CN107403107A - A kind of data safety control method and system based on multipoint cooperative mechanism - Google Patents

A kind of data safety control method and system based on multipoint cooperative mechanism Download PDF

Info

Publication number
CN107403107A
CN107403107A CN201710586064.8A CN201710586064A CN107403107A CN 107403107 A CN107403107 A CN 107403107A CN 201710586064 A CN201710586064 A CN 201710586064A CN 107403107 A CN107403107 A CN 107403107A
Authority
CN
China
Prior art keywords
data
node
data safety
value
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710586064.8A
Other languages
Chinese (zh)
Other versions
CN107403107B (en
Inventor
陈建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Runjian Co ltd
Electric Power Research Institute of Guangxi Power Grid Co Ltd
Original Assignee
Beijing First Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing First Science And Technology Co Ltd filed Critical Beijing First Science And Technology Co Ltd
Priority to CN201710586064.8A priority Critical patent/CN107403107B/en
Publication of CN107403107A publication Critical patent/CN107403107A/en
Application granted granted Critical
Publication of CN107403107B publication Critical patent/CN107403107B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/349Rechargeable cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Medical Informatics (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of data safety control method and system based on multipoint cooperative mechanism, data safety of the cloud end node reception from local device, and the data safety is stored in multiple memory nodes.The present invention can realize the safety purchase of data safety, and it is based on multipoint cooperative mechanism, the present invention effectively prevent the leakage of data, maliciously distort or illegally consult, the security of data is greatly ensure that, just, believable performing environment is provided especially for transaction in assets, data circulation etc..

Description

A kind of data safety control method and system based on multipoint cooperative mechanism
Technical field
The present invention relates to data safety management field, more particularly to a kind of data safety management based on multipoint cooperative mechanism Method and system.
Background technology
With science and technology development, internet information flourish, people in work or life produced by and record Data it is more and more, every field generally all establishes database to store and manage these data, and these data are included but not It is limited to audio, video data, computer data, E-government information, data safety (for example, commodity or service stored-value card data) etc..
In addition, as the fast development of economy and the continuous progress, stored value card, prepaid card etc. of network technology pay work Tool is developed rapidly, is divided by issuer, and stored value card can be divided into two classes, and one kind is the stored value card of issued by banks, It is exactly debit card;Another kind of is the business stored value card of non-financial institution's distribution, and it is mainly used in public sphere, such as trade company's hair Capable electronic business transaction card, such as enterprise, colleges and universities, electric business platform, the super facility of business, food and beverage sevice, article leasehold, beauty and personal nursing Various types of stored value cards of the field distribution such as industry, sport and body-building, game entertainment.User prestores certain amount of money to stored value card On, then used for follow-up, in addition, when buying stored value card, trade company can specify discount or Presenting gifts, to promote commodity to hand over Easily.In addition, with APP fast development, trade company develops various types of APP, and stored value card is used to electronic card form use. Either entity card or electronic card, such as the data safety management of stored value card be present.
For example, in the prior art, because stored-value-card issuance main body does not have the clear and definite market access limitation, do not supervise effectively Mechanism, thus stored value card faces various risks.The issuer prestige height of non-banking stored value card differs, and bankruptcy be present Or the risk of dolus malus, moreover, user is when buying stored value card, can not the objective qualification and creditworthiness for understanding trade company, nothing The preferential dynamics of method accurate judgement stored value card, thus the security of the data safeties such as stored value card how is improved, realize data safety Safety management, turn into the problem of in the urgent need to address.
In addition, it is current, mainly take Local or Remote mode to come centrally stored and manage these data safeties.For example, PC The equipment storage management data safety such as computer, mobile terminal, or based on the (such as client/service of conventional network system framework Device pattern or Browser/Server Mode) storage management data safety.Although these centrally stored data safeties meet use The demand of family convenience, but storage server turns into the bottleneck of systematic function, and the security of data safety is also urgently to be resolved hurrily Problem.
Existing safety measure focuses on the invasion difficulty of Strengthens network fire wall and the encryption of system, makes network attack It is difficult to invade or distorts the data safety that is stored on computer, mobile terminal or server.But existing network attack is often Network firewall can be broken through easily, crack the password on computer, mobile terminal or server, cause data safety leakage or Person distorts, and is brought about great losses to user or ISP.In addition, also there is asking in can not preventing for the storage of centralization Topic, some internal staff can also reveal easily or altered data safety.For example, the valuable money for similar stored-value card data etc Often active attack trade company or the related service business such as production, the trojan horse program of malice, hacker's tissue, in the hope of distort stored-value card data from And illegally make a profit, moreover, some internal staff of trade company or related service business also can reveal or distort easily stored-value card data from And illegally make a profit.It is especially even more self-evident in present big data epoch, the importance of network security.Therefore, how to carry The security to guarantee data security, it is urgent problem in this area for a kind of safe data safety control method.
The content of the invention
In order to solve the above problems, it is a primary object of the present invention to provide a kind of data peace based on multipoint cooperative mechanism Full management method and system, can realize the safety purchase of data safety, and be based on multipoint cooperative mechanism, can effectively prevent The leakage of data safety, maliciously distort or illegally consult, greatly ensure that the security of data safety, handed over especially for assets Easily, data circulation etc. provides just, believable performing environment.
According to an aspect of the present invention, the invention provides a kind of data safety management side based on multipoint cooperative mechanism Method, including:Step 11, the third party authoritative institution of high in the clouds node receives data of the transmission from local device on assets, The third party authoritative institution calculates the relative year earning rate of the data from local device, and by the year earning rate of calculating Return to local device and user side user equipment;Step 12, the local device is generated original based on the selection of user equipment Data safety, and the initial data is securely transmitted to high in the clouds node;Step 13, one of member node of the high in the clouds node The initial data safety from local device is received, the selected initial data safety works as value node;Step 14, it is described when value After node receives initial data safety, multiple memory nodes of the initial data safety are determined;Step 15, it is the multiple to deposit Node is stored up to whether allowing data safety management authorizes, to produce authorization message, the multiple memory node, which will authorize, to be believed Breath is added in initial data safety, and safe to the initial data that authorization message is with the addition of when value node transmission;Step 16, institute State when whether value node judges data safety management by if by when value node base according to the authorized quantity of memory node Data safety after initial data securely generates management, if not by abandoning this data safety management;Step 17, will Data safety after management is stored in the multiple memory node.
Preferably, when transmitting heartbeat signal between value node and other member nodes, to determine whether can between node Proper communication.
The year earning rate Z being preferably based in the below equation calculating step 11:
Z=[(Y-X) * 365/ (X*T)] * 100%
Wherein, X is that user buys the amount of money, and Y is workable remaining sum after purchase, and T is the term of validity or the complete day of real consumption Number.
Preferably, methods described further comprises:Step 21, one of member node of high in the clouds node receives sets from local Standby data safety, judge whether the data safety is initial data safety, if it is not, determine the data safety when value Node;Step 22, after value node receives the data safety, the data peace is searched according to data-addresses mapping algorithm Complete multiple memory nodes;Step 23, the multiple memory node is to whether allowing data safety management authorizes, to produce Authorization message is added in data safety by authorization message, the multiple memory node, and is awarded to when value node sends with the addition of Weigh the data safety of information;Step 24, it is described when the authorized quantity of value node memory node according to corresponding to data safety judges Whether data safety management is by if by the way that data safety after value node is by management is stored in the multiple storage section In point, if not by abandoning the data safety, management failed message being returned to the local device.
Preferably, methods described further comprises:Step a, received data is identified, according to data-addresses mapping letter Number Y (t) calculates the mapping address of received data, Y (t)=x;Step b, judge whether MappingTable [x] is sky, such as Fruit result is yes, it is determined that address error, return to step a recalculates mapping address, if result is no, is transferred to step c; Step c, compare MappingTable [x]=t, if comparative result is yes, it is determined that address is correct, that is, has found out storage section Point, otherwise, it is determined that address error, return to step a recalculate mapping address, wherein, x is the storage section of data storage safety The address of point, t are the Data Identifications of received data safety itself, the attribute information of data safety or data safety.
Preferably, only data safety management is judged as passing through when authorized quantity is equal to whole memory node quantity.
Preferably, the data safety is stored-value card data.
According to another aspect of the present invention, the invention provides a kind of data safety management system based on multipoint cooperative mechanism System, including local device, high in the clouds node and user side user equipment, wherein, the data safety management system is used to perform The data safety control method stated.
Data managing method and system provided by the invention based on multipoint cooperative mechanism, the peace of data safety can be realized Full purchase, and multipoint cooperative mechanism is based on, the leakage of data is effectively prevent, maliciously distorts or illegally consults, is greatly protected The security of data has been demonstrate,proved, just, believable performing environment is provided especially for transaction in assets, data circulation etc..Meanwhile this Inventive structure is simple, you can above-mentioned data safety management system is individually built for user, also can be with available data platform or client Slitless connection is held, increases new function in available data platform or client, improves the convenience of data management.
Brief description of the drawings
Below, the present invention is made in conjunction with the accompanying drawings and embodiments and be further described through, wherein,
Fig. 1 is the schematic diagram of the high in the clouds node of the diagram present invention;
Fig. 2 is the flow chart of the data managing method based on multipoint cooperative mechanism of the diagram present invention;
Fig. 3 is the schematic diagram of the data-addresses mapping relations of the diagram present invention;
Fig. 4 is the flow chart of the data safety control method based on multipoint cooperative mechanism of the diagram present invention;
Fig. 5 is the flow chart of the data safety amending method based on multipoint cooperative mechanism of the diagram present invention;And
Fig. 6 is the schematic diagram of the data safety management system based on multipoint cooperative mechanism of the diagram present invention.
Embodiment
Below, the technical scheme in the embodiment of the present invention will be clearly and completely described with reference to accompanying drawing.Described Embodiment is only the part of the embodiment of the present invention, rather than whole embodiments.Those of ordinary skill in the art are based on this Any change or replacement that inventive embodiments are obtained, both fall within the scope of protection of the invention.
Main idea is that replacing existing storage mode with high in the clouds node, pass through multipoint cooperative at node beyond the clouds Mechanism realizes the management of data safety, meanwhile, high in the clouds node also includes third party authoritative institution, for business in a manner of year earning rate Family, user or other related sides provide data safety income calculation, are used for each side.In the present invention, multipoint cooperative refers to high in the clouds Acted synergistically between multiple member nodes of node, the common management for participating in data safety.Pass through multipoint cooperative mechanism, Neng Gouyou Effect prevents the leakage of data safety, maliciously distorts or illegally consult, the security greatly to guarantee data security.Hereinafter, with Data are described instead of data safety, alternatively, the present invention may also apply to the data of other in addition to data safety, such as Audio, video data, computer data, E-government information etc..
Fig. 1 is the schematic diagram of the high in the clouds node of the diagram present invention.High in the clouds node is made up of multiple member nodes, thus high in the clouds Node is also referred to as node pool.Fig. 1 shows 1-9 ..., N number of member node, examined for security for schematic example Consider, the quantity of the member node based on multipoint cooperative mechanism should be no less than three, preferably more than five in the present invention.Moreover, cloud End node can increase or removing members node, with the addition or deletion of member node, the data of corresponding member node storage Also it can upgrade in time or back up.Can be connected with each other between member node partly to connect, can be straight between member node Connect letter can also indirect communication, the present invention is not specifically limited.As shown in figure 1, in member node 1 and node pool other into Member node 2-N is directly connected to, and member node 2 is only connected with member node 1,3,7, N.In the present invention, high in the clouds node it is every One member node is respectively provided with node ID, and the node ID is beyond the clouds unique in node.
In addition, high in the clouds node also includes third party authoritative institution, the third party authoritative institution, which is used to calculate automatically, such as to store up The year earning rate of the data such as value card, in order to which trade company's price, user's purchase stored value card etc. and other related sides are referred to and used, Also, the third party authoritative institution can also change according to follow-up data, dynamic more New Year earning rate, in order to trade company, user Earning rate floating situation is understood in time, and the third party authoritative institution can record the history purchase for calculating stored value card etc. automatically Buy, consumer record, it is automatic to calculate average year earning rate.Wherein, the third party authoritative institution includes income collection module, credit Management module, income calculation module and transceiver module.Preferably, third party authoritative institution is one of above-mentioned member node, such as Fig. 1 Shown, third party authoritative institution is member node 8, although the third party authoritative institution of diagram is not connected with each node, It is that preferably, the third party authoritative institution is all connected with each node.Such member node can either realize third party authority The function of mechanism, and can enough realize the original function of member node.By means of third party authoritative institution, data safety is realized Safety purchase, a variety of references are provided for trade company, maximize return on assets.
Fig. 2 is the flow chart of the data managing method based on multipoint cooperative mechanism of the present invention.As shown in Fig. 2 this method Comprise the following steps:
Step 1, data of the cloud end node reception from local device.
In the present invention, local device can be the various electronic equipments of trade company side or the APP softwares of trade company.When finger trade company During APP softwares, the data from local device only refer to the equipment transmitted via APP softwares, unrelated with the equipment of user.
Further, after any member node of node receives data beyond the clouds, that selectes the data works as value node, such as The member node that fruit receives data is not the value node of working as of the data, then is sent to the data and works as value node.In the present invention, when Value node is one of member node of high in the clouds node, refers to the node for being responsible for current data management.When value node can be foundation The selected node of reliability order, is recommended selected node by member node, the node selected according to node load, or local The node that equipment is specified.
Further, in the selected data before value node, whether the member node for receiving data judges the data It is that initial data (also referred to as primary data, refers to the data not occurred before being judged as, in one embodiment, initial data Refer to that user prestores the data generated after the amount of money first), if it is, it is selected when value node after, when value node foundation number According to attribute information, generate unique mark described in data Data Identification.The attribute information of data is such as, but not limited to local set Standby IP, local device MAC Address, data source, data creation time, data name, numbering, size of data, data type etc. Various attribute informations.Then, when value node returns to above-mentioned Data Identification or the node ID when value node to local device, so as to For in the subsequent treatment of same data, local device is sent out by Data Identification or when the node ID of value node is encapsulated in data High in the clouds node is delivered to, high in the clouds node is according to Data Identification or when the node ID of value node is found out corresponding to the data when value saves Point.The Data Identification so encapsulated or the node ID when value node so that high in the clouds node can be at the follow-up place of same data Work as value node corresponding to data based on the Data Identification or when the node ID of value node is found out in reason, avoid repetition and select When the wasting of resources or loss of data caused by value node the problems such as.
In addition, when value node can not also generate new Data Identification, if for example, the attribute information of data in itself can Data described in unique mark, then directly using attribute information in itself as Data Identification.For example, for containing numbering The data of " 1234567890 ", when value node is directly using the numbering as Data Identification;In another example for containing MAC Address " XX-XX-XX-XX-XX-XX ", creation time " on October 11st, 2015,10:30:05 " data, when value node can foundation The two attribute informations generate new Data Identification, directly can also regard the two attribute informations as Data Identification, so that according to According to the two attribute informations or Data Identification, find out and work as value node corresponding to data.
Preferably, after Data Identification is obtained, when value node to other member node broadcast datas identify and node ID Corresponding table, other member nodes store the corresponding table of the Data Identification and node ID in database.When local device is by number During according to sending to high in the clouds node, one of member node receives the data, and the member node is searched in its database and foundation Data Identification identical Data Identification acquired in the attribute information of data, work as value node corresponding to the data so as to find out. Alternatively, when value node does not broadcast the Data Identification to other member nodes.When one of member node receives data, judge Whether own node is that the data work as value node, if it is, perform subsequent treatment, if it is not, then to high in the clouds node Other member nodes broadcast the Data Identification of the data, to determine to work as value node corresponding to the data.In response to this, other into The Data Identification of broadcast compared with the Data Identification that itself is stored, then, is worked as value node by member's node corresponding to the data The member node for receiving data is confirmed message to mode of unicast transmission, to inform that it is that current data works as value node, its His member node suppresses to transmit any message, to avoid unnecessary communication.Then, the member nodes of data is received by data It is sent to it and works as value node.
Wherein, if directly using the attribute information of data as Data Identification, need not be identified when value node returned data Or as value node ID.If in addition, when value node is that local device is specified, without when value node generates Data Identification and returns Return Data Identification or as value node ID, but specified directly in data and accordingly work as value node, such as value node ID is worked as in insertion, Directly to receive the data when value node.
Preferably, when value node is returned only to above-mentioned Data Identification, so, it is therefore prevented that local device knows to work as value node institute Avoid trojan horse program or hacker directly attack and working as value node, further improve the security of data.
Preferably, before step 1, the third party authoritative institution of local device and user side user equipment and high in the clouds node Interaction data, to generate data.
Preferably, when transmitting heartbeat signal between value node and other member nodes, to determine whether can between node Proper communication.
In another embodiment, in order to ensure meeting with the management system normal operation that guaranteed data security during disaster, cloud is prevented In end node the problems caused by loss of data, the present invention introduces disaster-tolerant backup technology, each member node beyond the clouds in node There are corresponding one or more backup nodes.When some member node failure in the node of high in the clouds, pass through malfunctioning node Route backup, by corresponding data processing be transferred on the backup node of the malfunctioning node, so as to realize the safe disaster tolerance of system.
Step 2, high in the clouds node is stored data in multiple nodes.
Hereinafter, for the ease of describing the node of these data storages, the node of these data storages is referred to as to store section Point.
Wherein, after value node receives initial data, the reliability order based on member node, select with a high credibility Member node is as memory node, or when value node determines memory node at random.In the embodiment of the present invention, memory node can be with Including that can not also include working as value node when value node, in addition, memory node can be whole member nodes or part Member node, it is not specifically limited in of the invention.For example, when value node 1 can be using node 1-N as memory node, can also Using node 1,3,5,7,8 or node 2-8 as memory node.And when value node 2 is using node 1,3,7, N as memory node.Go out In security consideration, the quantity of the memory node based on multipoint cooperative mechanism should be no less than three in the present invention, preferably five with On.
Preferably, before above-mentioned steps 2, when value node carries out concealment conversion to the data received, it is only capable of by depositing Data of the node conversion through concealment conversion are stored up, other member nodes of the data is not stored so as to avoid and consults or obtain the number According to, and then add the confidentiality of data.
Specifically, high in the clouds node can use but be not limited to the storage that following two modes realize data:
The first storage mode, after value node receives data, data-ground is established according to data-addresses mapping algorithm Location mapping relations, whole data are respectively stored in multiple memory nodes.The first storage mode is applied to data of small size Storage.
Second of storage mode, after value node receives data, the data are split as multiple subdatas, according to number Data-addresses mapping relations are established according to-mapping address algorithm, multiple subdatas are respectively stored in multiple memory nodes.The Storage of two kinds of storage modes especially suitable for large-scale data or mass data, by the way of the storage of multiple nodes, realize The storage management of large-scale data.
When value node establishes data-addresses mapping relations according to data-addresses mapping algorithm, according to the mapping relations, when Value node can determine multiple memory nodes of data storage, realize the quick lookup of address, add data storage Security, this will be described below.
Fig. 3 is the schematic diagram of the data-addresses mapping relations of the diagram present invention.Data-addresses mapping algorithm is with certain Functional relation data are calculated, and then obtain the technology of the storage address of the data.In the embodiment of the present invention, establish such as Data and address are stored in above-mentioned mapping table by the data-addresses mapping table (MappingTable) shown in Fig. 3 correspondingly In, when searching address, by mapping function Y (t), data can be completed to the mapping x=Y (t) of address.Wherein, x is storage The address of the memory node of data, t be data in itself, the Data Identification of the attribute information of data or data.Utilize data The Data Identification of attribute information or data, the size of data-addresses mapping table can be reduced, saved when the storage of value node is empty Between.
The process using data-addresses mapping algorithm searching data storage address will be described in detail below.
Step a, identification data t, t mapping address, Y (t)=x are calculated according to data-addresses mapping function;
Step b, judge whether MappingTable [x] is empty, if result is yes, it is determined that address error, return to step Rapid a recalculates mapping address, otherwise, if result is no, is transferred to step c;
Step c, compare MappingTable [x]=t, if comparative result is yes, it is determined that address is correct, that is, finds out Address data memory, otherwise, it is determined that address error, return to step a recalculate mapping address.
Using above-mentioned algorithm, the time needed for address search is greatly reduced, improves the efficiency of address lookup.Wherein, Address in data-addresses mapping table can be the set of address.In addition, in order to further reduce data-addresses mapping table Memory space, the address in data-addresses mapping table can be a reference address, the i.e. index of address, and by the index institute Corresponding better address is stored in other memory spaces.Address in data-addresses mapping table can use predetermined length Mode is configured, and sets the address memory space of regular length in advance for the index of address.For example, referred to using index " 1358 " Member node 1-5 is pointed to member node 1,3,5,8, or using index " 01001 ".
Preferably, whether occupied if identifying the address space using a bit in data-addresses mapping table, such as " 1 " table Show that the address space is occupied, " 0 " represents that the address space is unoccupied.
The data management operations based on multipoint cooperative mechanism at the node of high in the clouds are carried out below with reference to specific embodiment Description, is initial data for the data, data management operations will be hereafter described in terms of two.Hereinafter based on multiple spot The data management of coordination mechanism can include data generation, data modification, data download, data inspection etc., and data modification includes The modification modes such as data change, data are deleted, data increase.These following embodiments are not precluded from implementation as described above Example, on the contrary, as in place of noncontradictory, embodiments described above is quoted or continued to these embodiments.
Fig. 4 is the flow chart for the initial data management method based on multipoint cooperative mechanism for illustrating the embodiment of the present invention.Knot The high in the clouds node shown in Fig. 1 is closed, the initial data management method at high in the clouds node described in detail below.
The credit management module of third party authoritative institution is used for the creditworthiness for supervising trade company, records the credit journey of each trade company The data such as degree, hair fastener quantity, hair fastener fund.In addition, when evaluating trade company's creditworthiness, the credit pipe of the third party authoritative institution The ratio for the Reserve Fund that reason module is also paid based on trade company, assigns certain weight to evaluate trade company's creditworthiness, so that it is guaranteed that The interests of user.By means of third party authoritative institution, the present invention can realize the safety purchase of data safety, be provided for trade company more Kind reference, maximize the return on assets of trade company.
When the assets of such as stored value card etc it is expected to send in trade company side, the local device generation corresponding data of trade company side, Then pass to the transceiver module of third party authoritative institution.After transceiver module receives the data, send it to interests and collect mould Block.
Data of the income calculation module based on reception, the relative year earning rate of the data from local device is calculated, and The year earning rate of calculating is returned into local device.
Specifically, by taking stored value card as an example, the data can include name of firm, card type type, card type denomination, purchase gold Volume, give the amount of money, using discount, term of validity etc..The present invention calculates the year earning rate Z of the stored value card using below equation:
Z=[(Y-X) * 365/ (X*T)] * 100%
Wherein, X is that user buys the amount of money, and Y is workable overall balance after purchase, and T is that the term of validity or real consumption are complete Number of days.
After year earning rate is calculated, year earning rate is sent to the local device of trade company side by transceiver module.It is optional Ground, trade company side specify the user side user equipment for receiving year earning rate when sending data, so as in third party authoritative institution After calculating year earning rate, year earning rate is sent to the user side user equipment specified by transceiver module, so as to user's root According to the recommendation of third party authoritative institution, corresponding stored value card is bought.
In the continuous business process of trade company, third party authoritative institution dynamic more New Year earning rate, for different Card Types Average year earning rate is calculated, to provide decision-making foundation for trade company, the pricing strategy of stored value card is adjusted according to actual conditions.
After user determines card type denomination, trade company's side local device generates local data according to the data that user determines, so Afterwards, the data of generation are sent to high in the clouds node by local device.
Specifically, as shown in figure 4, the data managing method includes:
Step 11, the third party authoritative institution of high in the clouds node receives data of the transmission from local device on assets, The third party authoritative institution calculates the relative year earning rate of the data from local device, and the year earning rate of calculating is returned Return local device and user side user equipment;
Step 12, local device generates initial data based on the selection of user equipment, and initial data is sent into cloud End node;
Step 13, one of member node of high in the clouds node receives the initial data from local device, selectes the original number According to work as value node;
Step 14, after value node receives initial data, multiple memory nodes of the initial data are determined;
Step 15, each memory node is to whether allowing data generation authorizes, to produce authorization message, memory node Authorization message is added in initial data, and the initial data of authorization message is with the addition of to when value node is sent;
Step 16, when value node according to the authorized quantity of memory node judge final data generation whether by, if by, Then when value node is based on Raw Data Generation final data, if not by abandoning data generation;
Step 17, the final data of generation is stored in memory node.
Wherein, when value node can the reliability order based on member node, member node with a high credibility is defined as Memory node, or when value node can determine the memory node that memory node or local device specify at random.It is preferred that Ground, memory node include working as value node in itself, when counting the authorized quantity of memory node, when value node also counts awarding for itself Weigh information.Alternatively, memory node does not include working as value node in itself.In the present invention, for security consideration, memory node quantity No less than three, preferably more than five.The characteristics of this multipoint cooperative mechanism so that high in the clouds node is particularly suitable for building dispersion pipe Reason system, the significant increase security of system.
After memory node is determined, establish data-addresses mapping according to data-addresses mapping algorithm when value node and close System, so that in searching data corresponding address, address corresponding to the data, above-mentioned mistake are found out based on data-addresses mapping function Journey is as described above.
Preferably, step 15 further comprises, after memory node produces authorization message, authorization message is carried out using private key Encryption.Correspondingly, step 16 further comprises, when value node with the addition of using public key decryptions the initial data of authorization message, with Determine the authorized quantity of memory node corresponding to initial data.By above-mentioned encryption process, uncorrelated node is avoided to depositing The malice for storing up the authorization message of node is distorted or illegally authorized, and adds the security of data.
Preferably, in step 16, only when authorized quantity is equal to whole memory node quantity, final data is generated and judged For by being otherwise judged as not passing through.In addition, also can predetermined threshold, only when authorized quantity exceedes predetermined threshold, will finally count It is judged as according to generation by being otherwise judged as not passing through.
In an alternative embodiment of the invention, after authorized quantity is counted when value node, memory node deletes authorization message. Alternatively, after step 14, after memory node is determined, judge to whether there is authorization message in memory node, such as deposit Authorization message is then being deleted, is causing to work as value node mistake geo-statistic authorized quantity so as to avoid repetitive endowment.Said process is kept away Exempt from the malice mandate of some or a part of memory node, ensure that the security of data.
Further, the storage in step 17 is stored using two kinds of the above storage modes.
For stored-value card data, after user buys stored value card, local device is based on Stored Value card information generation initial data. The initial data can include stored value card numbering, holder name, merchant information, the purchase amount of money, Stored Value remaining sum, commodity or service Useful life, commodity or the access times of service, digital cash, commodity amount, digital cash, the means of payment, payment cipher Etc. plurality of, the present invention is simultaneously not specifically limited.Initial data is sent to high in the clouds node by local device, and to select, this is original Data work as value node.After value node receives initial data, the memory node of 5 initial data is determined.This 5 storage sections Point is authorized to produce authorization message to data generation, and authorization message is added in initial data, is sent out to when value node Send the initial data that with the addition of authorization message.When value node statistics authorized quantity, when authorized quantity is 5, computer is determined File or stored-value card data be generated as by, when value node by the computer documents of generation or stored-value card data be stored in this 5 In individual memory node, if not by abandoning data generation.
By means of third party authoritative institution, present invention reduces data safeties such as stored value cards to caused by user risk And problem, the perfect management rule in stored value card market.
Beyond the clouds after node storage initial data, the various pipes such as local device can modify to data, download, consulting Reason operation.Consume or in amount deducted on trade company APP for example, user holds, become for the data safety of this user Dynamic, i.e., local device need to modify to data.Data management behaviour at the node of high in the clouds is only described by taking data modification as an example below Make, data modification hereafter is applied to any data management operations.
Fig. 5 is the flow chart for the data modification method based on multipoint cooperative mechanism for illustrating the embodiment of the present invention.Such as Fig. 5 institutes Show, the data modification method includes:
Step 21, one of member node of high in the clouds node receive the data from local device, judge the data whether be Initial data, if it is not, determine the data works as value node;
Step 22, after value node receives data, the storage section of the data is searched according to data-addresses mapping algorithm Point;
Step 23, each memory node to produce authorization message, and will authorize to whether allowing data modification authorizes Information is added in data, to the data that authorization message is with the addition of when value node transmission;
Step 24, when value node authorized quantity of memory node according to corresponding to data judge data modification whether by, If by, when value node by amended data storage in memory node, if not by the data being abandoned, to local Equipment returns to modification failed message.
Further, in step 21, according to the Data Identification or attribute information in data, determine corresponding to data when value saves Point, it is determined that the step of working as value node is as described above.In step 23, when the area of value node detection current data and data before Not, data refer to the last data for same type data before.For security consideration, each of memory node is equal The difference of current data and data before is detected, and to whether allowing data modification authorizes.In step 24, only when mandate number When amount is equal to whole memory node quantity, data modification is judged as by being otherwise judged as not passing through.In addition, it can also make a reservation for Threshold value, only when authorized quantity exceedes predetermined threshold, data modification is judged as by being otherwise judged as not passing through.
Preferably, in step 23, when value node is respectively stored in multiple memory nodes according to by whole data;Or when value The data are split as multiple subdatas by node, and multiple subdatas are respectively stored in multiple memory nodes.
Preferably, step 23 further comprises, after memory node produces authorization message, authorization message is carried out using private key Encryption.Correspondingly, step 24 further comprises, when value node with the addition of using public key decryptions the data of authorization message, to determine The authorized quantity of memory node.By above-mentioned encryption process, uncorrelated node is avoided to the authorization message of memory node Malice is distorted or illegally authorized, and adds the security of data.
Preferably, after step 24, when amended data are sent to third party authoritative institution, third party by value node The amended data of authority store, dynamically to update the data earning rate after safe year.
In addition, the various stored value cards that third party authoritative institution can be issued trade company are weighted average computation, and will meter Result is calculated to send to local device, so as to businessmans of local device and other similar stored value cards of distribution carry out Combined Ration compared with.
In the present invention, if the data from local device are tampered, the data after distorting are transferred into it and work as value node, Each of memory node detects the difference of current data and data before, and to whether allowing data modification authorizes. According to said process, based on multipoint cooperative mechanism, data modification is just only carried out in the case where whole memory nodes unanimously authorize, Data tampering is effectively prevent, ensure that the security of data.
Below also by taking computer documents or stored-value card data as an example, the mistake of the data modification based on multipoint cooperative mechanism is sketched Journey.
One of member node of high in the clouds node is according to the Data Identification or attribute information in data, for example, computer documents Local device MAC Address, filename and file creation time etc. or stored-value card data stored value card numbering etc., determine data It is corresponding to work as value node, such as work as value node 1.After value node receives data, according to data-addresses mapping algorithm, searching should The memory node of data, such as node 1-5.Memory node 1-5 to whether allowing data modification authorized to produce authorization message, And authorization message is added in data, to the data that authorization message is with the addition of when value node transmission.When value node judges to add Whether the data of authorization message come from memory node 1-5, and whether judge data modification according to the authorized quantity of memory node By that is, when value node counts authorized quantity, when authorized quantity is 5, judging repairing for computer documents or stored-value card data Be changed to by, by amended data storage in memory node, if authorized quantity be less than 5, refusal change the data, to Local device returns to modification failed message.
Now, if despiteful trojan horse program, hacker's tissue or some internal staff altered data on the local device, Based on the multipoint cooperative mechanism of the present invention, in the case of the inwhole authorization data modifications of memory node 1-5, high in the clouds node can be refused Modification data absolutely, so as to prevent the malice of trojan horse program, hacker's tissue or some internal staff to distort, improve the peace of data Quan Xing.Meanwhile based on multipoint cooperative mechanism, just, believable performing environment is provided for transaction in assets, data circulation etc..
In addition, the multipoint cooperative mechanism of the present invention is equally applicable to the management such as the download of data, access operation, only in whole The management such as download, the access of data are just allowed to grasp in the case that memory node unanimously authorizes or authorized quantity exceedes predetermined threshold Make, so as to effectively prevent the leakage of data, ensure that the security of data.
Fig. 6 is the schematic diagram of the diagram data safety management system of the invention based on multipoint cooperative mechanism.The data safety Management system is used to realize data managing method as described above, and the data safety management system includes local device, high in the clouds Node and user side user equipment.The present invention can be user individually build above-mentioned data safety management system, also can with it is existing Data platform or client slitless connection, increase high in the clouds node in available data platform or client, ensure that the peace of data Quan Xing.
Wherein, local device is used to generate data, and sends data to high in the clouds node.Local device can be included but not It is limited to any electronic equipment such as mobile terminal, computer, POS.Further, local device can be that multiple locals are set Standby, these local devices are different types of local devices, and multiple local devices communicate with high in the clouds node.User side user sets Standby is mobile terminal, the various user equipmenies such as computer that user commonly uses.
High in the clouds node is made up of multiple member nodes, for receiving the data from local device, and is based on multipoint cooperative Mechanism is stored and managed to data.Wherein, as described above, for each data also exist corresponding to when value node and depositing Store up node.Hereafter showing for each member node is described using node as the angle when value node, member node and memory node Meaning property structure, can select which part or whole modules to realize data management side described above according to being actually needed Method.
Wherein, member node can include receiving module 10, judge module 20, processing module 30, memory module 40 and hair Send module 50.
Wherein, receiving module 10, for receiving data, data can be data from local device or come From the data of other member nodes;
Judge module 20, whether the data for judging to receive are initial data, if so, then selecting working as the initial data Value node, if it is not, that then searches the data of the reception works as value node;
Processing module 30, for determining the memory node of initial data, or for searching the storage section stated of the reception Point;Processing module 30 is additionally operable to decide whether grant authorizations to produce authorization message;Processing module 30 is additionally operable to according to data-ground Memory node corresponding to the mapping function searching data of location;Processing module 30 is additionally operable to operate based on the management of authorized quantity determination data Whether pass through, etc..
Memory module 40, for data storage, in addition, memory module 40 is additionally operable to data storage-address mapping table.
Sending module 50, for sending data.For example, sending module can send data to other member nodes, also may be used To send data to local device.
Alternatively, member node also includes encryption/decryption module, and encryption and decryption is carried out for the data to transmission or information.
Further, the data safety management system also includes gateway device, realizes the logical of local device and high in the clouds node Letter.
Data managing method and system provided by the invention based on multipoint cooperative mechanism, the peace of data safety can be realized Full purchase, effectively prevent the leakage of data, maliciously distorts or illegally consult, greatly ensure that the security of data, especially It is to provide just, believable performing environment for transaction in assets, data circulation etc..Meanwhile the present invention is simple in construction, you can to use Family individually builds above-mentioned data safety management system, also can with available data platform or client slitless connection, in available data Increase new function in platform or client, improve the convenience of data management.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (8)

1. a kind of data safety control method based on multipoint cooperative mechanism, including:
Step 11, the third party authoritative institution of high in the clouds node receives data of the transmission from local device on assets, described Third party authoritative institution calculates the relative year earning rate of the data from local device, and the year earning rate of calculating is returned Local device and user side user equipment;
Step 12, the local device generates initial data safety based on the selection of user equipment, and by the initial data Securely transmit to high in the clouds node;
Step 13, one of member node of the high in the clouds node receives the initial data safety from local device, selectes described Initial data safety works as value node;
Step 14, it is described after value node receives initial data safety, determine multiple storage sections of the initial data safety Point;
Step 15, the multiple memory node is described to produce authorization message to whether allowing data safety management authorizes Authorization message is added in initial data safety by multiple memory nodes, and with the addition of the original of authorization message to when value node is sent Beginning data safety;
Step 16, it is described when value node according to the authorized quantity of memory node judge data safety management whether by, if by, Then data safety after value node securely generates management based on initial data, if not by abandoning this data safety pipe Reason;
Step 17, the data safety after management is stored in the multiple memory node.
2. data safety control method as claimed in claim 1, wherein, when transmitting the heart between value node and other member nodes Signal is jumped, so that whether determine being capable of proper communication between node.
3. the data safety control method as described in any one of claim 1 or 2, wherein, below equation meter is based in step 11 Calculate the year earning rate Z:
Z=[(Y-X) * 365/ (X*T)] * 100%
Wherein, X is that user buys the amount of money, and Y is workable remaining sum after purchase, and T is the term of validity or the complete number of days of real consumption.
4. the data safety control method as described in claim any one of 1-3, wherein, methods described further comprises:
Step 21, one of member node of high in the clouds node receives the data safety from local device, judges the data safety Whether it is initial data safety, if it is not, determine the data safety works as value node;
Step 22, after value node receives the data safety, the data safety is searched according to data-addresses mapping algorithm Multiple memory nodes;
Step 23, the multiple memory node is described to produce authorization message to whether allowing data safety management authorizes Authorization message is added in data safety by multiple memory nodes, and pacifies to the data that authorization message is with the addition of when value node transmission Entirely;
Step 24, it is described when value node authorized quantity of memory node according to corresponding to data safety judges that data safety management is It is no by, if by, data safety after value node is by management is stored in the multiple memory node, if not by, The data safety is then abandoned, management failed message is returned to the local device.
5. the data safety control method as described in claim any one of 1-4, wherein, methods described further comprises:
Step a, received data is identified, the mapping of received data is calculated according to data-addresses mapping function Y (t) Location, Y (t)=x;
Step b, judge whether MappingTable [x] is empty, if result is yes, it is determined that address error, return to step a weights It is new to calculate mapping address, if result is no, it is transferred to step c;
Step c, compare MappingTable [x]=t, if comparative result is yes, it is determined that address is correct, that is, has found out and deposited Node being stored up, otherwise, it is determined that address error, return to step a recalculate mapping address,
Wherein, x is the address of the memory node of data storage safety, and t is received data safety itself, the category of data safety The Data Identification of property information or data safety.
6. the data safety control method as described in claim any one of 1-5, wherein, only all stored when authorized quantity is equal to During number of nodes, data safety management is judged as passing through.
7. the data safety control method as described in claim any one of 1-6, wherein, the data safety is stored value card number According to.
8. a kind of data safety management system based on multipoint cooperative mechanism, including local device, high in the clouds node and user side are used Family equipment, wherein, the data safety management system is used to perform the data safety control method as described in claim 1-7.
CN201710586064.8A 2017-07-18 2017-07-18 Data security management method and system based on multipoint cooperation mechanism Expired - Fee Related CN107403107B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710586064.8A CN107403107B (en) 2017-07-18 2017-07-18 Data security management method and system based on multipoint cooperation mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710586064.8A CN107403107B (en) 2017-07-18 2017-07-18 Data security management method and system based on multipoint cooperation mechanism

Publications (2)

Publication Number Publication Date
CN107403107A true CN107403107A (en) 2017-11-28
CN107403107B CN107403107B (en) 2021-04-30

Family

ID=60401012

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710586064.8A Expired - Fee Related CN107403107B (en) 2017-07-18 2017-07-18 Data security management method and system based on multipoint cooperation mechanism

Country Status (1)

Country Link
CN (1) CN107403107B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114511427A (en) * 2022-04-21 2022-05-17 四川省大数据中心 Safety education supervision method, device and system for project site
CN115174591A (en) * 2022-07-01 2022-10-11 深圳市玄羽科技有限公司 Intelligent manufacturing system and data security management method thereof
US12067414B2 (en) 2021-11-04 2024-08-20 International Business Machines Corporation Data swap prevention in distributed computing environments based on mapping among global user identification, correlation identification and thread identification

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143228A (en) * 2011-03-30 2011-08-03 浪潮(北京)电子信息产业有限公司 Cloud storage system, cloud client and method for realizing storage area network service
CN102170448A (en) * 2011-05-04 2011-08-31 无锡锐视清信息技术有限公司 Copyright protection system, multimedia data transmitting and receiving equipment and method based on cloud media publishing platform
CN102170452A (en) * 2011-05-19 2011-08-31 浪潮电子信息产业股份有限公司 Authorization and management method for cloud storage system
CN102217274A (en) * 2008-11-14 2011-10-12 高通股份有限公司 Systems and methods for data authorization in distributed storage networks
CN103731485A (en) * 2013-12-26 2014-04-16 华为技术有限公司 Network equipment, cluster storage system and distributed lock management method
CN103793220A (en) * 2012-10-26 2014-05-14 国际商业机器公司 Method and apparatus for modeling software license using metamodel
JP2017049853A (en) * 2015-09-02 2017-03-09 インフォサイエンス株式会社 Authority information management system and authority information management program

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102217274A (en) * 2008-11-14 2011-10-12 高通股份有限公司 Systems and methods for data authorization in distributed storage networks
CN102143228A (en) * 2011-03-30 2011-08-03 浪潮(北京)电子信息产业有限公司 Cloud storage system, cloud client and method for realizing storage area network service
CN102170448A (en) * 2011-05-04 2011-08-31 无锡锐视清信息技术有限公司 Copyright protection system, multimedia data transmitting and receiving equipment and method based on cloud media publishing platform
CN102170452A (en) * 2011-05-19 2011-08-31 浪潮电子信息产业股份有限公司 Authorization and management method for cloud storage system
CN103793220A (en) * 2012-10-26 2014-05-14 国际商业机器公司 Method and apparatus for modeling software license using metamodel
CN103731485A (en) * 2013-12-26 2014-04-16 华为技术有限公司 Network equipment, cluster storage system and distributed lock management method
JP2017049853A (en) * 2015-09-02 2017-03-09 インフォサイエンス株式会社 Authority information management system and authority information management program

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12067414B2 (en) 2021-11-04 2024-08-20 International Business Machines Corporation Data swap prevention in distributed computing environments based on mapping among global user identification, correlation identification and thread identification
CN114511427A (en) * 2022-04-21 2022-05-17 四川省大数据中心 Safety education supervision method, device and system for project site
CN115174591A (en) * 2022-07-01 2022-10-11 深圳市玄羽科技有限公司 Intelligent manufacturing system and data security management method thereof
CN115174591B (en) * 2022-07-01 2023-10-13 深圳市玄羽科技有限公司 Intelligent manufacturing system and data security management method thereof

Also Published As

Publication number Publication date
CN107403107B (en) 2021-04-30

Similar Documents

Publication Publication Date Title
EP3824423B1 (en) Blockchain transaction safety using smart contracts
US11257070B2 (en) Computer-implemented system and method for generating and extracting user related data stored on a blockchain
US20190370813A1 (en) Decentralized safeguard against fraud
CN109447648A (en) The method of recorded data zone block, accounting nodes and medium in block chain network
CN110148017A (en) Equity distribution method and device, electronic equipment, storage medium based on block chain
CN108257027A (en) Declaration form data checking method, device, computer equipment and storage medium
CN112465627B (en) Financial loan auditing method and system based on block chain and machine learning
CN107615317A (en) The system and method for block chain transaction record
CN101449286A (en) Systems and methods for providing anonymous requests for quotes for financial instruments
JP2022515190A (en) Tracking the flow of tagged funds on the blockchain
CN118101216A (en) Blockchain-based systems and methods for communicating, storing, and processing data over a blockchain network
CN107403107A (en) A kind of data safety control method and system based on multipoint cooperative mechanism
CN109684519A (en) A kind of decentralization chip research and development transaction data storage method and system based on block chain
CN108768672A (en) Data processing method, device and storage medium
CN115953157A (en) Method and device for automatically changing numerical value in order through sharing
JP2007133742A (en) Loan acceptance device, loan request terminal, loan settlement system, and loan acceptance method
US20210409216A1 (en) System and method for providing controlled access to personal information
CN115525919A (en) Method, device and system for determining computing resources in privacy computing
Gómez et al. Blockverse: A cloud blockchain-based platform for tracking in affiliate systems
WO2005019964A2 (en) System and method of valuation of intellectual property
CN115619508A (en) Credit-based deposit-free rental system and method
KR20230019002A (en) Method and apparatus for generating evaluation for a plurality of cryptocurrencies using on-chain information and off-chain information
CN114297675A (en) Processing method, device, equipment and medium for auditing request of target object
KR102128858B1 (en) System and method for constructing book-sharing economic platform based on block chain
CN107423982A (en) Service implementation method and device based on account

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Xie Ming

Inventor after: Mo Jiahong

Inventor after: Chen Jianwei

Inventor before: Chen Jianwei

CB03 Change of inventor or designer information
TA01 Transfer of patent application right

Effective date of registration: 20210414

Address after: No. 6-2, Minzhu Road, Xingning District, Nanning City, Guangxi Zhuang Autonomous Region

Applicant after: ELECTRIC POWER SCIENCE & RESEARCH INSTITUTE OF GUANGXI POWER GRID Corp.

Applicant after: Runjian Co.,Ltd.

Address before: 100080 715, 7th floor, 27 Zhongguancun Street, Haidian District, Beijing

Applicant before: BEIJING DYNAMO TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210430

Termination date: 20210718

CF01 Termination of patent right due to non-payment of annual fee