CN109104392A - A kind of safe Wallet System of block chain - Google Patents

A kind of safe Wallet System of block chain Download PDF

Info

Publication number
CN109104392A
CN109104392A CN201710468335.XA CN201710468335A CN109104392A CN 109104392 A CN109104392 A CN 109104392A CN 201710468335 A CN201710468335 A CN 201710468335A CN 109104392 A CN109104392 A CN 109104392A
Authority
CN
China
Prior art keywords
module
wallet
code key
security strategy
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710468335.XA
Other languages
Chinese (zh)
Inventor
杨树桃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710468335.XA priority Critical patent/CN109104392A/en
Publication of CN109104392A publication Critical patent/CN109104392A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention provides a kind of safe Wallet Systems of block chain.It include: code key management, log management, security policy manager, file access control, wallet access control, interface, safety shield, dynamic encryption and decryption.Security strategy sets corresponding security strategy.File access control realization controls the access operation of the code key file object of terminal.Wallet access control realizes the comprehensive protection accessed entirely wallet process, prevents illegal operation.Interface realizes that the API to processing event is encapsulated, and is provided calling for modules and is supported.Safety shield realizes the Backup and Restore function of the security control and code key file that access wallet.Dynamic encryption and decryption is located at the inner nuclear layer of Mobile operating system, is realized according to the security strategy of setting and is handled the encryption and decryption of code key file.System and method of the present invention provide encryption protection, control protection, Backup and Restore code key to the safe wallet of block chain.Protect comprehensive, highly-safe, system resource occupancy, user experience good.

Description

A kind of safe Wallet System of block chain
Technical field
The present invention relates to a kind of safe Wallet System of block chain, terminal (PC, APP) block chain wallet is based in use, logical Cross the dynamic encryption and decryption technology of operating system kernel level, HOOK technology, safety shield control technology realize to block chain wallet password, Code key file carries out protection backup, to avoid the leakage of block chain key information, causes irremediable loss.
Abbreviation and explanation of nouns:
API: application programming interfaces
PC: computer (personal computer)
APP: application program of mobile phone
HOOK: Hook Technique
Background technique
As block chain technical application is more and more extensive, trade more and more.Block chain code key is without uninscribed, the code key of certification File loss can not be given for change, code key file is stolen, and password, which is cracked, leads to imponderable loss.Presently, there are various Wallet System, there are two types of storage modes for code key file: terminal storage, server store two ways.When terminal storage, code key text Part is easy to be copied, replicate.Key is by risks such as Brute Forces.When server stores, code key is typically all by trade center generation Reason management, must trade when transaction input trading password every time, the existing code key file of trade center also has trading password, risk system Number is very big.Once a possibility that trade center such as is attacked, closed at the risks, and wallet is lost is very big.
There is a kind cold wallet processing scheme at present, on the physically-isolated network wallet storage, is needed when transaction every time Online terminal is used to interact with the multiple signature authentication of cold wallet, such method can solve wallet and be asked by network attack Topic.But process of exchange is complicated, and not can solve wallet and the risks such as replicate, crack by artificial copy.
Summary of the invention
It is in terminal (PC terminal, APP) in application, logical the present invention provides a kind of safe Wallet System of block chain and method The dynamic encryption and decryption technology of operating system kernel level is crossed, it can be achieved that a kind of safe wallet application of block chain, solves block chain wallet Safety issue.
A kind of safe Wallet System of block chain of the present invention ensures wallet safety from three levels.
1. only insertion safety shield just can star wallet program, safety shield carries out authentication secret, certification when accessing wallet By just can star wallet.
2. a pair code key file encrypts, when legal wallet process access, dynamic encryption and decryption program is decrypted in memory, Allow to access key information.Refuse the access of other illegal programs, guarantees code key file data safety and access safety.
3. pair encryption a code key file carry out cloud backup, when code key file lose when from cloud platform restore, safety shield lose When, through safety certification after the safety shield new from new production.
Fig. 1 is a kind of safe Wallet System of block chain of the present invention, including
Web server: code key management module, log management module
Terminal: interface module, security strategy setting module, wallet access control module, code key file access control module, safety Shield module, logger module, dynamic encryption and decryption module
Web server:
Code key management module: by web interface come Backup and Restore code key file, visit can be passed through with multinode backup code key file Downloading code key file is checked after asking certification.
Log management module: the log information of wallet operation note is uploaded onto the server by network communication.Web circle Face shows log recording (information such as show log information, logging time, action type).
Client:
Interface module: api interface is provided for security application.Api interface is called by upper layer application, will be counted by interface module The security strategy setting module of lower layer is passed to according to, instruction.Interface module can query safe strategy setting module, wallet access control Molding block, code key file access control module, safety shield module, the state of logger module and dynamic encryption and decryption module and on Offer application.
Security strategy setting module: the instruction transmitted according to interface module sets security level, sets Encryption Algorithm, if Determine key, set associated program, sets strategy switch, set policy content.And according to the description of security strategy, accessed to wallet Control module, code key file access control module, safety shield module, logger module and the transmission of dynamic encryption and decryption module refer to It enables.And it inquires file access control module, the state of logger module and dynamic encryption and decryption module and reports interface module.
Wallet access control module: the instruction sent by receiving security strategy setting module is realized to access block chain Operation when wallet is controlled.Operation when realizing to access block chain wallet controls.Wherein control wallet process is It is no to allow to start, if can to trade.
Code key file access control module: the instruction sent by receiving security strategy setting module is realized secret to wallet The access operation of key file is controlled.Wherein access operation includes the opening to file object, creation, deletes, renames, is multiple System, mobile, preservation, attribute setting operation.
Safety shield module: the instruction sent by receiving security strategy setting module is realized to all behaviour of block chain wallet Carry out certification control, code key encryption storage.
Logger module: all operations of system are recorded.Starting, execution including wallet, access code key file when Between;Reading and writing, backup of safety shield etc.;Security strategy it is more newly downloaded etc..
Dynamic encryption and decryption module: positioned at cell phone, the inner nuclear layer of PC operating system, mould is set by receiving security strategy The instruction that block is sent is realized and is handled the encryption and decryption of code key file.When valid application program reads encrypted data, dynamic Operation is decrypted in encryption/decryption module, and valid application program then can normal use data;When valid application program carries out file When write operation, dynamic encryption and decryption module carries out cryptographic operation.;When unauthorized applications read encrypted data, dynamic adds For deciphering module without decryption oprerations, unauthorized applications then can not normal use data;When unauthorized applications to file into When row write operates, dynamic encryption and decryption module is done nothing.
The present invention provides a kind of safe Wallet System of block chain, it is using block chain safety at the terminal of the present invention Wallet System, application program can carry out the setting of security strategy, interface mould by api interface provided by calling interface module Security strategy can be transmitted to security strategy setting module by block;Security strategy setting module is after receiving security strategy, setting peace Congruent grade sets Encryption Algorithm, sets key, sets associated program, sets strategy switch, sets policy content, and according to peace The description of full strategy, to wallet access control module, code key file access control module, safety shield module and dynamic encryption and decryption mould Block sends instruction;Wallet access control module is after the instruction for receiving security strategy setting module, according to the requirement of security strategy, The operation of all access Wallet Systems in real-time monitoring terminal, and controlled;Code key file access control module is receiving peace After the instruction of full strategy setting module, according to the requirement of security strategy, all operations to wallet code key file are monitored in real time, and It is controlled;Safety shield module controls the certification of wallet access safety after the instruction for receiving security strategy setting module in time;Day Will logging modle, according to the requirement of security strategy, monitors the institute of wallet after the instruction for receiving security strategy setting module in real time There is operation, and carries out log recording;Dynamic encryption and decryption module is after the instruction for receiving security strategy setting module, according to safe plan Requirement slightly monitors wallet code key file read-write operations in real time, and carries out encryption and decryption operation.
Specific embodiment:
Server: building HTTP, HTTPS server, connects mysql database.
Client:
Communication layers: it is mainly used for network request, response processing (network data transmission).Communication module belongs to this layer, communicates mould Block downloads security strategy, upload client-side information, upload file operation log information, code key file backup recovery etc..
Application layer: control strategy is arranged in strategy setting module, controls wallet access control module, file access control mould Wallet safety is protected in the execution of the modules such as block, safety shield module, dynamic encryption and decryption module in terms of three.
HOOK layers: main capture systems recalls information filters and handles the instruction being arranged in security strategy.
Message reference control module, file access control module and file download monitoring module pass through change operating system work Make process, realizes access control and log recording to code key file.The system of specific Hook operating system is called: Open, Read, Write, Delete and Move determine whether file access operation by logic (security policy information) to continue Or system is blocked to call.
It drives layer: mainly by system drive, dynamic encryption and decryption processing being carried out to code key file.It is notified by strategy setting Drive layer, read-write operation of the control process to code key file.To prevent operation of the illegal process to code key file.
Moreover, it is achieved that system of the present invention it is important that security strategy setting:
1. security policy specification
Security strategy includes following items content:
1) Encryption Algorithm is set
Different Encryption Algorithm, such as DES, 3DES, AES, RC4 etc. can be set by application program.
2) cipher key setting
Different keys can be set by application program, the key of any length can be set.
3) associated program is set
In order to realize that vertical application is decrypted, to set dedicated reading program, the application program for obtaining authorization can be normal File is read, driving can be its transparent encryption and decryption, and can only read ciphertext for unauthorized application program, can not normally read It takes and uses file.
4) strategy switch
Setting whether application strategy, or be whether to allow specific file operation to pass through (PASS) filter layer.
5) policy content is set
Set the detailed content of strategy, such as specific file type (asterisk wildcard * can be used), specific file directory.Strategy Content can specify any logic sector such as :@: * .*, the exactly All Files under PC storage facilities are all encrypting storings 's.Including following content:
@: -- represent drive.
F:-- log switch setting, setting whether record log.
The file access control attribute of G:-- access authority property control setting policy content defined, comprising: READONLY、HIDDEN、NODELETE、NOOPEN、NOCOPY…。
Detailed description of the invention
Fig. 1 is a kind of safe wallet module schematic diagram of block chain of the present invention
Fig. 2 is a kind of safe Wallet System schematic diagram of block chain of the present invention.

Claims (10)

1. a kind of safe Wallet System of block chain, it is characterised in that the system includes interface module, security strategy setting module, money Packet access control module, code key file access control module, safety shield module, code key management module, access log logging modle With dynamic encryption and decryption module, wherein dynamic encryption and decryption module is located at Mobile operating system inner nuclear layer.
2. a kind of safe Wallet System of block chain as described in claim 1, which is characterized in that interface module can be security application Program provides api interface, and api interface is called by upper layer application, and data, instruction are passed to the safety of lower layer by interface module Tactful setting module, interface module can query safe strategy setting module, wallet access control module, code key file access controls Module, safety shield module, code key management module, the state of access log logging modle and dynamic encryption and decryption module and being reported to are answered With.
3. such as claim 1 and a kind of safe Wallet System of block chain as claimed in claim 2, which is characterized in that security strategy The instruction that setting module can be transmitted according to interface module, sets security level, sets Encryption Algorithm, sets key, setting association Program sets strategy switch, policy content is set, and according to the description of security strategy, to wallet access control module, code key text Part access control module, safety shield module, code key management module, file access logger module and dynamic encryption and decryption module hair Instruction is sent, and inquires code key file access control module, the state of file access logger module and dynamic encryption and decryption module And report interface module.
4. a kind of safe Wallet System of block chain as claimed in claim 3, which is characterized in that wallet access control module passes through The instruction that security strategy setting module is sent is received, operation when realizing to access block chain wallet controls, wherein controlling Whether wallet process, which allows, starts, if can trade.
5. a kind of safe Wallet System of block chain as claimed in claim 4, which is characterized in that code key file access control module The instruction sent by receiving security strategy setting module, realization control the access operation of wallet code key file, wherein Access operation includes the opening to file object, creation, deletes, renames, replicating, moving, saving, attribute setting operation.
6. a kind of safe Wallet System of block chain as claimed in claim 5, which is characterized in that safety shield module is by receiving peace The instruction that full strategy setting module is sent is realized and carries out certification control, code key encryption storage to access block chain wallet operation.
7. a kind of safe Wallet System of block chain as claimed in claim 6, which is characterized in that code key management module passes through reception The instruction that security strategy setting module is sent is realized to the code key file backup encrypted in safety shield to server, when code key text Part can be restored when losing.
8. a kind of safe Wallet System of block chain as claimed in claim 7, which is characterized in that access log logging modle passes through The instruction that security strategy setting module is sent is received, realizes operate into log recording, to abnormal operation all to block chain wallet Behavior is alarmed.
9. a kind of safe Wallet System of block chain as claimed in claim 8, which is characterized in that dynamic encryption and decryption module, which is located at, moves The inner nuclear layer of dynamic terminal operating system, the instruction sent by receiving security strategy setting module, realization add code key file Decryption processing, when valid application program reads encrypted data, operation, valid application is decrypted in dynamic encryption and decryption module Program then can normal use data;When valid application program carries out write operation to file, dynamic encryption and decryption module is encrypted Operation, the file that valid application program saves are encrypted file;When unauthorized applications read encrypted data, move For state encryption/decryption module without decryption oprerations, unauthorized applications then can not normal use data;When unauthorized applications are to text When part carries out write operation, dynamic encryption and decryption module is done nothing.
10. a kind of safe Wallet System of block chain, it is characterised in that use a kind of any safe money of block chain of claim 9 Packet system, application program can carry out the setting of security strategy, interface module by api interface provided by calling interface module Security strategy can be transmitted to security strategy setting module;Security strategy setting module is after receiving security strategy, setting safety Grade sets Encryption Algorithm, sets key, sets associated program, sets strategy switch, sets policy content, and according to safety The description of strategy, to wallet access control module, code key file access control module, safety shield module, code key management module, text Part access log logging modle and dynamic encryption and decryption module send instruction;Wallet access control module is receiving security strategy setting After the instruction of module, according to the requirement of security strategy, the operation of all access Wallet Systems on mobile terminal is monitored in real time, is gone forward side by side Row control;File access control module is after the instruction for receiving security strategy setting module, according to the requirement of security strategy, in real time It monitors all operations to wallet code key file, and is controlled;Safety shield module is in the finger for receiving security strategy setting module After order, the certification of wallet access safety is controlled in time;Code key management module executes after the instruction for receiving security strategy setting module The operation of code key file backup recovery;File access logger module receive security strategy setting module instruction after, according to The requirement of security strategy, monitors all operations of wallet in real time, and carries out log recording;Dynamic encryption and decryption module is receiving safety After the instruction of tactful setting module, according to the requirement of security strategy, wallet code key file read-write operations are monitored in real time, and added Decryption oprerations.
CN201710468335.XA 2017-06-21 2017-06-21 A kind of safe Wallet System of block chain Pending CN109104392A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710468335.XA CN109104392A (en) 2017-06-21 2017-06-21 A kind of safe Wallet System of block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710468335.XA CN109104392A (en) 2017-06-21 2017-06-21 A kind of safe Wallet System of block chain

Publications (1)

Publication Number Publication Date
CN109104392A true CN109104392A (en) 2018-12-28

Family

ID=64795380

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710468335.XA Pending CN109104392A (en) 2017-06-21 2017-06-21 A kind of safe Wallet System of block chain

Country Status (1)

Country Link
CN (1) CN109104392A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107301544A (en) * 2017-06-26 2017-10-27 北京泛融科技有限公司 A kind of safe Wallet System of block chain

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254124A (en) * 2011-07-21 2011-11-23 周亮 Information security protecting system and method of mobile terminal
CN103632107A (en) * 2012-08-23 2014-03-12 苏州慧盾信息安全科技有限公司 Mobile terminal information safety protection system and method
CN103716354A (en) * 2012-10-09 2014-04-09 苏州慧盾信息安全科技有限公司 Security protection system and method for information system
CN104636675A (en) * 2013-11-08 2015-05-20 苏州慧盾信息安全科技有限公司 System and method for providing safety protection for database
CN104978543A (en) * 2015-07-09 2015-10-14 黄凯锋 Mobile terminal information safety protection system and method
CN106537432A (en) * 2014-07-17 2017-03-22 卓格莱特有限责任公司 Method and device for securing access to wallets in which cryptocurrencies are stored
CN106534092A (en) * 2016-11-02 2017-03-22 西安电子科技大学 Message-based and key-dependent privacy data encryption method
CN106850200A (en) * 2017-01-25 2017-06-13 中钞信用卡产业发展有限公司北京智能卡技术研究院 A kind of method for using the digital cash based on block chain, system and terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254124A (en) * 2011-07-21 2011-11-23 周亮 Information security protecting system and method of mobile terminal
CN103632107A (en) * 2012-08-23 2014-03-12 苏州慧盾信息安全科技有限公司 Mobile terminal information safety protection system and method
CN103716354A (en) * 2012-10-09 2014-04-09 苏州慧盾信息安全科技有限公司 Security protection system and method for information system
CN104636675A (en) * 2013-11-08 2015-05-20 苏州慧盾信息安全科技有限公司 System and method for providing safety protection for database
CN106537432A (en) * 2014-07-17 2017-03-22 卓格莱特有限责任公司 Method and device for securing access to wallets in which cryptocurrencies are stored
CN104978543A (en) * 2015-07-09 2015-10-14 黄凯锋 Mobile terminal information safety protection system and method
CN106534092A (en) * 2016-11-02 2017-03-22 西安电子科技大学 Message-based and key-dependent privacy data encryption method
CN106850200A (en) * 2017-01-25 2017-06-13 中钞信用卡产业发展有限公司北京智能卡技术研究院 A kind of method for using the digital cash based on block chain, system and terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107301544A (en) * 2017-06-26 2017-10-27 北京泛融科技有限公司 A kind of safe Wallet System of block chain

Similar Documents

Publication Publication Date Title
CN103530570B (en) A kind of electronic document safety management system and method
CN103716354B (en) Security protection system and method for information system
CN110535833B (en) Data sharing control method based on block chain
CN106330868B (en) A kind of high speed network encryption storage key management system and method
US20190205317A1 (en) Systems and methods for secure storage and retrieval of data objects
CN107301544A (en) A kind of safe Wallet System of block chain
CN105426775B (en) A kind of method and system for protecting smart mobile phone information security
CN105378649A (en) Multiple authority data security and access
US20130173916A1 (en) Secure storage system for distributed data
CN102567688B (en) File confidentiality keeping system and file confidentiality keeping method on Android operating system
KR20080095866A (en) Computer session management device and system
CN101923678A (en) Data security protection method of enterprise management software
CN103686716A (en) Android access control system for enhancing confidentiality and integrality
CN101827101A (en) Information asset protection method based on credible isolated operating environment
CN103390026A (en) Mobile intelligent terminal security browser and working method thereof
CN101072102A (en) Information leakage preventing technology based on safety desktop for network environment
WO2014199197A1 (en) A method, system and product for securely storing data files at a remote location by splitting and reassembling said files
CN201682524U (en) Document transfer authority control system based on document filtering driver
CN103745162A (en) Secure network file storage system
CN104333545A (en) Method for encrypting cloud storage file data
CN104125069A (en) Secure file catalogue file encryption system towards sharing
CN112115199A (en) Data management system based on block chain technology
CN104462998B (en) Cloud storage encryption system and its implementation based on domestic commercial cipher algorithm
CN104580083A (en) System and method for providing safety protection for financial system
CN104636675A (en) System and method for providing safety protection for database

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181228

WD01 Invention patent application deemed withdrawn after publication