CN107846400A - The methods, devices and systems that a kind of data are saved from damage - Google Patents
The methods, devices and systems that a kind of data are saved from damage Download PDFInfo
- Publication number
- CN107846400A CN107846400A CN201710986733.0A CN201710986733A CN107846400A CN 107846400 A CN107846400 A CN 107846400A CN 201710986733 A CN201710986733 A CN 201710986733A CN 107846400 A CN107846400 A CN 107846400A
- Authority
- CN
- China
- Prior art keywords
- damage
- data
- save
- little
- saved
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of data security method, including:Obtain data save from damage save from damage in request a little enter to join information, it is described to enter to join information and include chain code and flow instance mark;According to the operation flow template of acquisition, enter described in checking and join information, and received after being verified and save point data from damage;When last for saving a little non-operation flow template from damage is saved from damage, the next chain code saved from damage a little and the flow instance mark of generation are returned.The present invention solves data in the prior art and saves information from damage and can not carry out validation verification, saves the problem of logical miss easily occurs for data from damage.
Description
Technical field
The present invention relates to the methods, devices and systems that a kind of data are saved from damage.
Background technology
As computer internet is throughout application, electronic data is used as using computer as carrier, is entered using electronic form
Row obtains, fixed evidence form, not only has very high efficiency, and ensure that the safety of original document.Electronic data is not allowed
Easily distorted by people, and there is the legal effect equal with papery evidence.It is with spreadsheet format (text that electronic data, which is saved from damage,
Word, figure, letter, numeral, three-dimensional symbol, color combination and sound and above-mentioned factor combination etc.) existing for all kinds of electron numbers
It is believed that breath, carries out computing, encryption fixation, states clearly and save generation standard time, operation values, Docket No. etc. from damage, prevent from being distorted by people,
Ensure the program and method of electronic data primitiveness and objectivity.Saved from damage by data and the anti-of electronic data content is effectively ensured usurps
Change, ensure convenience and security that data are saved from damage.But electronic data carry out data save from damage when, it is necessary to ensure to save data from damage
Save order from damage, confusion does not occur for the logic for saving data from damage, also to prevent that malice is mixed into electronic data palms off data.
How to ensure that data are saved from damage in sequence, save from damage and do not occur to repeat to preserve in data, prevent from palming off data to saving from damage
The pollution of data, turn into electronic data urgent problem to be solved when carrying out data and saving from damage.
The content of the invention
In view of technological deficiency present in prior art and technology drawback, the embodiment of the present invention provide overcome above mentioned problem or
The methods, devices and systems that a kind of data that person solves the above problems at least in part are saved from damage.
As the one side of the embodiment of the present invention, it is related to a kind of data security method, including:
Obtain data save from damage save from damage in request a little enter to join information, it is described to enter to join information and include chain code and flow instance mark
Know;
According to the operation flow template of acquisition, enter described in checking and join information, and received after being verified and save point data from damage;
When last for saving a little non-operation flow template from damage is saved from damage, return to the next of generation and save from damage
Chain code and the flow instance mark of point.
In one embodiment, described data security method also includes:By next chain code saved from damage a little of generation and
Flow instance mark is corresponding to be cached.
In one embodiment, described data security method, enter to join information described in checking, including:
Save the caching that chain code a little and flow instance identify from damage according on flow instance identifier lookup one, will enter to join in information
Chain code with upper one save from damage a little chain code caching be compared, if unanimously, being verified.
In one embodiment, described data security method, it is described save from damage a little for first save from damage when, it enters to join information
In chain code and flow instance be identified as default character string;It is described save from damage a little for it is non-it is first save from damage when, it enters to join in information
Chain code and flow instance be identified as according to pre-defined rule generate random number.
In one embodiment, described data security method also includes:According to the operation flow template, judge whether
Save data a little from damage for last;
If so, after receiving last and saving point data from damage, terminate data and save from damage.
As the other side of the embodiment of the present invention, it is related to a kind of data protection servicer, including:
Acquisition module, for obtain data save from damage request in save from damage a little enter to join information;It is described to enter to join information and include chain code
Identified with flow instance;
Checking and receiving module, for the operation flow template according to acquisition, enter described in checking and join information, and logical in checking
Later receive and save point data from damage;
Generation module, for generating and returning the next chain code saved from damage a little and flow instance mark.
In one embodiment, described data protection servicer, in addition to:
Cache module, cached for the next chain code saved from damage a little and the flow instance mark of generation to be corresponded to.
In one embodiment, described data protection servicer, the checking and receiving module, specifically for according to stream
Journey instance identification searches upper one caching for saving chain code a little and flow instance mark from damage, will enter the chain code and upper one guarantor that join in information
The chain code caching put entirely is compared, if unanimously, being verified.
In one embodiment, described data protection servicer, in addition to:
Judge module, for according to the operation flow template, determining whether that last saves data a little from damage;
The transceiver module, for when the judge module judges that savepoint is saved from damage for last, receiving
After last saves point data from damage, terminate data and save from damage.
As the another aspect of the embodiment of the present invention, it is related to a kind of request data security method, including:
Data are saved in request upload from damage, send save from damage a little enter to join information, it is described to enter to join information and including what is pre-saved save from damage
Chain code and the flow instance mark of point;
When the next chain code saved from damage a little and flow instance that receive return identify, preserved, so as to as under
Individual data saved from damage a little save request from damage and enter to join information.
In one embodiment, described request data security method, in addition to:
When it is described save from damage a little for it is non-it is first save from damage when, the chain code saved from damage a little and flow instance that pre-save are identified as hair
Serve the data saved from damage a little and save the chain code returned during request and flow instance mark from damage;
When it is described save from damage a little for first save from damage when, it is described enter join chain code in information and flow instance be encoded to it is default
Character string.
As the 4th aspect of the embodiment of the present invention, it is related to a kind of client management system server, including:
Request module, save from damage for request data, send save from damage a little enter to join information, it is described to enter to join information and include guarantor in advance
The chain code saved from damage a little and the flow instance mark deposited;
Preserving module, for when the next chain code saved from damage a little and flow instance that receive return identify, being protected
Deposit, enter to join information to save request from damage as next data saved from damage a little.
As the 5th aspect of the embodiment of the present invention, it is related to a kind of data security system, including:
Foregoing any data protection servicer;
Foregoing client management system server.
The embodiment of the present invention at least realizes following technique effect:
Data security method provided in an embodiment of the present invention, when the data for carrying out saving from damage a little every time are saved from damage, it is required for testing
Demonstrate,prove it and enter to join chain code and the flow instance mark that information includes, only according to operation flow template, can just be received by checking
Save data from damage, and the next chain code saved from damage a little and flow instance brought back to life identify, ensure that data save from damage save from damage a little according to
Predetermined order is saved from damage, is avoided factor data from saving repetition from damage and submit and is caused logical miss and invalid save from damage.
Data security method provided in an embodiment of the present invention, by being verified to the chain code for entering to join information saved from damage a little,
When receiving when saving data from damage maliciously to palm off data, chain code can not be palmed off data and will not be received by checking, malice, guarantor
The validity and security that card data are saved from damage.
Data security method provided in an embodiment of the present invention, by being verified to the chain code for entering to join information saved from damage a little,
When multiple different operation flows be present, each operation flow can save from damage a little according to respective operation flow template is predetermined
Order carries out data and saved from damage, and mutual data, which are not present, intersects, and ensures the reliability that each operation flow data are saved from damage.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification
Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages can be by the explanations write
Described structure is realized and obtained in book, claims and accompanying drawing.
Below by drawings and examples, technical scheme is described in further detail.
Brief description of the drawings
Accompanying drawing is used for providing a further understanding of the present invention, and a part for constitution instruction, the reality with the present invention
Apply example to be used to explain the present invention together, be not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is a kind of schematic flow sheet of data security method provided in an embodiment of the present invention;
Fig. 2 is a kind of another schematic flow sheet of data security method provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of data protection servicer provided in an embodiment of the present invention;
Fig. 4 is a kind of another structural representation of data protection servicer provided in an embodiment of the present invention;
Fig. 5 is a kind of schematic flow sheet of request data security method provided in an embodiment of the present invention;
Fig. 6 is a kind of structural representation of client management system server provided in an embodiment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Completely it is communicated to those skilled in the art.
The various specific realities for the methods, devices and systems that a kind of data provided in an embodiment of the present invention are saved from damage separately below
The mode of applying is described in detail.
Embodiment 1:
Shown in reference picture 1, a kind of data security method provided in an embodiment of the present invention, including:
S101:Obtain data save from damage save from damage in request a little enter to join information, it is described to enter to join information and include chain code and flow reality
Example mark;
S102:According to the operation flow template of acquisition, enter described in checking and join information, and receive and save from damage a little after being verified
Data;
S103:When last for saving a little non-operation flow template from damage is saved from damage, the next of generation is returned
The individual chain code saved from damage a little and flow instance mark.
Data security method provided in an embodiment of the present invention, when the data for carrying out saving from damage a little every time are saved from damage, it is required for testing
Demonstrate,prove it and enter to join chain code and the flow instance mark that information includes, only according to operation flow template, can just be received by checking
Save data from damage, and the next chain code saved from damage a little and flow instance brought back to life identify, ensure that data save from damage save from damage a little according to
Predetermined order is saved from damage, is avoided factor data from saving repetition from damage and submit and is caused logical miss and invalid save from damage.
Data security method provided in an embodiment of the present invention, by being verified to the chain code for entering to join information saved from damage a little,
When receiving when saving data from damage maliciously to palm off data, chain code can not be palmed off data and will not be received by checking, malice, guarantor
The validity and security that card data are saved from damage.
Data security method provided in an embodiment of the present invention, by being verified to the chain code for entering to join information saved from damage a little,
When multiple different operation flows be present, each operation flow can save from damage a little according to respective operation flow template is predetermined
Order carries out data and saved from damage, and mutual data, which are not present, intersects, and ensures the reliability that each operation flow data are saved from damage.
In one embodiment, the flow instance mark described in the embodiment of the present invention, refers to flow instance number information.
Shown in reference picture 2, in one embodiment, described data security method also includes:
S104:The next chain code saved from damage a little and the flow instance mark of generation are corresponded to and cached.
In one embodiment, described data security method, enter to join information described in checking, including:
Save the caching that chain code a little and flow instance identify from damage according on flow instance identifier lookup one, will enter to join in information
Chain code with upper one save from damage a little chain code caching be compared, if unanimously, being verified.
Data security method provided in an embodiment of the present invention, by by next chain code and flow instance saved from damage a little of generation
Mark cached, when receive it is next save from damage a little when saving data from damage, when verifying into ginseng information, pass through flow instance identifier lookup
Chain code in information is joined to corresponding chain code information by entering with it of having cached, only when both compare it is consistent when, show to believe into ginseng
Chain code in breath is accurate, just can be by saving the checking of chain code information a little from damage, and data are saved in reception from damage, with save from damage data according to
Save dot sequency from damage to be saved from damage, while the reliability for saving data from damage can be ensured, prevent malice from saving data from damage and being mixed into normal guarantor
In total evidence.
In one embodiment, described data security method, it is described save from damage a little for first save from damage when, it enters to join information
In chain code and flow instance be identified as default character string;It is described save from damage a little for it is non-it is first save from damage when, it enters to join in information
Chain code and flow instance be identified as according to pre-defined rule generate random number.
Data security method provided in an embodiment of the present invention, traffic flow template is obtained, it is first when carrying out saving data receiver from damage
When the individual chain code saved from damage a little calls for the first time, it is default character string to enter the chain code joined in information, specifically, can be, it is described
Default character string be empty string " ";When the first chain code saved from damage a little calls for the first time, enter the flow instance mark joined in information
For default character string, specifically, can be, described default character string be empty string " ".
Shown in reference picture 2, in one embodiment, described data security method also includes:
S105:According to the operation flow template, determine whether that last saves data a little from damage;
If so, after receiving last and saving point data from damage, terminate data and save from damage.
The data security method of the embodiment of the present invention, in the case that operation flow template includes multiple save from damage a little, upload
To last save from damage a little save data from damage after the completion of, when system is judged as that last is saved from damage, terminates data and save from damage, update
The state that this time data are saved from damage is completion status.
In one embodiment, described data security method, when a quantity of saving from damage for operation flow template only has one
When, when data are saved in reception from damage, verify that the chain code in ginseng information and flow instance are identified as default character string, that is, receive and protect
That puts entirely saves data from damage, terminates data and saves from damage, and it is completion status to update the state that this data is saved from damage.
In one embodiment, described data security method, in addition to:
Receive save from damage a little include that chain code and flow instance identify enter to join information, when checking, this enters to join information wrong
When, stop data and save from damage.
As an embodiment of the embodiment of the present invention, when verifying chain code mistake in ginseng information, return wrong
Response message by mistake, remind client management system server end to stop upload and save data from damage.
Embodiment 2:
Shown in reference picture 3, the embodiment of the present invention provides a kind of data protection servicer, including:
Acquisition module 101, for obtain data save from damage request in save from damage a little enter to join information;It is described to enter to join information and include chain
Code and flow instance mark;
Checking and receiving module 102, for the operation flow template according to acquisition, enter described in checking and join information, and testing
Card receives after passing through saves point data from damage;
Generation module 103, for generating and returning the next chain code saved from damage a little and flow instance mark.
Data protection servicer provided in an embodiment of the present invention, when the data for carrying out saving from damage a little every time are saved from damage, by obtaining
Modulus block obtain data save from damage request in save from damage a little enter to join information, by verify and receiving module verify that it enters to join in information and wrap
Chain code and the flow instance mark included, only according to operation flow template, can just be received by checking and save data from damage, in checking and
Receiving module receives save data from damage after, the next chain code saved from damage a little and flow instance are generated by generation module and identifies and returns to visitor
Family Tomcat-AdminPortal, as it is next save from damage a little enter to join information.
Data protection servicer provided in an embodiment of the present invention, the checking identified by chain code and flow instance, Neng Goubao
Card data saving from damage of saving from damage, a little is saved from damage in a predetermined sequence, avoid factor data save from damage repetition submit cause logical miss with
It is invalid to save from damage.
Data protection servicer provided in an embodiment of the present invention, by testing the chain code for entering to join information saved from damage a little
Card, when receiving when saving data from damage maliciously to palm off data, chain code can not be palmed off data and will not be connect by checking, malice
Receive, ensure validity and security that data are saved from damage.
Data protection servicer provided in an embodiment of the present invention, by testing the chain code for entering to join information saved from damage a little
Card, when multiple different operation flows be present, each operation flow can be according to the predetermined guarantor of respective operation flow template
Full dot sequency carries out data and saved from damage, and mutual data, which are not present, intersects, and ensures the reliability that each operation flow data are saved from damage.
Shown in reference picture 4, in one embodiment, described data protection servicer, in addition to:
Cache module 104, cached for the next chain code saved from damage a little and the flow instance mark of generation to be corresponded to.
In one embodiment, described data protection servicer, the checking and receiving module 102, specifically for root
According on flow instance identifier lookup one caching for saving chain code a little and flow instance mark from damage, will enter to join chain code in information with it is upper
The one chain code caching for saving a little from damage is compared, if unanimously, being verified.
Data protection servicer provided in an embodiment of the present invention, by cache module by next chain code saved from damage a little of generation
With flow instance mark cached, when receive it is next save from damage a little when saving data from damage, when verifying into ginseng information, pass through flow reality
What is cached in example identifier lookup cache module enters to join chain code in information to corresponding chain code information with it, only when both compare
To it is consistent when, show that the chain code in ginseng information is accurate, just can be by saving the checking of chain code information a little from damage, number is saved in reception from damage
According to, saved from damage with saving data from damage according to dot sequency is saved from damage, while the reliability for saving data from damage can be ensured, prevent malice
Save data from damage and be mixed into and normally save from damage in data.
Shown in reference picture 4, in one embodiment, described data protection servicer, in addition to:
Judge module 105, for according to the operation flow template, determining whether that last saves data a little from damage;
The checking and receiving module 102, are additionally operable to judge that savepoint is saved from damage for last in the judge module 105
During point, after receiving last and saving point data from damage, terminate data and save from damage.
Data protection servicer provided in an embodiment of the present invention, a little judged saving from damage by judge module, work as judgement
It is affiliated to save from damage when a little saving from damage for last, by checking and receiving module, terminate data and save from damage, and update the data and save stream from damage
Journey is done state.
Embodiment 3:
Shown in reference picture 5, the embodiment of the present invention provides a kind of request data security method, including:
S201:Data are saved in request upload from damage, send save from damage a little enter to join information, it is described to enter to join information including pre-saving
Save chain code a little and flow instance mark from damage;
S202:When the next chain code saved from damage a little and flow instance that receive return identify, preserved, to make
Save request from damage for next data saved from damage a little to enter to join information.
Request data security method provided in an embodiment of the present invention, when asking the data saved from damage a little to be saved from damage every time, send
Save from damage a little enter to join information, only receive the server for saving data from damage, according to operation flow template, verify that it enters to join in information
After chain code and flow instance mark pass through, the data of transmission can just be saved from damage, ensure that what data saved from damage saves from damage a little according to pre-
Fixed order is saved from damage, is avoided factor data from saving repetition from damage and submit and is caused logical miss and invalid save from damage.
Request data security method provided in an embodiment of the present invention, when asking the data saved from damage a little to be saved from damage every time, send
Save from damage a little enter to join information, only receive the server for saving data from damage, according to operation flow template, verify that it enters to join in information
After chain code and flow instance mark pass through, the data of transmission can just be saved from damage, when the data of saving from damage of upload are palmed off for malice
During data, chain code can not be palmed off data and will not be received by checking, malice, ensure validity and safety that request data is saved from damage
Property.
Request data security method provided in an embodiment of the present invention, when multiple different operation flows be present, Mei Geye
Business flow can make requests on data and save from damage according to the predetermined dot sequency of saving from damage of respective operation flow template, mutual number
According in the absence of intersection, ensure the reliability that each operation flow data are saved from damage.
In one embodiment, described request data security method, in addition to:
When it is described save from damage a little for it is non-it is first save from damage when, the chain code saved from damage a little and flow instance that pre-save are identified as hair
Serve the data saved from damage a little and save the chain code returned during request and flow instance mark from damage;
When it is described save from damage a little for first save from damage when, it is described enter join chain code in information and flow instance be encoded to it is default
Character string.
Embodiment 4:
Shown in reference picture 6, the embodiment of the present invention provides a kind of client management system server, including:
Request module 201, saves from damage for request data, send save from damage a little enter to join information, it is described to enter to join information and include in advance
The chain code saved from damage a little and the flow instance mark first preserved;
Preserving module 202, for when the next chain code saved from damage a little and flow instance that receive return identify, carrying out
Preserve, enter to join information to save request from damage as next data saved from damage a little.
Client management system server provided in an embodiment of the present invention, when asking the data saved from damage a little to be saved from damage every time, lead to
Cross request module send save from damage a little enter to join information, only receive the server for saving data from damage, according to operation flow template, verify
It enters to join chain code in information and after flow instance mark passes through, and the data of transmission can just be saved from damage, ensure that data are saved from damage
Save from damage and a little saved from damage in a predetermined sequence, avoid factor data from saving repetition from damage and submit and cause logical miss and invalid save from damage.
Client management system server provided in an embodiment of the present invention, when asking the data saved from damage a little to be saved from damage every time, hair
Send save from damage a little enter to join information, only receive the server for saving data from damage, according to operation flow template, verify that it enters to join in information
Chain code and flow instance mark pass through after, just can to request module send data save from damage, when request module upload
When saving data from damage maliciously to palm off data, chain code can not be palmed off data and will not be received by checking, malice, guarantee request data
The validity and security saved from damage.
Client management system server provided in an embodiment of the present invention, when multiple different operation flows be present, each
Operation flow can make requests on data and save from damage according to the predetermined dot sequency of saving from damage of respective operation flow template, mutual
Data, which are not present, intersects, and ensures the reliability that each operation flow data are saved from damage.
Embodiment 5:
The embodiment of the present invention provides a kind of data security system, including:
Foregoing any data protection servicer;
Foregoing client management system server.
Data security system provided in an embodiment of the present invention, uploaded by client management system server and save data from damage, number
According to protection servicer to saving the entering after the chain code joined in information is verified of data from damage, data are saved in reception from damage, according to business
Saving from damage for flow template is a little saved from damage in order, ensures order and reliability that data are saved from damage, by entering to join in information
Chain code verified that ensure the client management system request that data protection servicer receives saves data from damage effectively to save from damage
Data, ensure that data save rational and orderly progress from damage, improve the reliability that data are saved from damage, prevent malice personation data contamination data from protecting
Normally save data message from damage in total system.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more
The shape for the computer program product that usable storage medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.)
Formula.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention
God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these changes and modification.
Claims (13)
- A kind of 1. data security method, it is characterised in that including:Obtain data save from damage save from damage in request a little enter to join information, it is described to enter to join information and include chain code and flow instance mark;According to the operation flow template of acquisition, enter described in checking and join information, and received after being verified and save point data from damage;When last for saving a little non-operation flow template from damage is saved from damage, return to the next of generation and save from damage a little Chain code and flow instance mark.
- 2. data security method as claimed in claim 1, it is characterised in that also include:Next by generation saves from damage a little Chain code and flow instance mark are corresponded to and cached.
- 3. data security method as claimed in claim 2, it is characterised in that enter described in checking and join information, including:Save the caching that chain code a little and flow instance identify from damage according on flow instance identifier lookup one, will enter to join the chain in information Code is compared with the upper one chain code caching saved from damage a little, if unanimously, being verified.
- 4. data security method as claimed in claim 1, it is characterised in that it is described save from damage a little for first save from damage when, it enters Chain code and flow instance in ginseng information are identified as default character string;It is described save from damage a little for it is non-it is first save from damage when, it enters ginseng Chain code and flow instance in information are identified as the random number generated according to pre-defined rule.
- 5. data security method as claimed in claim 1, it is characterised in that also include:According to the operation flow template, sentence Whether disconnected be that last saves data a little from damage;If so, after receiving last and saving point data from damage, terminate data and save from damage.
- A kind of 6. data protection servicer, it is characterised in that including:Acquisition module, for obtain data save from damage request in save from damage a little enter to join information;It is described to enter to join information and include chain code and stream Journey instance identification;Checking and receiving module, for the operation flow template according to acquisition, enter described in checking and join information, and after being verified Point data is saved in reception from damage;Generation module, for generating and returning the next chain code saved from damage a little and flow instance mark.
- 7. data protection servicer as claimed in claim 6, it is characterised in that also include:Cache module, cached for the next chain code saved from damage a little and the flow instance mark of generation to be corresponded to.
- 8. data protection servicer as claimed in claim 7, it is characterised in thatThe checking and receiving module, specifically for saving chain code and flow instance a little from damage according on flow instance identifier lookup one The caching of mark, it will enter to join chain code in information and be compared with the upper one chain code caching saved from damage a little, if unanimously, checking is logical Cross.
- 9. data protection servicer as claimed in claim 6, it is characterised in that also include:Judge module, whether it is that last saves data a little from damage for according to the operation flow template, judging that data are saved from damage;The checking and receiving module, it is additionally operable to, when the judge module judges that savepoint is saved from damage for last, connecing Receive after last saves point data from damage, terminate data and save from damage.
- A kind of 10. request data security method, it is characterised in that including:Data are saved in request upload from damage, send save from damage a little enter to join information, it is described to enter to join information and including what is pre-saved save from damage a little Chain code and flow instance mark;When the next chain code saved from damage a little and flow instance that receive return identify, preserved, so as to as next guarantor The data put entirely save request from damage and enter to join information.
- 11. request data security method as claimed in claim 10, it is characterised in that also include:When it is described save from damage a little for it is non-it is first save from damage when, the chain code saved from damage a little pre-saved and flow instance are identified as hair Serve the data saved from damage a little and save the chain code returned during request and flow instance mark from damage;When it is described save from damage a little for first save from damage when, it is described to enter to join chain code in information and flow instance is encoded to default character String.
- A kind of 12. client management system server, it is characterised in that including:Request module, save from damage for request data, send save from damage a little enter to join information, it is described to enter to join information including pre-saving Save chain code a little and flow instance mark from damage;Preserving module, for when the next chain code saved from damage a little and flow instance that receive return identify, being preserved, with Just save request from damage as next data saved from damage a little to enter to join information.
- A kind of 13. data security system, it is characterised in that including:Data protection servicer as described in claim 6-9;Client management system server as claimed in claim 12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710986733.0A CN107846400A (en) | 2017-10-20 | 2017-10-20 | The methods, devices and systems that a kind of data are saved from damage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710986733.0A CN107846400A (en) | 2017-10-20 | 2017-10-20 | The methods, devices and systems that a kind of data are saved from damage |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107846400A true CN107846400A (en) | 2018-03-27 |
Family
ID=61662532
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710986733.0A Pending CN107846400A (en) | 2017-10-20 | 2017-10-20 | The methods, devices and systems that a kind of data are saved from damage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107846400A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010002485A1 (en) * | 1995-01-17 | 2001-05-31 | Bisbee Stephen F. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
CN1674495A (en) * | 2005-04-07 | 2005-09-28 | 肖禄生 | Uncopying several-into-one identification method and apparatus |
CN101165696A (en) * | 2006-10-16 | 2008-04-23 | 中国长城计算机深圳股份有限公司 | Safety identification method based on safe computer |
CN104333562A (en) * | 2014-11-27 | 2015-02-04 | 沈文策 | Data packet transmission method and device |
CN105007275A (en) * | 2015-07-29 | 2015-10-28 | 浪潮(北京)电子信息产业有限公司 | Single-way safety isolation data transmission method and system |
CN107124281A (en) * | 2017-05-05 | 2017-09-01 | 国信嘉宁数据技术有限公司 | A kind of data security method and related system |
-
2017
- 2017-10-20 CN CN201710986733.0A patent/CN107846400A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010002485A1 (en) * | 1995-01-17 | 2001-05-31 | Bisbee Stephen F. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
CN1674495A (en) * | 2005-04-07 | 2005-09-28 | 肖禄生 | Uncopying several-into-one identification method and apparatus |
CN101165696A (en) * | 2006-10-16 | 2008-04-23 | 中国长城计算机深圳股份有限公司 | Safety identification method based on safe computer |
CN104333562A (en) * | 2014-11-27 | 2015-02-04 | 沈文策 | Data packet transmission method and device |
CN105007275A (en) * | 2015-07-29 | 2015-10-28 | 浪潮(北京)电子信息产业有限公司 | Single-way safety isolation data transmission method and system |
CN107124281A (en) * | 2017-05-05 | 2017-09-01 | 国信嘉宁数据技术有限公司 | A kind of data security method and related system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3779760B1 (en) | Blockchain-based data processing method and apparatus, and electronic device | |
WO2022134760A1 (en) | Data processing method and apparatus, and electronic device and medium | |
CN107392618A (en) | It is implanted into the method and apparatus of intelligent contract | |
CN112131002B (en) | Data management method and device | |
CN111914029A (en) | Block chain-based medical data calling method and device, electronic equipment and medium | |
CN113364753B (en) | Anti-crawler method and device, electronic equipment and computer readable storage medium | |
CN108256303A (en) | Electronic device, auth method and storage medium | |
CN112104627B (en) | Block chain-based data transmission method and device, electronic equipment and storage medium | |
CN113176968B (en) | Security test method, device and storage medium based on interface parameter classification | |
CN107547572A (en) | A kind of CAN communication means based on pseudo random number | |
CN103973782A (en) | Operation and maintenance operation control system and method based on blacklist command setting | |
CN112528307A (en) | Service request checking method and device, electronic equipment and storage medium | |
CN107438832A (en) | A kind of method for refreshing data, device and computer-readable recording medium | |
CN107819768A (en) | Service end actively disconnects method, terminal device and the storage medium of illegal long connection | |
CN113381992B (en) | License management method based on block chain | |
CN103501292B (en) | Method and system for achieving data safety protection by using standby mobile phone | |
CN109101577A (en) | A kind of data circulation method, apparatus and system | |
CN112667244A (en) | Data verification method and device, electronic equipment and computer readable storage medium | |
CN107846400A (en) | The methods, devices and systems that a kind of data are saved from damage | |
CN107436920A (en) | Node.js authority control methods, storage medium, electronic equipment and system | |
CN112085611A (en) | Asynchronous data verification method and device, electronic equipment and storage medium | |
CN111901299A (en) | Application authentication method and device, electronic equipment and storage medium | |
CN115119197B (en) | Wireless network risk analysis method, device, equipment and medium based on big data | |
CN111209577A (en) | Method and device for adding watermark data, storage medium and electronic equipment | |
CN115021995B (en) | Multi-channel login method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180327 |