresponding first modification application, and the department manager of educational administration core data producer logs in the second permission client The first modification application is audited at end end, checking method are as follows: the first modification application is carried out publicity, publicity is not asked Topic, then the first modification application audit passes through.Further, corresponding educational administration in main storage space is updated according to the first modification application Core data, and proofreaded, two dimensional code is regenerated according to modified educational administration's core data after collated correct, before replacement Two dimensional code.In addition, further including the educational administration's core data for printing collated correct, and archive of signing.
(3) by main storage space core data and synchronous two-dimension code to application memory space, and by application memory sky Between in educational administration's core data and two dimensional code back up memory space is backuped to by the way of encrypted transmission, and grasped as follows Make:
(a) after receiving from the second modification application of the first rights client, the audit of third rights client should Second modification application, audit is by then updating phase in main storage space according to the second modification application by third rights client Educational administration's core data for answering simultaneously forms new two dimensional code;
(b) by educational administration's core data updated in application memory space and corresponding two dimension after meeting preset condition Code is synchronized to application memory space and backups to back up memory space.
Preset condition is as follows in the present embodiment:
The educational administration for reaching the time interval (in the present embodiment for 1 month) of setting or being updated in the time interval of the setting The quantity of core data is more than educational administration's core number of preset update amount threshold (increase newly in the present embodiment is 50) or input According to quantity be more than preset input amount threshold (increase newly in the present embodiment is 1000).
Further include every time following steps after the completion of backup for the reliability for further increasing educational administration's core data:
(S1) network connection of application memory space and back up memory space is disconnected;
(S2) to the educational administration's core data and two dimensional code backuped in back up memory space, and the educational administration obtained according to decryption The corresponding relationship of core data and two dimensional code determines whether educational administration's core data is correct in back up memory space:
If the two is corresponding, then it is assumed that educational administration's core data is correct in back up memory space;
Otherwise it is assumed that educational administration's core data is incorrect in back up memory space, again by the educational administration in application memory space Core data and two dimensional code backup to back up memory space.
Step (3) corresponds to the stabilization sub stage, enters the stabilization sub stage after public notification period, stage educational administration's core data is still It may so need to modify, but modify relatively fewer.At this stage, educational administration's core data in main storage space is synchronized to first Application memory space is achieved, and by the content backup in application memory space to back up memory space.When needing to modify, It is identical as the publicity stage still to propose that the second modification is applied using the first rights client by educational administration core data producer, it is different Be by Educational Affairs Office be responsible for log in third rights client to this second modification application audit, by this second modification apply into Row publicity, publicity is without doubtful point, then it is assumed that the second modification application audit passes through.After the approval according to the second modification application modification Corresponding educational administration core data in application memory space, further proofreads modified educational administration's core data, proofreads nothing Two dimensional code is regenerated according to modified educational administration's core data after accidentally.In addition, further including the educational administration's core for printing collated correct Data, and archive of signing.
The educational administration's core data inputted in the present embodiment includes data content and data directory.First modification application includes needing The data directory and replacement data content of the educational administration's core data to be modified.Second modification application includes the educational administration's core for needing to modify Data directory, replacement data content and the modification reason of calculation evidence.
Technical solution of the present invention and beneficial effect is described in detail in above-described specific embodiment, Ying Li Solution is not intended to restrict the invention the foregoing is merely presently most preferred embodiment of the invention, all in principle model of the invention Interior done any modification, supplementary, and equivalent replacement etc. are enclosed, should all be included in the protection scope of the present invention.

Claims (9)

1. a kind of educational administration's core data guard method based on physical isolation and image encryption, which is characterized in that including walking as follows It is rapid:
(1) educational administration's core data is inputted using the first rights client, two dimensional code is generated according to educational administration's core data of input, and Educational administration's core data and corresponding two dimensional code are stored to main storage space;
(2) the first modification application from the first rights client is received in the public notification period of setting, after public notification period, Audit the modification application of each item first using the second rights client, audit by then by the second rights client according to this first Modification application updates corresponding educational administration's core data in main storage space and forms new two dimensional code;
(3) by main storage space core data and synchronous two-dimension code to application memory space, and will be in application memory space Educational administration's core data and two dimensional code backup to back up memory space, and proceed as follows:
It (a), should using the audit of third rights client after receiving from the second modification application of the first rights client Second modification application, audit is by then updating phase in main storage space according to the second modification application by third rights client Educational administration's core data for answering simultaneously forms new two dimensional code;
(b) quantity of the educational administration's core data updated at set time intervals or in the time interval of the setting is more than pre- If update amount threshold or input educational administration's core data quantity be more than preset input amount threshold after, primary storage is empty Between in updated educational administration's core data and synchronous two-dimension code to application memory space and backup to back up memory space;Described Application memory space and back up memory space only connect in backup procedure.
2. educational administration's core data guard method based on physical isolation and image encryption, feature exist as described in claim 1 In educational administration's core data of input includes data content and data directory.
3. educational administration's core data guard method based on physical isolation and image encryption, feature exist as described in claim 1 In the first modification application includes the data directory and replacement data content for needing the educational administration's core data modified.
4. educational administration's core data guard method based on physical isolation and image encryption, feature exist as described in claim 1 In the second modification application includes the data directory for needing the educational administration's core data modified, replacement data content and repairs Change reason.
5. educational administration's core based on physical isolation and image encryption as described in any one of Claims 1 to 4 claim Data guard method, which is characterized in that by educational administration's core data and two dimensional code by the way of encrypted transmission in the step (3) Backup to back up memory space.
6. educational administration's core data guard method based on physical isolation and image encryption, feature exist as claimed in claim 5 In the time interval is 7~20 days.
7. educational administration's core data guard method based on physical isolation and image encryption, feature exist as claimed in claim 5 In the update amount threshold 50~100.
8. educational administration's core data guard method based on physical isolation and image encryption, feature exist as claimed in claim 5 In the input amount threshold 500~1000.
9. educational administration's core data guard method based on physical isolation and image encryption, feature exist as claimed in claim 5 In backup further includes after the completion operating as follows:
The educational administration that the educational administration's core data and two dimensional code that backup in back up memory space are decrypted, and obtained according to decryption The corresponding relationship of core data and two dimensional code determines whether educational administration's core data is correct in back up memory space:
If the two is corresponding, then it is assumed that educational administration's core data is correct in back up memory space;
Otherwise it is assumed that educational administration's core data is incorrect in back up memory space, again by educational administration's core in application memory space Data and two dimensional code backup to back up memory space.
CN201611085636.6A 2016-11-30 2016-11-30 Educational administration's core data guard method based on physical isolation and image encryption Active CN106503571B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611085636.6A CN106503571B (en) 2016-11-30 2016-11-30 Educational administration's core data guard method based on physical isolation and image encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611085636.6A CN106503571B (en) 2016-11-30 2016-11-30 Educational administration's core data guard method based on physical isolation and image encryption

Publications (2)

Publication Number Publication Date
CN106503571A CN106503571A (en) 2017-03-15
CN106503571B true CN106503571B (en) 2019-04-16

Family

ID=58327738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611085636.6A Active CN106503571B (en) 2016-11-30 2016-11-30 Educational administration's core data guard method based on physical isolation and image encryption

Country Status (1)

Country Link
CN (1) CN106503571B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521078A (en) * 2011-12-01 2012-06-27 北京邮电大学 Educational administration resource grade backup method based on third party cloud
CN105554714A (en) * 2015-04-13 2016-05-04 三峡大学 Secret-involved internal network secure short message gateway based on two-dimensional code
CN105847290A (en) * 2016-05-17 2016-08-10 江苏飞搏软件股份有限公司 Data transmission method and data transmission system for physical isolation network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521078A (en) * 2011-12-01 2012-06-27 北京邮电大学 Educational administration resource grade backup method based on third party cloud
CN105554714A (en) * 2015-04-13 2016-05-04 三峡大学 Secret-involved internal network secure short message gateway based on two-dimensional code
CN105847290A (en) * 2016-05-17 2016-08-10 江苏飞搏软件股份有限公司 Data transmission method and data transmission system for physical isolation network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于ASP+Oracle的学生统一信息管理平台设计;朱希伟;《工业和信息化教育》;20150430;第87-95页

Also Published As

Publication number Publication date
CN106503571A (en) 2017-03-15

Similar Documents

Publication Publication Date Title
JP7330596B2 (en) BLOCKCHAIN DATA ARCHIVING METHOD, BLOCKCHAIN DATA ARCHIVING DEVICE, ELECTRONIC DEVICE, AND COMPUTER PROGRAM
EP3610383B1 (en) Data isolation in blockchain networks
KR102247658B1 (en) Processing of blockchain data based on smart contract behavior executed in a trusted execution environment
CN102170440B (en) Method suitable for safely migrating data between storage clouds
CN110602147B (en) Data encryption safe storage method, system and storage medium based on cloud platform
EP3669522A2 (en) Managing cybersecurity vulnerabilities using blockchain networks
US20130305054A1 (en) Truly anonymous cloud key broker
CN100449501C (en) Computer network datarecovering method
CN101827101A (en) Information asset protection method based on credible isolated operating environment
WO2020258858A1 (en) Authorization method, system, apparatus and device in blockchain-type account book
CN107871081A (en) A kind of computer information safe system
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN111488331B (en) Database connection method and device and computer equipment
AU2017296038B2 (en) Digital asset architecture
CN110555682B (en) Multi-channel implementation method based on alliance chain
CN106503571B (en) Educational administration's core data guard method based on physical isolation and image encryption
CN109254872A (en) A kind of security access system for education big data
CN106575341A (en) Composite document access
Carter et al. Securing SQL Server
CN110689463A (en) Teaching management platform
CN116090020B (en) Block chain-based information storage method and device, electronic equipment and storage medium
CN110049054A (en) The plaintext shared data auditing method and system for supporting privacy information hiding
Lubis et al. IT Risk Analysis Based on Risk Management Using ISO 31000: Case study Registration Application at University XYZ
US20220222367A1 (en) Data aggregation for analysis and secure storage
Kumar et al. Data security framework for data-centers

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant