CN107846400A - The methods, devices and systems that a kind of data are saved from damage - Google Patents

The methods, devices and systems that a kind of data are saved from damage Download PDF

Info

Publication number
CN107846400A
CN107846400A CN201710986733.0A CN201710986733A CN107846400A CN 107846400 A CN107846400 A CN 107846400A CN 201710986733 A CN201710986733 A CN 201710986733A CN 107846400 A CN107846400 A CN 107846400A
Authority
CN
China
Prior art keywords
damage
data
save
little
saved
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710986733.0A
Other languages
Chinese (zh)
Inventor
徐茂兰
袁飞
曲明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guoxin Kaning Data Technology Co Ltd
Original Assignee
Guoxin Kaning Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guoxin Kaning Data Technology Co Ltd filed Critical Guoxin Kaning Data Technology Co Ltd
Priority to CN201710986733.0A priority Critical patent/CN107846400A/en
Publication of CN107846400A publication Critical patent/CN107846400A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of data security method, including:Obtain data save from damage save from damage in request a little enter to join information, it is described to enter to join information and include chain code and flow instance mark;According to the operation flow template of acquisition, enter described in checking and join information, and received after being verified and save point data from damage;When last for saving a little non-operation flow template from damage is saved from damage, the next chain code saved from damage a little and the flow instance mark of generation are returned.The present invention solves data in the prior art and saves information from damage and can not carry out validation verification, saves the problem of logical miss easily occurs for data from damage.

Description

The methods, devices and systems that a kind of data are saved from damage
Technical field
The present invention relates to the methods, devices and systems that a kind of data are saved from damage.
Background technology
As computer internet is throughout application, electronic data is used as using computer as carrier, is entered using electronic form Row obtains, fixed evidence form, not only has very high efficiency, and ensure that the safety of original document.Electronic data is not allowed Easily distorted by people, and there is the legal effect equal with papery evidence.It is with spreadsheet format (text that electronic data, which is saved from damage, Word, figure, letter, numeral, three-dimensional symbol, color combination and sound and above-mentioned factor combination etc.) existing for all kinds of electron numbers It is believed that breath, carries out computing, encryption fixation, states clearly and save generation standard time, operation values, Docket No. etc. from damage, prevent from being distorted by people, Ensure the program and method of electronic data primitiveness and objectivity.Saved from damage by data and the anti-of electronic data content is effectively ensured usurps Change, ensure convenience and security that data are saved from damage.But electronic data carry out data save from damage when, it is necessary to ensure to save data from damage Save order from damage, confusion does not occur for the logic for saving data from damage, also to prevent that malice is mixed into electronic data palms off data. How to ensure that data are saved from damage in sequence, save from damage and do not occur to repeat to preserve in data, prevent from palming off data to saving from damage The pollution of data, turn into electronic data urgent problem to be solved when carrying out data and saving from damage.
The content of the invention
In view of technological deficiency present in prior art and technology drawback, the embodiment of the present invention provide overcome above mentioned problem or The methods, devices and systems that a kind of data that person solves the above problems at least in part are saved from damage.
As the one side of the embodiment of the present invention, it is related to a kind of data security method, including:
Obtain data save from damage save from damage in request a little enter to join information, it is described to enter to join information and include chain code and flow instance mark Know;
According to the operation flow template of acquisition, enter described in checking and join information, and received after being verified and save point data from damage;
When last for saving a little non-operation flow template from damage is saved from damage, return to the next of generation and save from damage Chain code and the flow instance mark of point.
In one embodiment, described data security method also includes:By next chain code saved from damage a little of generation and Flow instance mark is corresponding to be cached.
In one embodiment, described data security method, enter to join information described in checking, including:
Save the caching that chain code a little and flow instance identify from damage according on flow instance identifier lookup one, will enter to join in information Chain code with upper one save from damage a little chain code caching be compared, if unanimously, being verified.
In one embodiment, described data security method, it is described save from damage a little for first save from damage when, it enters to join information In chain code and flow instance be identified as default character string;It is described save from damage a little for it is non-it is first save from damage when, it enters to join in information Chain code and flow instance be identified as according to pre-defined rule generate random number.
In one embodiment, described data security method also includes:According to the operation flow template, judge whether Save data a little from damage for last;
If so, after receiving last and saving point data from damage, terminate data and save from damage.
As the other side of the embodiment of the present invention, it is related to a kind of data protection servicer, including:
Acquisition module, for obtain data save from damage request in save from damage a little enter to join information;It is described to enter to join information and include chain code Identified with flow instance;
Checking and receiving module, for the operation flow template according to acquisition, enter described in checking and join information, and logical in checking Later receive and save point data from damage;
Generation module, for generating and returning the next chain code saved from damage a little and flow instance mark.
In one embodiment, described data protection servicer, in addition to:
Cache module, cached for the next chain code saved from damage a little and the flow instance mark of generation to be corresponded to.
In one embodiment, described data protection servicer, the checking and receiving module, specifically for according to stream Journey instance identification searches upper one caching for saving chain code a little and flow instance mark from damage, will enter the chain code and upper one guarantor that join in information The chain code caching put entirely is compared, if unanimously, being verified.
In one embodiment, described data protection servicer, in addition to:
Judge module, for according to the operation flow template, determining whether that last saves data a little from damage;
The transceiver module, for when the judge module judges that savepoint is saved from damage for last, receiving After last saves point data from damage, terminate data and save from damage.
As the another aspect of the embodiment of the present invention, it is related to a kind of request data security method, including:
Data are saved in request upload from damage, send save from damage a little enter to join information, it is described to enter to join information and including what is pre-saved save from damage Chain code and the flow instance mark of point;
When the next chain code saved from damage a little and flow instance that receive return identify, preserved, so as to as under Individual data saved from damage a little save request from damage and enter to join information.
In one embodiment, described request data security method, in addition to:
When it is described save from damage a little for it is non-it is first save from damage when, the chain code saved from damage a little and flow instance that pre-save are identified as hair Serve the data saved from damage a little and save the chain code returned during request and flow instance mark from damage;
When it is described save from damage a little for first save from damage when, it is described enter join chain code in information and flow instance be encoded to it is default Character string.
As the 4th aspect of the embodiment of the present invention, it is related to a kind of client management system server, including:
Request module, save from damage for request data, send save from damage a little enter to join information, it is described to enter to join information and include guarantor in advance The chain code saved from damage a little and the flow instance mark deposited;
Preserving module, for when the next chain code saved from damage a little and flow instance that receive return identify, being protected Deposit, enter to join information to save request from damage as next data saved from damage a little.
As the 5th aspect of the embodiment of the present invention, it is related to a kind of data security system, including:
Foregoing any data protection servicer;
Foregoing client management system server.
The embodiment of the present invention at least realizes following technique effect:
Data security method provided in an embodiment of the present invention, when the data for carrying out saving from damage a little every time are saved from damage, it is required for testing Demonstrate,prove it and enter to join chain code and the flow instance mark that information includes, only according to operation flow template, can just be received by checking Save data from damage, and the next chain code saved from damage a little and flow instance brought back to life identify, ensure that data save from damage save from damage a little according to Predetermined order is saved from damage, is avoided factor data from saving repetition from damage and submit and is caused logical miss and invalid save from damage.
Data security method provided in an embodiment of the present invention, by being verified to the chain code for entering to join information saved from damage a little, When receiving when saving data from damage maliciously to palm off data, chain code can not be palmed off data and will not be received by checking, malice, guarantor The validity and security that card data are saved from damage.
Data security method provided in an embodiment of the present invention, by being verified to the chain code for entering to join information saved from damage a little, When multiple different operation flows be present, each operation flow can save from damage a little according to respective operation flow template is predetermined Order carries out data and saved from damage, and mutual data, which are not present, intersects, and ensures the reliability that each operation flow data are saved from damage.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages can be by the explanations write Described structure is realized and obtained in book, claims and accompanying drawing.
Below by drawings and examples, technical scheme is described in further detail.
Brief description of the drawings
Accompanying drawing is used for providing a further understanding of the present invention, and a part for constitution instruction, the reality with the present invention Apply example to be used to explain the present invention together, be not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is a kind of schematic flow sheet of data security method provided in an embodiment of the present invention;
Fig. 2 is a kind of another schematic flow sheet of data security method provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of data protection servicer provided in an embodiment of the present invention;
Fig. 4 is a kind of another structural representation of data protection servicer provided in an embodiment of the present invention;
Fig. 5 is a kind of schematic flow sheet of request data security method provided in an embodiment of the present invention;
Fig. 6 is a kind of structural representation of client management system server provided in an embodiment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
The various specific realities for the methods, devices and systems that a kind of data provided in an embodiment of the present invention are saved from damage separately below The mode of applying is described in detail.
Embodiment 1:
Shown in reference picture 1, a kind of data security method provided in an embodiment of the present invention, including:
S101:Obtain data save from damage save from damage in request a little enter to join information, it is described to enter to join information and include chain code and flow reality Example mark;
S102:According to the operation flow template of acquisition, enter described in checking and join information, and receive and save from damage a little after being verified Data;
S103:When last for saving a little non-operation flow template from damage is saved from damage, the next of generation is returned The individual chain code saved from damage a little and flow instance mark.
Data security method provided in an embodiment of the present invention, when the data for carrying out saving from damage a little every time are saved from damage, it is required for testing Demonstrate,prove it and enter to join chain code and the flow instance mark that information includes, only according to operation flow template, can just be received by checking Save data from damage, and the next chain code saved from damage a little and flow instance brought back to life identify, ensure that data save from damage save from damage a little according to Predetermined order is saved from damage, is avoided factor data from saving repetition from damage and submit and is caused logical miss and invalid save from damage.
Data security method provided in an embodiment of the present invention, by being verified to the chain code for entering to join information saved from damage a little, When receiving when saving data from damage maliciously to palm off data, chain code can not be palmed off data and will not be received by checking, malice, guarantor The validity and security that card data are saved from damage.
Data security method provided in an embodiment of the present invention, by being verified to the chain code for entering to join information saved from damage a little, When multiple different operation flows be present, each operation flow can save from damage a little according to respective operation flow template is predetermined Order carries out data and saved from damage, and mutual data, which are not present, intersects, and ensures the reliability that each operation flow data are saved from damage.
In one embodiment, the flow instance mark described in the embodiment of the present invention, refers to flow instance number information.
Shown in reference picture 2, in one embodiment, described data security method also includes:
S104:The next chain code saved from damage a little and the flow instance mark of generation are corresponded to and cached.
In one embodiment, described data security method, enter to join information described in checking, including:
Save the caching that chain code a little and flow instance identify from damage according on flow instance identifier lookup one, will enter to join in information Chain code with upper one save from damage a little chain code caching be compared, if unanimously, being verified.
Data security method provided in an embodiment of the present invention, by by next chain code and flow instance saved from damage a little of generation Mark cached, when receive it is next save from damage a little when saving data from damage, when verifying into ginseng information, pass through flow instance identifier lookup Chain code in information is joined to corresponding chain code information by entering with it of having cached, only when both compare it is consistent when, show to believe into ginseng Chain code in breath is accurate, just can be by saving the checking of chain code information a little from damage, and data are saved in reception from damage, with save from damage data according to Save dot sequency from damage to be saved from damage, while the reliability for saving data from damage can be ensured, prevent malice from saving data from damage and being mixed into normal guarantor In total evidence.
In one embodiment, described data security method, it is described save from damage a little for first save from damage when, it enters to join information In chain code and flow instance be identified as default character string;It is described save from damage a little for it is non-it is first save from damage when, it enters to join in information Chain code and flow instance be identified as according to pre-defined rule generate random number.
Data security method provided in an embodiment of the present invention, traffic flow template is obtained, it is first when carrying out saving data receiver from damage When the individual chain code saved from damage a little calls for the first time, it is default character string to enter the chain code joined in information, specifically, can be, it is described Default character string be empty string " ";When the first chain code saved from damage a little calls for the first time, enter the flow instance mark joined in information For default character string, specifically, can be, described default character string be empty string " ".
Shown in reference picture 2, in one embodiment, described data security method also includes:
S105:According to the operation flow template, determine whether that last saves data a little from damage;
If so, after receiving last and saving point data from damage, terminate data and save from damage.
The data security method of the embodiment of the present invention, in the case that operation flow template includes multiple save from damage a little, upload To last save from damage a little save data from damage after the completion of, when system is judged as that last is saved from damage, terminates data and save from damage, update The state that this time data are saved from damage is completion status.
In one embodiment, described data security method, when a quantity of saving from damage for operation flow template only has one When, when data are saved in reception from damage, verify that the chain code in ginseng information and flow instance are identified as default character string, that is, receive and protect That puts entirely saves data from damage, terminates data and saves from damage, and it is completion status to update the state that this data is saved from damage.
In one embodiment, described data security method, in addition to:
Receive save from damage a little include that chain code and flow instance identify enter to join information, when checking, this enters to join information wrong When, stop data and save from damage.
As an embodiment of the embodiment of the present invention, when verifying chain code mistake in ginseng information, return wrong Response message by mistake, remind client management system server end to stop upload and save data from damage.
Embodiment 2:
Shown in reference picture 3, the embodiment of the present invention provides a kind of data protection servicer, including:
Acquisition module 101, for obtain data save from damage request in save from damage a little enter to join information;It is described to enter to join information and include chain Code and flow instance mark;
Checking and receiving module 102, for the operation flow template according to acquisition, enter described in checking and join information, and testing Card receives after passing through saves point data from damage;
Generation module 103, for generating and returning the next chain code saved from damage a little and flow instance mark.
Data protection servicer provided in an embodiment of the present invention, when the data for carrying out saving from damage a little every time are saved from damage, by obtaining Modulus block obtain data save from damage request in save from damage a little enter to join information, by verify and receiving module verify that it enters to join in information and wrap Chain code and the flow instance mark included, only according to operation flow template, can just be received by checking and save data from damage, in checking and Receiving module receives save data from damage after, the next chain code saved from damage a little and flow instance are generated by generation module and identifies and returns to visitor Family Tomcat-AdminPortal, as it is next save from damage a little enter to join information.
Data protection servicer provided in an embodiment of the present invention, the checking identified by chain code and flow instance, Neng Goubao Card data saving from damage of saving from damage, a little is saved from damage in a predetermined sequence, avoid factor data save from damage repetition submit cause logical miss with It is invalid to save from damage.
Data protection servicer provided in an embodiment of the present invention, by testing the chain code for entering to join information saved from damage a little Card, when receiving when saving data from damage maliciously to palm off data, chain code can not be palmed off data and will not be connect by checking, malice Receive, ensure validity and security that data are saved from damage.
Data protection servicer provided in an embodiment of the present invention, by testing the chain code for entering to join information saved from damage a little Card, when multiple different operation flows be present, each operation flow can be according to the predetermined guarantor of respective operation flow template Full dot sequency carries out data and saved from damage, and mutual data, which are not present, intersects, and ensures the reliability that each operation flow data are saved from damage.
Shown in reference picture 4, in one embodiment, described data protection servicer, in addition to:
Cache module 104, cached for the next chain code saved from damage a little and the flow instance mark of generation to be corresponded to.
In one embodiment, described data protection servicer, the checking and receiving module 102, specifically for root According on flow instance identifier lookup one caching for saving chain code a little and flow instance mark from damage, will enter to join chain code in information with it is upper The one chain code caching for saving a little from damage is compared, if unanimously, being verified.
Data protection servicer provided in an embodiment of the present invention, by cache module by next chain code saved from damage a little of generation With flow instance mark cached, when receive it is next save from damage a little when saving data from damage, when verifying into ginseng information, pass through flow reality What is cached in example identifier lookup cache module enters to join chain code in information to corresponding chain code information with it, only when both compare To it is consistent when, show that the chain code in ginseng information is accurate, just can be by saving the checking of chain code information a little from damage, number is saved in reception from damage According to, saved from damage with saving data from damage according to dot sequency is saved from damage, while the reliability for saving data from damage can be ensured, prevent malice Save data from damage and be mixed into and normally save from damage in data.
Shown in reference picture 4, in one embodiment, described data protection servicer, in addition to:
Judge module 105, for according to the operation flow template, determining whether that last saves data a little from damage;
The checking and receiving module 102, are additionally operable to judge that savepoint is saved from damage for last in the judge module 105 During point, after receiving last and saving point data from damage, terminate data and save from damage.
Data protection servicer provided in an embodiment of the present invention, a little judged saving from damage by judge module, work as judgement It is affiliated to save from damage when a little saving from damage for last, by checking and receiving module, terminate data and save from damage, and update the data and save stream from damage Journey is done state.
Embodiment 3:
Shown in reference picture 5, the embodiment of the present invention provides a kind of request data security method, including:
S201:Data are saved in request upload from damage, send save from damage a little enter to join information, it is described to enter to join information including pre-saving Save chain code a little and flow instance mark from damage;
S202:When the next chain code saved from damage a little and flow instance that receive return identify, preserved, to make Save request from damage for next data saved from damage a little to enter to join information.
Request data security method provided in an embodiment of the present invention, when asking the data saved from damage a little to be saved from damage every time, send Save from damage a little enter to join information, only receive the server for saving data from damage, according to operation flow template, verify that it enters to join in information After chain code and flow instance mark pass through, the data of transmission can just be saved from damage, ensure that what data saved from damage saves from damage a little according to pre- Fixed order is saved from damage, is avoided factor data from saving repetition from damage and submit and is caused logical miss and invalid save from damage.
Request data security method provided in an embodiment of the present invention, when asking the data saved from damage a little to be saved from damage every time, send Save from damage a little enter to join information, only receive the server for saving data from damage, according to operation flow template, verify that it enters to join in information After chain code and flow instance mark pass through, the data of transmission can just be saved from damage, when the data of saving from damage of upload are palmed off for malice During data, chain code can not be palmed off data and will not be received by checking, malice, ensure validity and safety that request data is saved from damage Property.
Request data security method provided in an embodiment of the present invention, when multiple different operation flows be present, Mei Geye Business flow can make requests on data and save from damage according to the predetermined dot sequency of saving from damage of respective operation flow template, mutual number According in the absence of intersection, ensure the reliability that each operation flow data are saved from damage.
In one embodiment, described request data security method, in addition to:
When it is described save from damage a little for it is non-it is first save from damage when, the chain code saved from damage a little and flow instance that pre-save are identified as hair Serve the data saved from damage a little and save the chain code returned during request and flow instance mark from damage;
When it is described save from damage a little for first save from damage when, it is described enter join chain code in information and flow instance be encoded to it is default Character string.
Embodiment 4:
Shown in reference picture 6, the embodiment of the present invention provides a kind of client management system server, including:
Request module 201, saves from damage for request data, send save from damage a little enter to join information, it is described to enter to join information and include in advance The chain code saved from damage a little and the flow instance mark first preserved;
Preserving module 202, for when the next chain code saved from damage a little and flow instance that receive return identify, carrying out Preserve, enter to join information to save request from damage as next data saved from damage a little.
Client management system server provided in an embodiment of the present invention, when asking the data saved from damage a little to be saved from damage every time, lead to Cross request module send save from damage a little enter to join information, only receive the server for saving data from damage, according to operation flow template, verify It enters to join chain code in information and after flow instance mark passes through, and the data of transmission can just be saved from damage, ensure that data are saved from damage Save from damage and a little saved from damage in a predetermined sequence, avoid factor data from saving repetition from damage and submit and cause logical miss and invalid save from damage.
Client management system server provided in an embodiment of the present invention, when asking the data saved from damage a little to be saved from damage every time, hair Send save from damage a little enter to join information, only receive the server for saving data from damage, according to operation flow template, verify that it enters to join in information Chain code and flow instance mark pass through after, just can to request module send data save from damage, when request module upload When saving data from damage maliciously to palm off data, chain code can not be palmed off data and will not be received by checking, malice, guarantee request data The validity and security saved from damage.
Client management system server provided in an embodiment of the present invention, when multiple different operation flows be present, each Operation flow can make requests on data and save from damage according to the predetermined dot sequency of saving from damage of respective operation flow template, mutual Data, which are not present, intersects, and ensures the reliability that each operation flow data are saved from damage.
Embodiment 5:
The embodiment of the present invention provides a kind of data security system, including:
Foregoing any data protection servicer;
Foregoing client management system server.
Data security system provided in an embodiment of the present invention, uploaded by client management system server and save data from damage, number According to protection servicer to saving the entering after the chain code joined in information is verified of data from damage, data are saved in reception from damage, according to business Saving from damage for flow template is a little saved from damage in order, ensures order and reliability that data are saved from damage, by entering to join in information Chain code verified that ensure the client management system request that data protection servicer receives saves data from damage effectively to save from damage Data, ensure that data save rational and orderly progress from damage, improve the reliability that data are saved from damage, prevent malice personation data contamination data from protecting Normally save data message from damage in total system.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The shape for the computer program product that usable storage medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.) Formula.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (13)

  1. A kind of 1. data security method, it is characterised in that including:
    Obtain data save from damage save from damage in request a little enter to join information, it is described to enter to join information and include chain code and flow instance mark;
    According to the operation flow template of acquisition, enter described in checking and join information, and received after being verified and save point data from damage;
    When last for saving a little non-operation flow template from damage is saved from damage, return to the next of generation and save from damage a little Chain code and flow instance mark.
  2. 2. data security method as claimed in claim 1, it is characterised in that also include:Next by generation saves from damage a little Chain code and flow instance mark are corresponded to and cached.
  3. 3. data security method as claimed in claim 2, it is characterised in that enter described in checking and join information, including:
    Save the caching that chain code a little and flow instance identify from damage according on flow instance identifier lookup one, will enter to join the chain in information Code is compared with the upper one chain code caching saved from damage a little, if unanimously, being verified.
  4. 4. data security method as claimed in claim 1, it is characterised in that it is described save from damage a little for first save from damage when, it enters Chain code and flow instance in ginseng information are identified as default character string;It is described save from damage a little for it is non-it is first save from damage when, it enters ginseng Chain code and flow instance in information are identified as the random number generated according to pre-defined rule.
  5. 5. data security method as claimed in claim 1, it is characterised in that also include:According to the operation flow template, sentence Whether disconnected be that last saves data a little from damage;
    If so, after receiving last and saving point data from damage, terminate data and save from damage.
  6. A kind of 6. data protection servicer, it is characterised in that including:
    Acquisition module, for obtain data save from damage request in save from damage a little enter to join information;It is described to enter to join information and include chain code and stream Journey instance identification;
    Checking and receiving module, for the operation flow template according to acquisition, enter described in checking and join information, and after being verified Point data is saved in reception from damage;
    Generation module, for generating and returning the next chain code saved from damage a little and flow instance mark.
  7. 7. data protection servicer as claimed in claim 6, it is characterised in that also include:
    Cache module, cached for the next chain code saved from damage a little and the flow instance mark of generation to be corresponded to.
  8. 8. data protection servicer as claimed in claim 7, it is characterised in that
    The checking and receiving module, specifically for saving chain code and flow instance a little from damage according on flow instance identifier lookup one The caching of mark, it will enter to join chain code in information and be compared with the upper one chain code caching saved from damage a little, if unanimously, checking is logical Cross.
  9. 9. data protection servicer as claimed in claim 6, it is characterised in that also include:
    Judge module, whether it is that last saves data a little from damage for according to the operation flow template, judging that data are saved from damage;
    The checking and receiving module, it is additionally operable to, when the judge module judges that savepoint is saved from damage for last, connecing Receive after last saves point data from damage, terminate data and save from damage.
  10. A kind of 10. request data security method, it is characterised in that including:
    Data are saved in request upload from damage, send save from damage a little enter to join information, it is described to enter to join information and including what is pre-saved save from damage a little Chain code and flow instance mark;
    When the next chain code saved from damage a little and flow instance that receive return identify, preserved, so as to as next guarantor The data put entirely save request from damage and enter to join information.
  11. 11. request data security method as claimed in claim 10, it is characterised in that also include:
    When it is described save from damage a little for it is non-it is first save from damage when, the chain code saved from damage a little pre-saved and flow instance are identified as hair Serve the data saved from damage a little and save the chain code returned during request and flow instance mark from damage;
    When it is described save from damage a little for first save from damage when, it is described to enter to join chain code in information and flow instance is encoded to default character String.
  12. A kind of 12. client management system server, it is characterised in that including:
    Request module, save from damage for request data, send save from damage a little enter to join information, it is described to enter to join information including pre-saving Save chain code a little and flow instance mark from damage;
    Preserving module, for when the next chain code saved from damage a little and flow instance that receive return identify, being preserved, with Just save request from damage as next data saved from damage a little to enter to join information.
  13. A kind of 13. data security system, it is characterised in that including:
    Data protection servicer as described in claim 6-9;
    Client management system server as claimed in claim 12.
CN201710986733.0A 2017-10-20 2017-10-20 The methods, devices and systems that a kind of data are saved from damage Pending CN107846400A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710986733.0A CN107846400A (en) 2017-10-20 2017-10-20 The methods, devices and systems that a kind of data are saved from damage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710986733.0A CN107846400A (en) 2017-10-20 2017-10-20 The methods, devices and systems that a kind of data are saved from damage

Publications (1)

Publication Number Publication Date
CN107846400A true CN107846400A (en) 2018-03-27

Family

ID=61662532

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710986733.0A Pending CN107846400A (en) 2017-10-20 2017-10-20 The methods, devices and systems that a kind of data are saved from damage

Country Status (1)

Country Link
CN (1) CN107846400A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010002485A1 (en) * 1995-01-17 2001-05-31 Bisbee Stephen F. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
CN1674495A (en) * 2005-04-07 2005-09-28 肖禄生 Uncopying several-into-one identification method and apparatus
CN101165696A (en) * 2006-10-16 2008-04-23 中国长城计算机深圳股份有限公司 Safety identification method based on safe computer
CN104333562A (en) * 2014-11-27 2015-02-04 沈文策 Data packet transmission method and device
CN105007275A (en) * 2015-07-29 2015-10-28 浪潮(北京)电子信息产业有限公司 Single-way safety isolation data transmission method and system
CN107124281A (en) * 2017-05-05 2017-09-01 国信嘉宁数据技术有限公司 A kind of data security method and related system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010002485A1 (en) * 1995-01-17 2001-05-31 Bisbee Stephen F. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
CN1674495A (en) * 2005-04-07 2005-09-28 肖禄生 Uncopying several-into-one identification method and apparatus
CN101165696A (en) * 2006-10-16 2008-04-23 中国长城计算机深圳股份有限公司 Safety identification method based on safe computer
CN104333562A (en) * 2014-11-27 2015-02-04 沈文策 Data packet transmission method and device
CN105007275A (en) * 2015-07-29 2015-10-28 浪潮(北京)电子信息产业有限公司 Single-way safety isolation data transmission method and system
CN107124281A (en) * 2017-05-05 2017-09-01 国信嘉宁数据技术有限公司 A kind of data security method and related system

Similar Documents

Publication Publication Date Title
EP3779760B1 (en) Blockchain-based data processing method and apparatus, and electronic device
WO2022134760A1 (en) Data processing method and apparatus, and electronic device and medium
CN107392618A (en) It is implanted into the method and apparatus of intelligent contract
CN112131002B (en) Data management method and device
CN111914029A (en) Block chain-based medical data calling method and device, electronic equipment and medium
CN113364753B (en) Anti-crawler method and device, electronic equipment and computer readable storage medium
CN108256303A (en) Electronic device, auth method and storage medium
CN112104627B (en) Block chain-based data transmission method and device, electronic equipment and storage medium
CN113176968B (en) Security test method, device and storage medium based on interface parameter classification
CN107547572A (en) A kind of CAN communication means based on pseudo random number
CN103973782A (en) Operation and maintenance operation control system and method based on blacklist command setting
CN112528307A (en) Service request checking method and device, electronic equipment and storage medium
CN107438832A (en) A kind of method for refreshing data, device and computer-readable recording medium
CN107819768A (en) Service end actively disconnects method, terminal device and the storage medium of illegal long connection
CN113381992B (en) License management method based on block chain
CN103501292B (en) Method and system for achieving data safety protection by using standby mobile phone
CN109101577A (en) A kind of data circulation method, apparatus and system
CN112667244A (en) Data verification method and device, electronic equipment and computer readable storage medium
CN107846400A (en) The methods, devices and systems that a kind of data are saved from damage
CN107436920A (en) Node.js authority control methods, storage medium, electronic equipment and system
CN112085611A (en) Asynchronous data verification method and device, electronic equipment and storage medium
CN111901299A (en) Application authentication method and device, electronic equipment and storage medium
CN115119197B (en) Wireless network risk analysis method, device, equipment and medium based on big data
CN111209577A (en) Method and device for adding watermark data, storage medium and electronic equipment
CN115021995B (en) Multi-channel login method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180327