CN108363929A - System and method for generating information elimination report of storage device and preventing tampering - Google Patents

System and method for generating information elimination report of storage device and preventing tampering Download PDF

Info

Publication number
CN108363929A
CN108363929A CN201810134242.8A CN201810134242A CN108363929A CN 108363929 A CN108363929 A CN 108363929A CN 201810134242 A CN201810134242 A CN 201810134242A CN 108363929 A CN108363929 A CN 108363929A
Authority
CN
China
Prior art keywords
report
message
signature
tamper
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810134242.8A
Other languages
Chinese (zh)
Other versions
CN108363929B (en
Inventor
许瑞本
艾歆
邓本瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xuneng Information Technology Co ltd
Original Assignee
Guangzhou Xuneng Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xuneng Information Technology Co ltd filed Critical Guangzhou Xuneng Information Technology Co ltd
Priority to CN201810134242.8A priority Critical patent/CN108363929B/en
Publication of CN108363929A publication Critical patent/CN108363929A/en
Application granted granted Critical
Publication of CN108363929B publication Critical patent/CN108363929B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a system and a method for generating a storage device information elimination report and preventing falsification, wherein the system comprises a report generating module, a report generating module and a report generating module, wherein the report generating module is used for generating a falsification prevention report by using a plurality of levels of report embeds and unique abstract messages corresponding to the levels; the digital signature module is used for acquiring a global unique address code and carrying out encryption signature; and the biological characteristic identification module is used for biological characteristics. The method has the advantages that the multi-level anti-tampering report is obtained by combining the unique corresponding abstract message and the JSON report, wherein the corresponding abstract message is naturally inconsistent with the original embedded abstract message when any level is tampered as long as data change occurs.

Description

A kind of storing device information eliminates report generation and tamper resistant systems and method
Technical field
The present invention relates to the storage system for eliminating information and method of a kind of computer realm more particularly to a kind of storage devices Information eliminates report generation and tamper resistant systems and method.
Background technology
With the development and sizable application of computer and the communication technology, a large amount of electronic data needs to carry out effectively reliable Storage and management, storage device is the memory carrier of electronic information.To stale data information or can not public data information into Row information is eliminated, and is the important ring in electronic data management work.
During being eliminated into row information to storage device, needs the essential information to storage device, read-write daily record, disappears Report is eliminated except the information such as flow, the time for executing elimination are summarized and form information.Existing information eliminates tool to letter Breath eliminates the generation of report and method of auditing administration mode has the following disadvantages:
1. the operating personnel of pair generation report do not verify effectively.
2. the elimination equipment of pair generation report is not verified effectively.
3. the time of pair generation report is not verified effectively.
4. pair content for generating report does not have effective anti-tampering protection and verification.
Invention content
In order to solve the above-mentioned problems of the prior art, present invention aims at provide one kind to effectively prevent eliminating report It is tampered and offsets the personnel of division operation and equipment all has the storing device information effectively verified and eliminates report generation and prevent usurping Change system and method.
A kind of storing device information of the present invention eliminates report generation and tamper resistant systems, including:
Report generation module eliminates the information data of process for collecting and recording information, and using in multi-layer report The anti-tamper report of embedding and each corresponding abstract message generation with uniqueness of level;
Digital Signature module encodes and is input to report generation module for obtaining globally unique location, and to report Generation module specified data is encrypted signature and by ciphering signature content feed to report generation module;
Operating personnel's information is simultaneously fed back to report by biological characteristic recognition module, biological characteristic for obtaining operating personnel Generation module.
Preferably, the Digital Signature module using asymmetric data crypto engine reference private key to specified data into Row ciphering signature.
Preferably, source report is firstly generated after the report generation module collection and recording information data, then to source The unique corresponding first abstract message of report output, and be encryption by the first abstract message ciphering signature using Digital Signature module Message;Then it reports scrambled message write-in source to obtain signature report, corresponding second abstract unique to signature report output is interrogated Breath;The second abstract message write-in signature report is finally obtained into anti-tamper report.
Preferably, the report generation module exports the corresponding abstract message of each report using hash algorithm.
Preferably, the described source report, signature report and anti-tamper JSON formats are reported as.
Preferably, the storing device information eliminates report generation and tamper resistant systems, by anti-tamper report write-in pair Answer the designated position of monomer storage device.
Preferably, the storing device information eliminates report generation and tamper resistant systems, further includes Audit Module, is used for It is successively audited to anti-tamper report.
Preferably, the Audit Module reads anti-tamper report in corresponding monomer storage device designated position, and tears open It is divided into signature report and the second abstract message;First time verification is carried out, the unique abstract message for calculating signature report is plucked with second Message is wanted to compare, abstract message full text unanimously passes through for verification;Signature report is split as source report and scrambled message;Carry out the Secondary verification, the abstract message after calculating unique abstract message of source report and being decrypted with scrambled message carry out full text verification, entirely It is literary unanimously to pass through for verification;Carry out third time verification again, from source report parse the monomer storage device essential information of record with The monomer storage device essential information currently audited carries out consistency desired result;Third time verification is audited after passing through to be terminated.
A kind of report-generating method for eliminating report generation and tamper resistant systems based on the storing device information, including such as Lower step:
S11, the information data that information eliminates process is eliminated and collected and record into row information to monomer storage device;
S12, generation include the source report of the JSON formats of timestamp, UUID and operating personnel's message;
S13, message of being made a summary using hash algorithm unique to source report output corresponding first, and added using asymmetric data The ciphertext engine reference abstract message ciphering signature of private key pair first obtains scrambled message;
S14, it reports scrambled message write-in source to obtain signature report;
S15, hash algorithm corresponding second abstract message unique to signature report output is utilized;
S16, the second abstract message write-in signature report is obtained into anti-tamper report;
S17, monomer storage device designated position is written into anti-tamper report.
A kind of audit analytic method for eliminating report generation and tamper resistant method based on the storing device information, including such as Lower step:
S21, anti-tamper report is read in monomer storage device designated position;
S22, anti-tamper report is split as to signature report and the second abstract message;
S23, first time verification is carried out:Unique abstract message of signature report is calculated using hash algorithm and the second abstract is interrogated Breath compares, and abstract message full text unanimously passes through for verification;
S24, signature report is split as source report and scrambled message;
S25, second of verification is carried out:Using hash algorithm calculate source report unique abstract message and with scrambled message solution Abstract message after close carries out full text verification, and full text unanimously passes through for verification;
S26, third time verification is carried out:From source, report parses the monomer storage device essential information of record and is currently examined The monomer storage device essential information of meter carries out consistency desired result, and verification carries out in next step after passing through;
S27, parsing source report, obtains correct operating personnel's information, timestamp, UUID.
A kind of storing device information of the present invention eliminates report generation and tamper resistant systems and method, advantage exist In being reported with JSON by unique corresponding abstract message and be combined to obtain the anti-tamper report of multi-layer, as long as wherein any Data variation occurs for level, that is, when being tampered, the abstract message embedded with original is inconsistent naturally for corresponding abstract message.And wherein The abstract message of one level, by being inserted into corresponding report after Digital Signature module ciphering signature, is shut out as encrypted object The possibility that data are cracked by level one by one absolutely.Elimination operation can be carried out by disposable recording in the anti-tamper report Operating personnel's information, timestamp and UUID, to information eliminate monomer storage device carry out effectively manage and audit.Finally The anti-tamper report of generation is written to the position specified to monomer storage device, since the designated position is not to granddad It opens, therefore generates hiding technique effect from the initial step distorted, further improve anti-tamper effect.
Description of the drawings
Fig. 1 is the structural schematic diagram that storing device information of the present invention eliminates report generation and tamper resistant systems;
Fig. 2 is the report generation flow chart that storing device information of the present invention eliminates report generation and tamper resistant method;
Fig. 3 is the audit process of analysis figure that storing device information of the present invention eliminates report generation and tamper resistant method.
Specific implementation mode
As shown in Figure 1, a kind of storing device information of the present invention eliminates report generation and tamper resistant systems, including it is straight The elimination equipment 100 for eliminating operation into row information to monomer storage device 200 is connect, the elimination equipment 100 further comprises report Accuse generation module 101, Digital Signature module 102, biological characteristic recognition module 103 and Audit Module 104.
Wherein the report generation module 101 collects and firstly generates source report after recording information data, then to source The unique corresponding first abstract message of report output, and be by the first abstract message ciphering signature using Digital Signature module 102 Scrambled message;Then it reports scrambled message write-in source to obtain signature report, signature report output unique corresponding second is plucked Want message;The second abstract message write-in signature report is finally obtained into anti-tamper report.The Digital Signature module 102 obtains Belong to the globally unique location coding (UUID, Universally UniqueIdentifier) for eliminating equipment 100, and by UUID It is input to and eliminates equipment 100.When report generation module 101 needs that signature is encrypted to specified data, asymmetric number is utilized It is completed according to crypto engine RSA reference private keys.It finally eliminates equipment 100 and corresponding monomer storage device 200 is written into anti-tamper report Designated position, complete entire complete anti-tamper report generation process.
The biological characteristic that the biological characteristic recognition module 103 is acquired includes but is not limited to fingerprint, face information, Biological characteristic recognition module 103 biological characteristic of first acquisition operations personnel and preservation before enabling.
When needing to audit to monomer storage device 200, the Audit Module 104 is set in corresponding monomer storage Anti-tamper report is read in standby 200 designated positions, and is split as signature report and the second abstract message.First time verification is carried out, is calculated The unique abstract message and the second abstract message for going out signature report compare, and abstract message full text unanimously passes through for verification.It will signature Report is split as source report and scrambled message, and second of verification of row calculates the unique abstract message and and scrambled message of source report Abstract message after decryption carries out full text verification, and full text unanimously passes through for verification.Third time verification is carried out again, is reported and is parsed from source 200 essential information of monomer storage device for going out record and 200 essential information of monomer storage device currently audited carry out unanimously Property verification;Third time verification is audited after passing through to be terminated.
The storing device information eliminates the operation principle and generation/auditing method of report generation and tamper resistant systems as schemed 2, shown in 3.
When generating anti-tamper report, follow the steps below:
S11, the information data that information eliminates process is eliminated and collected and record into row information to monomer storage device 200;
S12, generation include the source report J1 of the JSON formats of timestamp, UUID and operating personnel's message;
S13, unique corresponding first abstract message Z1 is exported to source report J1 using hash algorithm, and utilizes asymmetric number Scrambled message Z1m is obtained according to the crypto engine reference abstract message Z1 ciphering signatures of private key pair first;
S14, scrambled message Z1m write-ins source report J1 is obtained into signature report J2;
S15, unique corresponding second abstract message Z2 is exported to signature report J2 using hash algorithm;
S16, the second abstract message Z2 write-in signature reports J2 is obtained into anti-tamper report J3;
S17, anti-tamper report J3 is written to 200 designated position of monomer storage device;Complete entire anti-tamper report J3 lifes At flow.
When needing to be audited to the anti-tamper report J3 in monomer storage device 200 and parse contents, carry out Following steps:
S21, anti-tamper report J3 is read in 200 designated position of monomer storage device;
S22, anti-tamper report J3 is split as to the signature abstract messages of report J2 and second Z2;
S23, first time verification is carried out:The unique abstract message and the second abstract of signature report J2 are calculated using hash algorithm Message Z2 is compared, and abstract message full text unanimously passes through for verification;
S24, signature report J2 is split as source report J1 and scrambled message Z1m;
S25, second of verification is carried out:The unique abstract message and and scrambled message that J1 is reported in source are calculated using hash algorithm Abstract message after Z1m decryption carries out full text verification, and full text unanimously passes through for verification;
Wherein the decrypting process is to read public key from Digital Signature module 102, used when using with generation report Asymmetric data Encryption Algorithm is decrypted scrambled message Z1m and exports the summary info after decryption.
S26, third time verification is carried out:From source, report J1 parses 200 essential information of monomer storage device of record and works as Preceding 200 essential information of monomer storage device audited carries out consistency desired result, and verification carries out in next step after passing through;
S27 finally parses source report J1, is obtained correctly finally after examining passed through three times The complete information that operating personnel's information, timestamp, UUID etc. are formerly recorded completes the audit resolution flow of entire anti-tamper report Journey.
For those skilled in the art, technical solution that can be as described above and design are made other each The corresponding change of kind and deformation, and all these changes and deformation should all belong to the protection model of the claims in the present invention Within enclosing.

Claims (10)

1. a kind of storing device information eliminates report generation and tamper resistant systems, which is characterized in that including:
Report generation module (101) eliminates the information data of process for collecting and recording information, and using in multi-layer report The anti-tamper report of embedding and each corresponding abstract message generation with uniqueness of level;
Digital Signature module (102) encodes and is input to report generation module (101) for obtaining globally unique location, and Signature is encrypted to report generation module (101) specified data and by ciphering signature content feed to report generation module (101);
Operating personnel's information is simultaneously fed back to report by biological characteristic recognition module (103), biological characteristic for obtaining operating personnel Accuse generation module (101).
2. storing device information eliminates report generation and tamper resistant systems according to claim 1, which is characterized in that described Signature is encrypted to specified data using asymmetric data crypto engine reference private key in Digital Signature module (102).
3. storing device information eliminates report generation and tamper resistant systems according to claim 1, which is characterized in that described Report generation module (101) collects and firstly generates source report after recording information data, is then uniquely corresponded to source report output First abstract message, and using Digital Signature module (102) by first abstract message ciphering signature be scrambled message;Then will Scrambled message write-in source reports to obtain signature report, corresponding second abstract message unique to signature report output;Finally by Two abstract message write-in signature reports obtain anti-tamper report.
4. storing device information eliminates report generation and tamper resistant systems according to claim 3, which is characterized in that described Report generation module (101) exports the corresponding abstract message of each report using hash algorithm.
5. storing device information eliminates report generation and tamper resistant systems according to claim 3, which is characterized in that described Source report, signature report and anti-tamper it is reported as JSON formats.
6. storing device information eliminates report generation and tamper resistant systems according to claim 1, which is characterized in that usurped anti- Change the designated position of the corresponding monomer storage device (200) of report write-in.
7. storing device information eliminates report generation and tamper resistant systems according to claim 1, which is characterized in that further include Audit Module (104), for successively being audited to anti-tamper report.
8. storing device information eliminates report generation and tamper resistant systems according to claim 7, which is characterized in that described Audit Module (104) reads anti-tamper report in corresponding monomer storage device (200) designated position, and is split as signature report With the second abstract message;First time verification is carried out, the unique abstract message and the second abstract message for calculating signature report compare, and pluck Message full text is wanted unanimously to pass through for verification;Signature report is split as source report and scrambled message;It carries out second to verify, calculate Unique abstract message of source report simultaneously carries out full text verification with the abstract message after scrambled message decryption, and full text is unanimously logical to verify It crosses;Third time verification is carried out again, and from source, report parses monomer storage device (200) essential information of record and currently audited Monomer storage device (200) essential information carry out consistency desired result;Third time verification is audited after passing through to be terminated.
9. eliminating report generation and tamper resistant method according to any storing device informations of claim 1-8, which is characterized in that Include the following steps:
S11, the information data that information eliminates process is eliminated and collected and record into row information to monomer storage device (200);
S12, generation include the source report of the JSON formats of timestamp, UUID and operating personnel's message;
S13, message of being made a summary using hash algorithm unique to source report output corresponding first, and drawn using asymmetric data encryption It holds up the reference abstract message ciphering signature of private key pair first and obtains scrambled message;
S14, it reports scrambled message write-in source to obtain signature report;
S15, hash algorithm corresponding second abstract message unique to signature report output is utilized;
S16, the second abstract message write-in signature report is obtained into anti-tamper report;
S17, monomer storage device (200) designated position is written into anti-tamper report.
10. storing device information eliminates report generation and tamper resistant method according to claim 9, which is characterized in that including Following steps:
S21, anti-tamper report is read in monomer storage device (200) designated position;
S22, anti-tamper report is split as to signature report and the second abstract message;
S23, first time verification is carried out:The unique abstract message and the second abstract message ratio of signature report are calculated using hash algorithm Right, abstract message full text unanimously passes through for verification;
S24, signature report is split as source report and scrambled message;
S25, second of verification is carried out:After unique abstract message of source report being calculated using hash algorithm and being decrypted with scrambled message Abstract message carry out full text verification, full text unanimously for verification passes through;
S26, third time verification is carried out:From source, report parses monomer storage device (200) essential information and currently quilt of record Monomer storage device (200) essential information of audit carries out consistency desired result, and verification carries out in next step after passing through;
S27, parsing source report, obtains correct operating personnel's information, timestamp, UUID.
CN201810134242.8A 2018-02-09 2018-02-09 System and method for generating information elimination report of storage device and preventing tampering Active CN108363929B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810134242.8A CN108363929B (en) 2018-02-09 2018-02-09 System and method for generating information elimination report of storage device and preventing tampering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810134242.8A CN108363929B (en) 2018-02-09 2018-02-09 System and method for generating information elimination report of storage device and preventing tampering

Publications (2)

Publication Number Publication Date
CN108363929A true CN108363929A (en) 2018-08-03
CN108363929B CN108363929B (en) 2022-05-13

Family

ID=63005312

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810134242.8A Active CN108363929B (en) 2018-02-09 2018-02-09 System and method for generating information elimination report of storage device and preventing tampering

Country Status (1)

Country Link
CN (1) CN108363929B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063514A (en) * 2018-06-29 2018-12-21 百度在线网络技术(北京)有限公司 For preventing the method, apparatus, equipment and computer readable storage medium of data tampering
US20210111878A1 (en) * 2019-10-10 2021-04-15 Baidu Usa Llc Method and system for signing output using a kernel
US11436305B2 (en) 2019-10-10 2022-09-06 Baidu Usa Llc Method and system for signing an artificial intelligence watermark using implicit data
US11457002B2 (en) 2019-10-10 2022-09-27 Baidu Usa Llc Method and system for encrypting data using a command
US11537689B2 (en) 2019-10-10 2022-12-27 Baidu Usa Llc Method and system for signing an artificial intelligence watermark using a kernel
US11704390B2 (en) 2019-10-10 2023-07-18 Baidu Usa Llc Method and system for signing an artificial intelligence watermark using a query
US11775692B2 (en) 2019-10-10 2023-10-03 Baidu Usa Llc Method and system for encrypting data using a kernel

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060026423A1 (en) * 2004-07-12 2006-02-02 International Business Machines Corporation Privacy-protecting integrity attestation of a computing platform
CN101458743A (en) * 2007-12-12 2009-06-17 中国长城计算机深圳股份有限公司 Method for protecting computer system
CN101702150A (en) * 2009-12-02 2010-05-05 江西金格网络科技有限责任公司 Method for protecting, verifying and repealing content of PDF document page
CN102622549A (en) * 2012-03-20 2012-08-01 天津书生软件技术有限公司 Electronic seal implementation system and method
CN104462965A (en) * 2014-11-14 2015-03-25 华为技术有限公司 Method for verifying integrity of application program and network device
CN104809490A (en) * 2015-04-27 2015-07-29 华中科技大学 Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
US20160019390A1 (en) * 2012-10-04 2016-01-21 International Business Machines Corporation Data management of potentially malicious content
CN105553651A (en) * 2015-12-03 2016-05-04 小米科技有限责任公司 Method and device for signature of disk mirror image files in Android system, and equipment
CN107194266A (en) * 2017-05-12 2017-09-22 江苏诺安科技有限公司 It is a kind of to verify the method whether papery license is tampered

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060026423A1 (en) * 2004-07-12 2006-02-02 International Business Machines Corporation Privacy-protecting integrity attestation of a computing platform
CN101458743A (en) * 2007-12-12 2009-06-17 中国长城计算机深圳股份有限公司 Method for protecting computer system
CN101702150A (en) * 2009-12-02 2010-05-05 江西金格网络科技有限责任公司 Method for protecting, verifying and repealing content of PDF document page
CN102622549A (en) * 2012-03-20 2012-08-01 天津书生软件技术有限公司 Electronic seal implementation system and method
US20160019390A1 (en) * 2012-10-04 2016-01-21 International Business Machines Corporation Data management of potentially malicious content
CN104462965A (en) * 2014-11-14 2015-03-25 华为技术有限公司 Method for verifying integrity of application program and network device
CN104809490A (en) * 2015-04-27 2015-07-29 华中科技大学 Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
CN105553651A (en) * 2015-12-03 2016-05-04 小米科技有限责任公司 Method and device for signature of disk mirror image files in Android system, and equipment
CN107194266A (en) * 2017-05-12 2017-09-22 江苏诺安科技有限公司 It is a kind of to verify the method whether papery license is tampered

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
P.GARG 等: ""An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function,"", 《2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT)》 *
李锐等: ""存储虚拟化安全防护技术研究"", 《计算机安全》 *
祁峰等: ""固态存储设备和器件的信息消除方法研究"", 《保密科学技术》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063514A (en) * 2018-06-29 2018-12-21 百度在线网络技术(北京)有限公司 For preventing the method, apparatus, equipment and computer readable storage medium of data tampering
CN109063514B (en) * 2018-06-29 2022-01-25 阿波罗智联(北京)科技有限公司 Method, apparatus, device and computer-readable storage medium for preventing data tampering
US20210111878A1 (en) * 2019-10-10 2021-04-15 Baidu Usa Llc Method and system for signing output using a kernel
US11436305B2 (en) 2019-10-10 2022-09-06 Baidu Usa Llc Method and system for signing an artificial intelligence watermark using implicit data
US11457002B2 (en) 2019-10-10 2022-09-27 Baidu Usa Llc Method and system for encrypting data using a command
US11537689B2 (en) 2019-10-10 2022-12-27 Baidu Usa Llc Method and system for signing an artificial intelligence watermark using a kernel
US11637697B2 (en) * 2019-10-10 2023-04-25 Baidu Usa Llc Method and system for signing output using a kernel
US11704390B2 (en) 2019-10-10 2023-07-18 Baidu Usa Llc Method and system for signing an artificial intelligence watermark using a query
US11775692B2 (en) 2019-10-10 2023-10-03 Baidu Usa Llc Method and system for encrypting data using a kernel

Also Published As

Publication number Publication date
CN108363929B (en) 2022-05-13

Similar Documents

Publication Publication Date Title
CN108363929A (en) System and method for generating information elimination report of storage device and preventing tampering
US5619571A (en) Method for securely storing electronic records
US20010034835A1 (en) Applied digital and physical signatures over telecommunications media
CN104463554A (en) Electronic seal achieving method and device
CN101311950A (en) Electronic stamp realization method and device
CN110958319B (en) Method and device for managing infringement and evidence-based block chain
KR100991855B1 (en) System for Issuing and Verifying Electronic Document, Method for Issuing Electronic Document and Method for Verifying Electronic Document
EP1177517A1 (en) Collaborative creation, editing, reviewing, and signing of electronic documents
CN104103029A (en) Anti-counterfeiting method and anti-counterfeiting system for diagnosis certificate
CN116090024B (en) Reliable data storage device, system and method
CN110021291A (en) A kind of call method and device of speech synthesis file
CN117056899A (en) Electronic certificate generation method and device
CN101123502A (en) Measurement authentication method based on digital signature
CN117857151B (en) Tamper-proof method for first-class electronic data of medicine based on sharing
CN114329634A (en) Anti-counterfeiting method for electronic signature document
CN101388076A (en) Method and apparatus for generating two-dimension bar-code
CN101226568A (en) Juggling-proof electric medical record system
CN1321507C (en) Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
CN113297632B (en) System and method for managing traceable and field-verified paper report certificates based on blockchain
CN108376212A (en) Execute code security guard method, device and electronic device
CN113254983B (en) Data processing method and device
WO2023172190A1 (en) Method and apparatus for accessing data in a plurality of machine readable medium
CN115238315A (en) Method for realizing doctor-patient common signature authentication electronic medical record system
CN116137567A (en) Block chain-based school certificate issuing verification method, system and device
CN110555297B (en) Method and system for managing certificates through block chain

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant