CN108363929A - System and method for generating information elimination report of storage device and preventing tampering - Google Patents
System and method for generating information elimination report of storage device and preventing tampering Download PDFInfo
- Publication number
- CN108363929A CN108363929A CN201810134242.8A CN201810134242A CN108363929A CN 108363929 A CN108363929 A CN 108363929A CN 201810134242 A CN201810134242 A CN 201810134242A CN 108363929 A CN108363929 A CN 108363929A
- Authority
- CN
- China
- Prior art keywords
- report
- message
- signature
- tamper
- source
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a system and a method for generating a storage device information elimination report and preventing falsification, wherein the system comprises a report generating module, a report generating module and a report generating module, wherein the report generating module is used for generating a falsification prevention report by using a plurality of levels of report embeds and unique abstract messages corresponding to the levels; the digital signature module is used for acquiring a global unique address code and carrying out encryption signature; and the biological characteristic identification module is used for biological characteristics. The method has the advantages that the multi-level anti-tampering report is obtained by combining the unique corresponding abstract message and the JSON report, wherein the corresponding abstract message is naturally inconsistent with the original embedded abstract message when any level is tampered as long as data change occurs.
Description
Technical field
The present invention relates to the storage system for eliminating information and method of a kind of computer realm more particularly to a kind of storage devices
Information eliminates report generation and tamper resistant systems and method.
Background technology
With the development and sizable application of computer and the communication technology, a large amount of electronic data needs to carry out effectively reliable
Storage and management, storage device is the memory carrier of electronic information.To stale data information or can not public data information into
Row information is eliminated, and is the important ring in electronic data management work.
During being eliminated into row information to storage device, needs the essential information to storage device, read-write daily record, disappears
Report is eliminated except the information such as flow, the time for executing elimination are summarized and form information.Existing information eliminates tool to letter
Breath eliminates the generation of report and method of auditing administration mode has the following disadvantages:
1. the operating personnel of pair generation report do not verify effectively.
2. the elimination equipment of pair generation report is not verified effectively.
3. the time of pair generation report is not verified effectively.
4. pair content for generating report does not have effective anti-tampering protection and verification.
Invention content
In order to solve the above-mentioned problems of the prior art, present invention aims at provide one kind to effectively prevent eliminating report
It is tampered and offsets the personnel of division operation and equipment all has the storing device information effectively verified and eliminates report generation and prevent usurping
Change system and method.
A kind of storing device information of the present invention eliminates report generation and tamper resistant systems, including:
Report generation module eliminates the information data of process for collecting and recording information, and using in multi-layer report
The anti-tamper report of embedding and each corresponding abstract message generation with uniqueness of level;
Digital Signature module encodes and is input to report generation module for obtaining globally unique location, and to report
Generation module specified data is encrypted signature and by ciphering signature content feed to report generation module;
Operating personnel's information is simultaneously fed back to report by biological characteristic recognition module, biological characteristic for obtaining operating personnel
Generation module.
Preferably, the Digital Signature module using asymmetric data crypto engine reference private key to specified data into
Row ciphering signature.
Preferably, source report is firstly generated after the report generation module collection and recording information data, then to source
The unique corresponding first abstract message of report output, and be encryption by the first abstract message ciphering signature using Digital Signature module
Message;Then it reports scrambled message write-in source to obtain signature report, corresponding second abstract unique to signature report output is interrogated
Breath;The second abstract message write-in signature report is finally obtained into anti-tamper report.
Preferably, the report generation module exports the corresponding abstract message of each report using hash algorithm.
Preferably, the described source report, signature report and anti-tamper JSON formats are reported as.
Preferably, the storing device information eliminates report generation and tamper resistant systems, by anti-tamper report write-in pair
Answer the designated position of monomer storage device.
Preferably, the storing device information eliminates report generation and tamper resistant systems, further includes Audit Module, is used for
It is successively audited to anti-tamper report.
Preferably, the Audit Module reads anti-tamper report in corresponding monomer storage device designated position, and tears open
It is divided into signature report and the second abstract message;First time verification is carried out, the unique abstract message for calculating signature report is plucked with second
Message is wanted to compare, abstract message full text unanimously passes through for verification;Signature report is split as source report and scrambled message;Carry out the
Secondary verification, the abstract message after calculating unique abstract message of source report and being decrypted with scrambled message carry out full text verification, entirely
It is literary unanimously to pass through for verification;Carry out third time verification again, from source report parse the monomer storage device essential information of record with
The monomer storage device essential information currently audited carries out consistency desired result;Third time verification is audited after passing through to be terminated.
A kind of report-generating method for eliminating report generation and tamper resistant systems based on the storing device information, including such as
Lower step:
S11, the information data that information eliminates process is eliminated and collected and record into row information to monomer storage device;
S12, generation include the source report of the JSON formats of timestamp, UUID and operating personnel's message;
S13, message of being made a summary using hash algorithm unique to source report output corresponding first, and added using asymmetric data
The ciphertext engine reference abstract message ciphering signature of private key pair first obtains scrambled message;
S14, it reports scrambled message write-in source to obtain signature report;
S15, hash algorithm corresponding second abstract message unique to signature report output is utilized;
S16, the second abstract message write-in signature report is obtained into anti-tamper report;
S17, monomer storage device designated position is written into anti-tamper report.
A kind of audit analytic method for eliminating report generation and tamper resistant method based on the storing device information, including such as
Lower step:
S21, anti-tamper report is read in monomer storage device designated position;
S22, anti-tamper report is split as to signature report and the second abstract message;
S23, first time verification is carried out:Unique abstract message of signature report is calculated using hash algorithm and the second abstract is interrogated
Breath compares, and abstract message full text unanimously passes through for verification;
S24, signature report is split as source report and scrambled message;
S25, second of verification is carried out:Using hash algorithm calculate source report unique abstract message and with scrambled message solution
Abstract message after close carries out full text verification, and full text unanimously passes through for verification;
S26, third time verification is carried out:From source, report parses the monomer storage device essential information of record and is currently examined
The monomer storage device essential information of meter carries out consistency desired result, and verification carries out in next step after passing through;
S27, parsing source report, obtains correct operating personnel's information, timestamp, UUID.
A kind of storing device information of the present invention eliminates report generation and tamper resistant systems and method, advantage exist
In being reported with JSON by unique corresponding abstract message and be combined to obtain the anti-tamper report of multi-layer, as long as wherein any
Data variation occurs for level, that is, when being tampered, the abstract message embedded with original is inconsistent naturally for corresponding abstract message.And wherein
The abstract message of one level, by being inserted into corresponding report after Digital Signature module ciphering signature, is shut out as encrypted object
The possibility that data are cracked by level one by one absolutely.Elimination operation can be carried out by disposable recording in the anti-tamper report
Operating personnel's information, timestamp and UUID, to information eliminate monomer storage device carry out effectively manage and audit.Finally
The anti-tamper report of generation is written to the position specified to monomer storage device, since the designated position is not to granddad
It opens, therefore generates hiding technique effect from the initial step distorted, further improve anti-tamper effect.
Description of the drawings
Fig. 1 is the structural schematic diagram that storing device information of the present invention eliminates report generation and tamper resistant systems;
Fig. 2 is the report generation flow chart that storing device information of the present invention eliminates report generation and tamper resistant method;
Fig. 3 is the audit process of analysis figure that storing device information of the present invention eliminates report generation and tamper resistant method.
Specific implementation mode
As shown in Figure 1, a kind of storing device information of the present invention eliminates report generation and tamper resistant systems, including it is straight
The elimination equipment 100 for eliminating operation into row information to monomer storage device 200 is connect, the elimination equipment 100 further comprises report
Accuse generation module 101, Digital Signature module 102, biological characteristic recognition module 103 and Audit Module 104.
Wherein the report generation module 101 collects and firstly generates source report after recording information data, then to source
The unique corresponding first abstract message of report output, and be by the first abstract message ciphering signature using Digital Signature module 102
Scrambled message;Then it reports scrambled message write-in source to obtain signature report, signature report output unique corresponding second is plucked
Want message;The second abstract message write-in signature report is finally obtained into anti-tamper report.The Digital Signature module 102 obtains
Belong to the globally unique location coding (UUID, Universally UniqueIdentifier) for eliminating equipment 100, and by UUID
It is input to and eliminates equipment 100.When report generation module 101 needs that signature is encrypted to specified data, asymmetric number is utilized
It is completed according to crypto engine RSA reference private keys.It finally eliminates equipment 100 and corresponding monomer storage device 200 is written into anti-tamper report
Designated position, complete entire complete anti-tamper report generation process.
The biological characteristic that the biological characteristic recognition module 103 is acquired includes but is not limited to fingerprint, face information,
Biological characteristic recognition module 103 biological characteristic of first acquisition operations personnel and preservation before enabling.
When needing to audit to monomer storage device 200, the Audit Module 104 is set in corresponding monomer storage
Anti-tamper report is read in standby 200 designated positions, and is split as signature report and the second abstract message.First time verification is carried out, is calculated
The unique abstract message and the second abstract message for going out signature report compare, and abstract message full text unanimously passes through for verification.It will signature
Report is split as source report and scrambled message, and second of verification of row calculates the unique abstract message and and scrambled message of source report
Abstract message after decryption carries out full text verification, and full text unanimously passes through for verification.Third time verification is carried out again, is reported and is parsed from source
200 essential information of monomer storage device for going out record and 200 essential information of monomer storage device currently audited carry out unanimously
Property verification;Third time verification is audited after passing through to be terminated.
The storing device information eliminates the operation principle and generation/auditing method of report generation and tamper resistant systems as schemed
2, shown in 3.
When generating anti-tamper report, follow the steps below:
S11, the information data that information eliminates process is eliminated and collected and record into row information to monomer storage device 200;
S12, generation include the source report J1 of the JSON formats of timestamp, UUID and operating personnel's message;
S13, unique corresponding first abstract message Z1 is exported to source report J1 using hash algorithm, and utilizes asymmetric number
Scrambled message Z1m is obtained according to the crypto engine reference abstract message Z1 ciphering signatures of private key pair first;
S14, scrambled message Z1m write-ins source report J1 is obtained into signature report J2;
S15, unique corresponding second abstract message Z2 is exported to signature report J2 using hash algorithm;
S16, the second abstract message Z2 write-in signature reports J2 is obtained into anti-tamper report J3;
S17, anti-tamper report J3 is written to 200 designated position of monomer storage device;Complete entire anti-tamper report J3 lifes
At flow.
When needing to be audited to the anti-tamper report J3 in monomer storage device 200 and parse contents, carry out
Following steps:
S21, anti-tamper report J3 is read in 200 designated position of monomer storage device;
S22, anti-tamper report J3 is split as to the signature abstract messages of report J2 and second Z2;
S23, first time verification is carried out:The unique abstract message and the second abstract of signature report J2 are calculated using hash algorithm
Message Z2 is compared, and abstract message full text unanimously passes through for verification;
S24, signature report J2 is split as source report J1 and scrambled message Z1m;
S25, second of verification is carried out:The unique abstract message and and scrambled message that J1 is reported in source are calculated using hash algorithm
Abstract message after Z1m decryption carries out full text verification, and full text unanimously passes through for verification;
Wherein the decrypting process is to read public key from Digital Signature module 102, used when using with generation report
Asymmetric data Encryption Algorithm is decrypted scrambled message Z1m and exports the summary info after decryption.
S26, third time verification is carried out:From source, report J1 parses 200 essential information of monomer storage device of record and works as
Preceding 200 essential information of monomer storage device audited carries out consistency desired result, and verification carries out in next step after passing through;
S27 finally parses source report J1, is obtained correctly finally after examining passed through three times
The complete information that operating personnel's information, timestamp, UUID etc. are formerly recorded completes the audit resolution flow of entire anti-tamper report
Journey.
For those skilled in the art, technical solution that can be as described above and design are made other each
The corresponding change of kind and deformation, and all these changes and deformation should all belong to the protection model of the claims in the present invention
Within enclosing.
Claims (10)
1. a kind of storing device information eliminates report generation and tamper resistant systems, which is characterized in that including:
Report generation module (101) eliminates the information data of process for collecting and recording information, and using in multi-layer report
The anti-tamper report of embedding and each corresponding abstract message generation with uniqueness of level;
Digital Signature module (102) encodes and is input to report generation module (101) for obtaining globally unique location, and
Signature is encrypted to report generation module (101) specified data and by ciphering signature content feed to report generation module
(101);
Operating personnel's information is simultaneously fed back to report by biological characteristic recognition module (103), biological characteristic for obtaining operating personnel
Accuse generation module (101).
2. storing device information eliminates report generation and tamper resistant systems according to claim 1, which is characterized in that described
Signature is encrypted to specified data using asymmetric data crypto engine reference private key in Digital Signature module (102).
3. storing device information eliminates report generation and tamper resistant systems according to claim 1, which is characterized in that described
Report generation module (101) collects and firstly generates source report after recording information data, is then uniquely corresponded to source report output
First abstract message, and using Digital Signature module (102) by first abstract message ciphering signature be scrambled message;Then will
Scrambled message write-in source reports to obtain signature report, corresponding second abstract message unique to signature report output;Finally by
Two abstract message write-in signature reports obtain anti-tamper report.
4. storing device information eliminates report generation and tamper resistant systems according to claim 3, which is characterized in that described
Report generation module (101) exports the corresponding abstract message of each report using hash algorithm.
5. storing device information eliminates report generation and tamper resistant systems according to claim 3, which is characterized in that described
Source report, signature report and anti-tamper it is reported as JSON formats.
6. storing device information eliminates report generation and tamper resistant systems according to claim 1, which is characterized in that usurped anti-
Change the designated position of the corresponding monomer storage device (200) of report write-in.
7. storing device information eliminates report generation and tamper resistant systems according to claim 1, which is characterized in that further include
Audit Module (104), for successively being audited to anti-tamper report.
8. storing device information eliminates report generation and tamper resistant systems according to claim 7, which is characterized in that described
Audit Module (104) reads anti-tamper report in corresponding monomer storage device (200) designated position, and is split as signature report
With the second abstract message;First time verification is carried out, the unique abstract message and the second abstract message for calculating signature report compare, and pluck
Message full text is wanted unanimously to pass through for verification;Signature report is split as source report and scrambled message;It carries out second to verify, calculate
Unique abstract message of source report simultaneously carries out full text verification with the abstract message after scrambled message decryption, and full text is unanimously logical to verify
It crosses;Third time verification is carried out again, and from source, report parses monomer storage device (200) essential information of record and currently audited
Monomer storage device (200) essential information carry out consistency desired result;Third time verification is audited after passing through to be terminated.
9. eliminating report generation and tamper resistant method according to any storing device informations of claim 1-8, which is characterized in that
Include the following steps:
S11, the information data that information eliminates process is eliminated and collected and record into row information to monomer storage device (200);
S12, generation include the source report of the JSON formats of timestamp, UUID and operating personnel's message;
S13, message of being made a summary using hash algorithm unique to source report output corresponding first, and drawn using asymmetric data encryption
It holds up the reference abstract message ciphering signature of private key pair first and obtains scrambled message;
S14, it reports scrambled message write-in source to obtain signature report;
S15, hash algorithm corresponding second abstract message unique to signature report output is utilized;
S16, the second abstract message write-in signature report is obtained into anti-tamper report;
S17, monomer storage device (200) designated position is written into anti-tamper report.
10. storing device information eliminates report generation and tamper resistant method according to claim 9, which is characterized in that including
Following steps:
S21, anti-tamper report is read in monomer storage device (200) designated position;
S22, anti-tamper report is split as to signature report and the second abstract message;
S23, first time verification is carried out:The unique abstract message and the second abstract message ratio of signature report are calculated using hash algorithm
Right, abstract message full text unanimously passes through for verification;
S24, signature report is split as source report and scrambled message;
S25, second of verification is carried out:After unique abstract message of source report being calculated using hash algorithm and being decrypted with scrambled message
Abstract message carry out full text verification, full text unanimously for verification passes through;
S26, third time verification is carried out:From source, report parses monomer storage device (200) essential information and currently quilt of record
Monomer storage device (200) essential information of audit carries out consistency desired result, and verification carries out in next step after passing through;
S27, parsing source report, obtains correct operating personnel's information, timestamp, UUID.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810134242.8A CN108363929B (en) | 2018-02-09 | 2018-02-09 | System and method for generating information elimination report of storage device and preventing tampering |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810134242.8A CN108363929B (en) | 2018-02-09 | 2018-02-09 | System and method for generating information elimination report of storage device and preventing tampering |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108363929A true CN108363929A (en) | 2018-08-03 |
CN108363929B CN108363929B (en) | 2022-05-13 |
Family
ID=63005312
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810134242.8A Active CN108363929B (en) | 2018-02-09 | 2018-02-09 | System and method for generating information elimination report of storage device and preventing tampering |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108363929B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109063514A (en) * | 2018-06-29 | 2018-12-21 | 百度在线网络技术(北京)有限公司 | For preventing the method, apparatus, equipment and computer readable storage medium of data tampering |
US20210111878A1 (en) * | 2019-10-10 | 2021-04-15 | Baidu Usa Llc | Method and system for signing output using a kernel |
US11436305B2 (en) | 2019-10-10 | 2022-09-06 | Baidu Usa Llc | Method and system for signing an artificial intelligence watermark using implicit data |
US11457002B2 (en) | 2019-10-10 | 2022-09-27 | Baidu Usa Llc | Method and system for encrypting data using a command |
US11537689B2 (en) | 2019-10-10 | 2022-12-27 | Baidu Usa Llc | Method and system for signing an artificial intelligence watermark using a kernel |
US11704390B2 (en) | 2019-10-10 | 2023-07-18 | Baidu Usa Llc | Method and system for signing an artificial intelligence watermark using a query |
US11775692B2 (en) | 2019-10-10 | 2023-10-03 | Baidu Usa Llc | Method and system for encrypting data using a kernel |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060026423A1 (en) * | 2004-07-12 | 2006-02-02 | International Business Machines Corporation | Privacy-protecting integrity attestation of a computing platform |
CN101458743A (en) * | 2007-12-12 | 2009-06-17 | 中国长城计算机深圳股份有限公司 | Method for protecting computer system |
CN101702150A (en) * | 2009-12-02 | 2010-05-05 | 江西金格网络科技有限责任公司 | Method for protecting, verifying and repealing content of PDF document page |
CN102622549A (en) * | 2012-03-20 | 2012-08-01 | 天津书生软件技术有限公司 | Electronic seal implementation system and method |
CN104462965A (en) * | 2014-11-14 | 2015-03-25 | 华为技术有限公司 | Method for verifying integrity of application program and network device |
CN104809490A (en) * | 2015-04-27 | 2015-07-29 | 华中科技大学 | Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system |
US20160019390A1 (en) * | 2012-10-04 | 2016-01-21 | International Business Machines Corporation | Data management of potentially malicious content |
CN105553651A (en) * | 2015-12-03 | 2016-05-04 | 小米科技有限责任公司 | Method and device for signature of disk mirror image files in Android system, and equipment |
CN107194266A (en) * | 2017-05-12 | 2017-09-22 | 江苏诺安科技有限公司 | It is a kind of to verify the method whether papery license is tampered |
-
2018
- 2018-02-09 CN CN201810134242.8A patent/CN108363929B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060026423A1 (en) * | 2004-07-12 | 2006-02-02 | International Business Machines Corporation | Privacy-protecting integrity attestation of a computing platform |
CN101458743A (en) * | 2007-12-12 | 2009-06-17 | 中国长城计算机深圳股份有限公司 | Method for protecting computer system |
CN101702150A (en) * | 2009-12-02 | 2010-05-05 | 江西金格网络科技有限责任公司 | Method for protecting, verifying and repealing content of PDF document page |
CN102622549A (en) * | 2012-03-20 | 2012-08-01 | 天津书生软件技术有限公司 | Electronic seal implementation system and method |
US20160019390A1 (en) * | 2012-10-04 | 2016-01-21 | International Business Machines Corporation | Data management of potentially malicious content |
CN104462965A (en) * | 2014-11-14 | 2015-03-25 | 华为技术有限公司 | Method for verifying integrity of application program and network device |
CN104809490A (en) * | 2015-04-27 | 2015-07-29 | 华中科技大学 | Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system |
CN105553651A (en) * | 2015-12-03 | 2016-05-04 | 小米科技有限责任公司 | Method and device for signature of disk mirror image files in Android system, and equipment |
CN107194266A (en) * | 2017-05-12 | 2017-09-22 | 江苏诺安科技有限公司 | It is a kind of to verify the method whether papery license is tampered |
Non-Patent Citations (3)
Title |
---|
P.GARG 等: ""An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function,"", 《2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT)》 * |
李锐等: ""存储虚拟化安全防护技术研究"", 《计算机安全》 * |
祁峰等: ""固态存储设备和器件的信息消除方法研究"", 《保密科学技术》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109063514A (en) * | 2018-06-29 | 2018-12-21 | 百度在线网络技术(北京)有限公司 | For preventing the method, apparatus, equipment and computer readable storage medium of data tampering |
CN109063514B (en) * | 2018-06-29 | 2022-01-25 | 阿波罗智联(北京)科技有限公司 | Method, apparatus, device and computer-readable storage medium for preventing data tampering |
US20210111878A1 (en) * | 2019-10-10 | 2021-04-15 | Baidu Usa Llc | Method and system for signing output using a kernel |
US11436305B2 (en) | 2019-10-10 | 2022-09-06 | Baidu Usa Llc | Method and system for signing an artificial intelligence watermark using implicit data |
US11457002B2 (en) | 2019-10-10 | 2022-09-27 | Baidu Usa Llc | Method and system for encrypting data using a command |
US11537689B2 (en) | 2019-10-10 | 2022-12-27 | Baidu Usa Llc | Method and system for signing an artificial intelligence watermark using a kernel |
US11637697B2 (en) * | 2019-10-10 | 2023-04-25 | Baidu Usa Llc | Method and system for signing output using a kernel |
US11704390B2 (en) | 2019-10-10 | 2023-07-18 | Baidu Usa Llc | Method and system for signing an artificial intelligence watermark using a query |
US11775692B2 (en) | 2019-10-10 | 2023-10-03 | Baidu Usa Llc | Method and system for encrypting data using a kernel |
Also Published As
Publication number | Publication date |
---|---|
CN108363929B (en) | 2022-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108363929A (en) | System and method for generating information elimination report of storage device and preventing tampering | |
US5619571A (en) | Method for securely storing electronic records | |
US20010034835A1 (en) | Applied digital and physical signatures over telecommunications media | |
CN104463554A (en) | Electronic seal achieving method and device | |
CN101311950A (en) | Electronic stamp realization method and device | |
CN110958319B (en) | Method and device for managing infringement and evidence-based block chain | |
KR100991855B1 (en) | System for Issuing and Verifying Electronic Document, Method for Issuing Electronic Document and Method for Verifying Electronic Document | |
EP1177517A1 (en) | Collaborative creation, editing, reviewing, and signing of electronic documents | |
CN104103029A (en) | Anti-counterfeiting method and anti-counterfeiting system for diagnosis certificate | |
CN116090024B (en) | Reliable data storage device, system and method | |
CN110021291A (en) | A kind of call method and device of speech synthesis file | |
CN117056899A (en) | Electronic certificate generation method and device | |
CN101123502A (en) | Measurement authentication method based on digital signature | |
CN117857151B (en) | Tamper-proof method for first-class electronic data of medicine based on sharing | |
CN114329634A (en) | Anti-counterfeiting method for electronic signature document | |
CN101388076A (en) | Method and apparatus for generating two-dimension bar-code | |
CN101226568A (en) | Juggling-proof electric medical record system | |
CN1321507C (en) | Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism | |
CN113297632B (en) | System and method for managing traceable and field-verified paper report certificates based on blockchain | |
CN108376212A (en) | Execute code security guard method, device and electronic device | |
CN113254983B (en) | Data processing method and device | |
WO2023172190A1 (en) | Method and apparatus for accessing data in a plurality of machine readable medium | |
CN115238315A (en) | Method for realizing doctor-patient common signature authentication electronic medical record system | |
CN116137567A (en) | Block chain-based school certificate issuing verification method, system and device | |
CN110555297B (en) | Method and system for managing certificates through block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |