CN108171078A - A kind of data security method and device towards third-party cloud platform evaluation system - Google Patents
A kind of data security method and device towards third-party cloud platform evaluation system Download PDFInfo
- Publication number
- CN108171078A CN108171078A CN201711441199.1A CN201711441199A CN108171078A CN 108171078 A CN108171078 A CN 108171078A CN 201711441199 A CN201711441199 A CN 201711441199A CN 108171078 A CN108171078 A CN 108171078A
- Authority
- CN
- China
- Prior art keywords
- daily record
- party
- encrypted
- evaluation system
- cloud platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses a kind of data security methods and device towards third-party cloud platform evaluation system.The daily record data and daily record that this method provides cloud service platform prove that information is encrypted, and daily record data is stored in the form of log chain.When third party's evaluating system evaluates and tests a cloud service platform using collected daily record data; the verification of information and log chain sequence verification are proved firstly the need of daily record is carried out to daily record data; prevent daily record data from illegally being distorted in use; so as to ensure that primitiveness and integrality to journal file verify, while privacy of user is protected using encrypted means.
Description
Technical field
This application involves cloud service field, more specifically to a kind of towards third-party cloud platform evaluation system
Data security method and device.
Background technology
The fast development of cloud service has provided great convenience to the user, but also brings some safety issues simultaneously.It is empty
During planization terminal use, since account becomes whether control resource allows the unique control mode used, if cloud is put down
Platform safety and management measure are improper, can cause the security risks such as unauthorized use, unauthorized access and leaking data.To user
Speech, it is to know cloud service provider infrastructure and cloud system to evaluate and test system to carry out real-time auditing and evaluation to cloud platform by third party
Credible effective way.But during collector journal data, it can equally face that the safety such as illegally to intercept and capture, distort hidden
Suffer from.In addition, cloud service provider needs to consider the secret protection of user, the number with user information usually can not be directly provided
According to.
Invention content
In view of this, the application provides a kind of data security method and dress towards third-party cloud platform evaluation system
It puts, not only can guarantee that third party's evaluating system verifies, but also put forward from cloud service the primitiveness and integrality of journal file
Privacy of user is protected for the angle of quotient.
To achieve these goals, it is proposed that scheme it is as follows:
A kind of data security method of facing cloud platform third party evaluation system, the method is tested and assessed towards third party is
System, including:
The daily record data of cloud platform is obtained, and the daily record data is parsed to generate multiple first daily record examples;
The multiple first daily record example is encrypted, generates multiple second daily record examples;
According to the Last modification time of daily record example, the multiple second daily record example is carried out according to sequencing
Arrangement generates log chain;
Obtaining the daily record for the second daily record example that cloud platform provides proves information, and generation daily record proves information instances;
The the second daily record example and the corresponding daily record of the second daily record example for retrieving each virtual IP address prove example;
Example, which is encrypted, to be proved to the second daily record example and the corresponding daily record of the second daily record example, is generated
Including proves the third daily record example of information.
Preferably, it is described that the multiple first daily record example is encrypted, multiple second daily record examples are generated, including:
The multiple first daily record example is encrypted using the public key of third party's evaluation system, generates multiple second days
Will example.
Preferably, it is described the second daily record example and the corresponding daily record of the second daily record example are proved example into
Row encryption, generation include the third daily record example for proving information, including:
The second daily record example and the corresponding daily record of the second daily record example are proved using the private key of cloud platform
Example is encrypted, and generation includes the third daily record example for proving information.
Preferably, it further includes:The second daily record example and the log chain were stored to the day of third party's evaluation system
Will database.
Preferably, it further includes:The daily record that the third daily record example is stored to third party's evaluation system is proved into number
According to library.
A kind of data secure device of facing cloud platform third party evaluation system, described device is tested and assessed towards third party is
System, including:
First data acquisition unit, for obtaining the daily record data of cloud platform, and the daily record data is parsed with
Generate multiple first daily record examples;
First encryption unit for the multiple first daily record example to be encrypted, generates multiple second daily record examples;
Log chain generation unit, for the Last modification time according to daily record example, according to sequencing to described
Multiple second daily record examples are arranged, and generate log chain;
Second data acquisition unit, the daily record for obtaining the second daily record example of cloud platform offer prove information,
Generating daily record proves information instances;
Retrieval unit, it is corresponding for retrieving the second daily record example of each virtual IP address and the second daily record example
Daily record proves example;
Second encryption unit, for proving the second daily record example and the corresponding daily record of the second daily record example
Example is encrypted, and generation includes the third daily record example for proving information.
Preferably, first encryption unit uses the public key of third party's evaluation system to the multiple first daily record example
It is encrypted, generates multiple second daily record examples.
Preferably, second encryption unit uses the private key of cloud platform to the second daily record example and described second
The corresponding daily record of daily record example proves that example is encrypted, and generation includes the third daily record example for proving information.
Preferably:The log chain generation unit is additionally operable to store the second daily record example and the log chain to
The log database of tripartite's evaluation system.
Preferably, second encryption unit, which is additionally operable to store to the third party to test and assess by the third daily record example, is
The daily record of system proves database.
As can be seen from the above technical solutions, this application discloses a kind of data towards third-party cloud platform evaluation system
Security method and device.The daily record data and daily record that this method provides cloud service platform prove that information is encrypted, and
Daily record data is stored in the form of log chain.When third party's evaluating system using collected daily record data to a cloud
When service platform is evaluated and tested, it is necessary first to carrying out daily record to daily record data proves the verification of information and log chain sequence verification,
Prevent daily record data from illegally being distorted in use, so as to ensure that primitiveness and the integrality progress to journal file
Verification, while protect privacy of user using encrypted means.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention, for those of ordinary skill in the art, without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 shows an a kind of data towards third-party cloud platform evaluation system disclosed in one embodiment of the invention
Security method flow diagram;
Fig. 2 is to prove Information Authentication flow;
Fig. 3 is log chain sequence verification flow;
Fig. 4 shows a kind of data towards third-party cloud platform evaluation system disclosed in another embodiment of the present invention
The structure diagram of secure device.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Based on this
Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained without making creative work
Example is applied, shall fall within the protection scope of the present invention.
A kind of data of facing cloud platform third party evaluation system disclosed in one embodiment of the invention are shown referring to Fig. 1
The flow diagram of security method.
In the present embodiment, this method includes:
S101:The daily record data of cloud platform is obtained, and the daily record data is parsed to generate multiple first daily records
Example.
First with cloud platform foundation communicate, with collect different types of daily record data (including network log, process daily record,
Operating system daily record), and daily record data is parsed to generate the first daily record example, it is illustrated below with network log.
One network log example definition is as follows:
LE=<FromIP,ToIP,TL,Port,UserID,Content>
Wherein, FromIP is source IP, and ToIP is destination IP, and TL is the UTC time of network operation, and Port is port numbers,
UserID is the ID of cloud platform user, and Content is other contents of operation note.
S102:The multiple first daily record example is encrypted, generates multiple second daily record examples.
Safety in order to protect data, using the public key PKA of third party's evaluating system come to the data information in daily record example
It is encrypted, the second daily record example (Encrypted Log Entry, ELE) after generation encryption represents as follows:
ELE=<EPKA(ToIP,Port,UserID,FromIP,TL,Content)>
S103:According to the Last modification time of daily record example, according to sequencing to the multiple second daily record reality
Example is arranged, and generates log chain.
After ELE is generated, (it is included in the timestamp information of file) according to Last modification time of file, according to
Sequencing is arranged as log chain (Log chain, LC), log chain can be caused to reset if there is illegally distorting.Log chain
It represents as follows:
LC=<ELE,LCprev>
LCprev is the first sequence daily record example of current log example.
And then store the second daily record example and log chain to log database, DBLE is expressed as, is made of ELE and LC:
DBLE=<ELE,LC>
S104:Obtaining the daily record for the second daily record example that cloud platform provides proves information, and generation daily record proves information
Example.
Obtaining the daily record that cloud service provider provides proves information and generates daily record proof information instances, including raw log files
Check value, all kinds of timestamp informations, be expressed as pro:
Pro=<H(LE),time-stamp 1,time-stamp 2,...>
Newer daily record proof example is sent to daily record proves that database stores.
S105:The the second daily record example and the corresponding daily record of the second daily record example for retrieving each virtual IP address prove
Example.
Database, which is retrieved, to be proved to log database and daily record in preset time, obtains the second of each virtual IP address
Daily record example and the corresponding daily record of the second daily record example prove information, are expressed as AED:
AED=<ELE,Pro>
S106:Example, which adds, to be proved to the second daily record example and the corresponding daily record of the second daily record example
Close, generation includes the third daily record example for proving information.
The second daily record example and the corresponding daily record of the second daily record example are proved using the private key of cloud platform
Example is encrypted, and generation includes the third daily record example for proving information, represents as follows:
LogPro=<AED,Tp,SigSKC(AED,Tp)>
Tp represents the generated time of this document, SigSKC (AED, Tp) be using cloud service provider private key SKC to (AED,
TP the digital signature of generation) is encrypted.
It is right first when third party's evaluating system evaluates and tests a cloud service platform using collected daily record data
Daily record data carries out proving the verification of information and log chain sequence verification.Fig. 2 is to prove Information Authentication flow, first uses cloud respectively
Platform public key and third party's evaluation system private key by third daily record example and the corresponding daily record of third daily record example prove example into
Row decryption, if that can prove that example verifies third daily record example with the daily record of decryption again if successful decryption, if verification
By carrying out the verification of daily record chain-ordering again, to verify the integrality of journal file.Fig. 3 is log chain sequence verification flow, false
If there are one log chains:(ELE0, LC0) (ELE1, LC1) ...
Because LC1 is the first sequence of second daily record example, that is, (ELE0, LC0), if so log chain have passed through it is non-
Method is distorted, and sequence can change (because being arranged according to Last modification timestamp), if (ELE0, LC0) and LC1
Identical explanation is not distorted illegally.The verification method is able to verify that the primitiveness of journal file, prevents from existing during use
Illegally distort.
Compared with prior art, the present invention provides daily record by cloud service provider proves information, and use the private key of cloud service provider
Digital signature is generated, protects cloud platform privacy of user;Journal file is stored in the form of log chain, prevents from making by sequence verification
With illegally being distorted in the process.
It is shown referring to Fig. 4 a kind of towards third-party cloud platform evaluation system disclosed in another embodiment of the present invention
The structure diagram of data secure device.
As shown in Figure 4, which includes:First data acquisition unit 1, the first encryption unit 2, log chain generation unit 3,
Second data acquisition unit 4, retrieval unit 5, the second encryption unit 6.
First data acquisition unit 1 is used to obtain the daily record data of cloud platform, and the daily record data is parsed with
Generate multiple first daily record examples.
For network example, which is represented by
LE=<FromIP,ToIP,TL,Port,UserID,Content>
Wherein, FromIP is source IP, and ToIP is destination IP, and TL is the UTC time of network operation, and Port is port numbers,
UserID is the ID of cloud platform user, and Content is other contents of operation note.
And then first encryption unit 2 using the public key PKA of third party's evaluating system come to the data in the first daily record example
Information is encrypted, and the second daily record example (EncryptedLog Entry, ELE) after generation encryption represents as follows:
ELE=<EPKA(ToIP,Port,UserID,FromIP,TL,Content)>
Log chain generation unit 3 is used for the Last modification time according to daily record example, according to sequencing to second
Daily record example is arranged, and generates log chain.Wherein, which represents as follows:
LC=<ELE,LCprev>
LCprev is the first sequence daily record example of current log example.
And then store the second daily record example and log chain to log database, DBLE is expressed as, is made of ELE and LC.
The daily record that second data acquisition unit 4 is used to obtain the second daily record example of cloud platform offer proves information,
Generating daily record proves information instances, and then newer daily record proof information instances are stored in the daily record card of third party's evaluation system
In bright database.
In daily regular time point, retrieval unit 5 proves to retrieve each in database in log database and daily record
The corresponding daily record of the second daily record example and the second daily record example of virtual IP address proves example, is expressed as AED:
AED=<ELE,Pro>
Wherein, ELE is the second daily record example, and Pro is the corresponding daily record permit of the second daily record example.
Second encryption unit 6 is to the second daily record example and the second daily record example pair described in the private key using cloud platform
The daily record answered proves that example is encrypted, and generation includes the third daily record example for proving information, and third daily record example is sent out
The daily record to third party's evaluation system is sent to prove to store in database, wherein third daily record example represents as follows:
LogPro=<AED,Tp,SigSKC(AED,Tp)>
Tp represents the generated time of this document, SigSKC (AED, Tp) be using cloud service provider private key SKC to (AED,
TP the digital signature of generation) is encrypted.
It should be noted that the system embodiment is corresponding with embodiment of the method, implementation procedure is identical with implementation principle,
Therefore not to repeat here.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, term " comprising ", "comprising" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only include that
A little elements, but also including other elements that are not explicitly listed or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except also there are other identical elements in the process, method, article or apparatus that includes the element.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other
The difference of embodiment, just to refer each other for identical similar portion between each embodiment.
The foregoing description of the disclosed embodiments enables professional and technical personnel in the field to realize or use the present invention.
A variety of modifications of these embodiments will be apparent for those skilled in the art, it is as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention
The embodiments shown herein is not intended to be limited to, and is to fit to and the principles and novel features disclosed herein phase one
The most wide range caused.
Claims (10)
1. a kind of data security method of facing cloud platform third party evaluation system, which is characterized in that including:
The daily record data of cloud platform is obtained, and the daily record data is parsed to generate multiple first daily record examples;
The multiple first daily record example is encrypted, generates multiple second daily record examples;
According to the Last modification time of daily record example, the multiple second daily record example is arranged according to sequencing
Row generate log chain;
Obtaining the daily record for the second daily record example that cloud platform provides proves information, and generation daily record proves information instances;
The the second daily record example and the corresponding daily record of the second daily record example for retrieving each virtual IP address prove example;
Example, which is encrypted, to be proved to the second daily record example and the corresponding daily record of the second daily record example, generation includes
Having proves the third daily record example of information.
2. according to the method described in claim 1, it is characterized in that, described be encrypted the multiple first daily record example,
Multiple second daily record examples are generated, including:
The multiple first daily record example is encrypted using the public key of third party's evaluation system, it is real to generate multiple second daily records
Example.
It is 3. according to the method described in claim 1, it is characterized in that, described to the second daily record example and the second day
The corresponding daily record of will example proves that example is encrypted, and generation includes the third daily record example for proving information, including:
Example is proved to the second daily record example and the corresponding daily record of the second daily record example using the private key of cloud platform
It is encrypted, generation includes the third daily record example for proving information.
4. it according to the method described in claim 1, it is characterized in that, further includes:By the second daily record example and the daily record
Chain is stored to the log database of third party's evaluation system.
5. it according to the method described in claim 1, it is characterized in that, further includes:The third daily record example is stored to described
The daily record of third party's evaluation system proves database.
6. a kind of data secure device of facing cloud platform third party evaluation system, described device towards third party's evaluation system,
It is characterised in that it includes:
First data acquisition unit for obtaining the daily record data of cloud platform, and parses the daily record data to generate
Multiple first daily record examples;
First encryption unit for the multiple first daily record example to be encrypted, generates multiple second daily record examples;
Log chain generation unit, for the Last modification time according to daily record example, according to sequencing to the multiple
Second daily record example is arranged, and generates log chain;
Second data acquisition unit, the daily record for obtaining the second daily record example of cloud platform offer prove information, generation
Daily record proves information instances;
Retrieval unit, for retrieving the second daily record example of each virtual IP address and the corresponding daily record of the second daily record example
Prove example;
Second encryption unit, for proving example to the second daily record example and the corresponding daily record of the second daily record example
It is encrypted, generation includes the third daily record example for proving information.
7. device according to claim 6, which is characterized in that first encryption unit is using third party's evaluation system
The multiple first daily record example is encrypted in public key, generates multiple second daily record examples.
8. device according to claim 6, which is characterized in that second encryption unit is using the private key of cloud platform to institute
Stating the second daily record example and the corresponding daily record of the second daily record example proves that example is encrypted, and generation includes permit
The third daily record example of breath.
9. device according to claim 6, which is characterized in that the log chain generation unit is additionally operable to the second day
Will example and the log chain are stored to the log database of third party's evaluation system.
10. device according to claim 6, which is characterized in that second encryption unit is additionally operable to the third daily record
Example, which is stored to the daily record of third party's evaluation system, proves database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711441199.1A CN108171078B (en) | 2017-12-27 | 2017-12-27 | Data preservation method and device of cloud platform evaluation system facing third party |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711441199.1A CN108171078B (en) | 2017-12-27 | 2017-12-27 | Data preservation method and device of cloud platform evaluation system facing third party |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108171078A true CN108171078A (en) | 2018-06-15 |
CN108171078B CN108171078B (en) | 2021-08-31 |
Family
ID=62521695
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711441199.1A Active CN108171078B (en) | 2017-12-27 | 2017-12-27 | Data preservation method and device of cloud platform evaluation system facing third party |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108171078B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109697605A (en) * | 2019-01-11 | 2019-04-30 | 深圳讼融通网络科技有限公司 | Generation method, system and the readable storage medium storing program for executing of property preservation data record |
CN111444519A (en) * | 2019-01-16 | 2020-07-24 | 西门子股份公司 | Protecting integrity of log data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6339828B1 (en) * | 1997-05-28 | 2002-01-15 | Symantec Corporation | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record |
CN101039186A (en) * | 2007-05-08 | 2007-09-19 | 中国科学院软件研究所 | Method for auditing safely system log |
US20110150221A1 (en) * | 2009-12-18 | 2011-06-23 | Kabushiki Kaisha Toshiba | Account aggregation system, information processing apparatus and encryption key management method of the account aggregation system |
CN107104804A (en) * | 2017-05-10 | 2017-08-29 | 成都麟成科技有限公司 | A kind of platform integrity verification method and device |
CN107395355A (en) * | 2017-06-12 | 2017-11-24 | 广东工业大学 | A kind of cloud storage data integrity verification method based on implicit trusted third party |
-
2017
- 2017-12-27 CN CN201711441199.1A patent/CN108171078B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6339828B1 (en) * | 1997-05-28 | 2002-01-15 | Symantec Corporation | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record |
CN101039186A (en) * | 2007-05-08 | 2007-09-19 | 中国科学院软件研究所 | Method for auditing safely system log |
US20110150221A1 (en) * | 2009-12-18 | 2011-06-23 | Kabushiki Kaisha Toshiba | Account aggregation system, information processing apparatus and encryption key management method of the account aggregation system |
CN107104804A (en) * | 2017-05-10 | 2017-08-29 | 成都麟成科技有限公司 | A kind of platform integrity verification method and device |
CN107395355A (en) * | 2017-06-12 | 2017-11-24 | 广东工业大学 | A kind of cloud storage data integrity verification method based on implicit trusted third party |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109697605A (en) * | 2019-01-11 | 2019-04-30 | 深圳讼融通网络科技有限公司 | Generation method, system and the readable storage medium storing program for executing of property preservation data record |
CN111444519A (en) * | 2019-01-16 | 2020-07-24 | 西门子股份公司 | Protecting integrity of log data |
CN111444519B (en) * | 2019-01-16 | 2023-08-22 | 西门子股份公司 | Protecting the integrity of log data |
Also Published As
Publication number | Publication date |
---|---|
CN108171078B (en) | 2021-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109413087B (en) | Data sharing method and device, digital gateway and computer readable storage medium | |
CN101834860B (en) | Method for remote dynamic verification on integrality of client software | |
Accorsi | BBox: A distributed secure log architecture | |
CN108449345A (en) | A kind of networked asset continues method for safety monitoring, system, equipment and storage medium | |
CN103368987B (en) | Cloud server, application program verification, certification and management system and application program verification, certification and management method | |
AU2852999A (en) | Method for securing safety of electronic information | |
US20160134495A1 (en) | Logging device and log aggregation device | |
CN103617402B (en) | A kind of multimedia electronic data forensic report and generation, methods of exhibiting and system | |
CN109254734A (en) | A kind of date storage method, device, equipment and computer readable storage medium | |
CN113672998B (en) | Anti-counterfeiting method and system for data in construction process of constructional engineering | |
US20060242088A1 (en) | System, method and program for managing information | |
CN108809990A (en) | A kind of crowdsourcing data safety encryption method, server and storage medium | |
Accorsi | Log data as digital evidence: What secure logging protocols have to offer? | |
CN109309645A (en) | A kind of software distribution security guard method | |
JP4295684B2 (en) | Program production device | |
Ćosić et al. | (Im) proving chain of custody and digital evidence integrity with time stamp | |
CN108171078A (en) | A kind of data security method and device towards third-party cloud platform evaluation system | |
KR102013415B1 (en) | System and method for verifying integrity of personal information | |
CN105404470B (en) | Date storage method and safety device, data-storage system | |
CN110493011B (en) | Block chain-based certificate issuing management method and device | |
Holmes et al. | A framework for live host-based Bitcoin wallet forensics and triage | |
KR20200004229A (en) | Method for protecting personal information in block chain environment and apparatus therefor | |
Kuntze et al. | On the creation of reliable digital evidence | |
CN116827821B (en) | Block chain cloud-based application program performance monitoring method | |
CN108900472A (en) | The transmission method and device of information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |