CN109104392A - A kind of safe Wallet System of block chain - Google Patents
A kind of safe Wallet System of block chain Download PDFInfo
- Publication number
- CN109104392A CN109104392A CN201710468335.XA CN201710468335A CN109104392A CN 109104392 A CN109104392 A CN 109104392A CN 201710468335 A CN201710468335 A CN 201710468335A CN 109104392 A CN109104392 A CN 109104392A
- Authority
- CN
- China
- Prior art keywords
- module
- wallet
- code key
- security strategy
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The present invention provides a kind of safe Wallet Systems of block chain.It include: code key management, log management, security policy manager, file access control, wallet access control, interface, safety shield, dynamic encryption and decryption.Security strategy sets corresponding security strategy.File access control realization controls the access operation of the code key file object of terminal.Wallet access control realizes the comprehensive protection accessed entirely wallet process, prevents illegal operation.Interface realizes that the API to processing event is encapsulated, and is provided calling for modules and is supported.Safety shield realizes the Backup and Restore function of the security control and code key file that access wallet.Dynamic encryption and decryption is located at the inner nuclear layer of Mobile operating system, is realized according to the security strategy of setting and is handled the encryption and decryption of code key file.System and method of the present invention provide encryption protection, control protection, Backup and Restore code key to the safe wallet of block chain.Protect comprehensive, highly-safe, system resource occupancy, user experience good.
Description
Technical field
The present invention relates to a kind of safe Wallet System of block chain, terminal (PC, APP) block chain wallet is based in use, logical
Cross the dynamic encryption and decryption technology of operating system kernel level, HOOK technology, safety shield control technology realize to block chain wallet password,
Code key file carries out protection backup, to avoid the leakage of block chain key information, causes irremediable loss.
Abbreviation and explanation of nouns:
API: application programming interfaces
PC: computer (personal computer)
APP: application program of mobile phone
HOOK: Hook Technique
Background technique
As block chain technical application is more and more extensive, trade more and more.Block chain code key is without uninscribed, the code key of certification
File loss can not be given for change, code key file is stolen, and password, which is cracked, leads to imponderable loss.Presently, there are various
Wallet System, there are two types of storage modes for code key file: terminal storage, server store two ways.When terminal storage, code key text
Part is easy to be copied, replicate.Key is by risks such as Brute Forces.When server stores, code key is typically all by trade center generation
Reason management, must trade when transaction input trading password every time, the existing code key file of trade center also has trading password, risk system
Number is very big.Once a possibility that trade center such as is attacked, closed at the risks, and wallet is lost is very big.
There is a kind cold wallet processing scheme at present, on the physically-isolated network wallet storage, is needed when transaction every time
Online terminal is used to interact with the multiple signature authentication of cold wallet, such method can solve wallet and be asked by network attack
Topic.But process of exchange is complicated, and not can solve wallet and the risks such as replicate, crack by artificial copy.
Summary of the invention
It is in terminal (PC terminal, APP) in application, logical the present invention provides a kind of safe Wallet System of block chain and method
The dynamic encryption and decryption technology of operating system kernel level is crossed, it can be achieved that a kind of safe wallet application of block chain, solves block chain wallet
Safety issue.
A kind of safe Wallet System of block chain of the present invention ensures wallet safety from three levels.
1. only insertion safety shield just can star wallet program, safety shield carries out authentication secret, certification when accessing wallet
By just can star wallet.
2. a pair code key file encrypts, when legal wallet process access, dynamic encryption and decryption program is decrypted in memory,
Allow to access key information.Refuse the access of other illegal programs, guarantees code key file data safety and access safety.
3. pair encryption a code key file carry out cloud backup, when code key file lose when from cloud platform restore, safety shield lose
When, through safety certification after the safety shield new from new production.
Fig. 1 is a kind of safe Wallet System of block chain of the present invention, including
Web server: code key management module, log management module
Terminal: interface module, security strategy setting module, wallet access control module, code key file access control module, safety
Shield module, logger module, dynamic encryption and decryption module
Web server:
Code key management module: by web interface come Backup and Restore code key file, visit can be passed through with multinode backup code key file
Downloading code key file is checked after asking certification.
Log management module: the log information of wallet operation note is uploaded onto the server by network communication.Web circle
Face shows log recording (information such as show log information, logging time, action type).
Client:
Interface module: api interface is provided for security application.Api interface is called by upper layer application, will be counted by interface module
The security strategy setting module of lower layer is passed to according to, instruction.Interface module can query safe strategy setting module, wallet access control
Molding block, code key file access control module, safety shield module, the state of logger module and dynamic encryption and decryption module and on
Offer application.
Security strategy setting module: the instruction transmitted according to interface module sets security level, sets Encryption Algorithm, if
Determine key, set associated program, sets strategy switch, set policy content.And according to the description of security strategy, accessed to wallet
Control module, code key file access control module, safety shield module, logger module and the transmission of dynamic encryption and decryption module refer to
It enables.And it inquires file access control module, the state of logger module and dynamic encryption and decryption module and reports interface module.
Wallet access control module: the instruction sent by receiving security strategy setting module is realized to access block chain
Operation when wallet is controlled.Operation when realizing to access block chain wallet controls.Wherein control wallet process is
It is no to allow to start, if can to trade.
Code key file access control module: the instruction sent by receiving security strategy setting module is realized secret to wallet
The access operation of key file is controlled.Wherein access operation includes the opening to file object, creation, deletes, renames, is multiple
System, mobile, preservation, attribute setting operation.
Safety shield module: the instruction sent by receiving security strategy setting module is realized to all behaviour of block chain wallet
Carry out certification control, code key encryption storage.
Logger module: all operations of system are recorded.Starting, execution including wallet, access code key file when
Between;Reading and writing, backup of safety shield etc.;Security strategy it is more newly downloaded etc..
Dynamic encryption and decryption module: positioned at cell phone, the inner nuclear layer of PC operating system, mould is set by receiving security strategy
The instruction that block is sent is realized and is handled the encryption and decryption of code key file.When valid application program reads encrypted data, dynamic
Operation is decrypted in encryption/decryption module, and valid application program then can normal use data;When valid application program carries out file
When write operation, dynamic encryption and decryption module carries out cryptographic operation.;When unauthorized applications read encrypted data, dynamic adds
For deciphering module without decryption oprerations, unauthorized applications then can not normal use data;When unauthorized applications to file into
When row write operates, dynamic encryption and decryption module is done nothing.
The present invention provides a kind of safe Wallet System of block chain, it is using block chain safety at the terminal of the present invention
Wallet System, application program can carry out the setting of security strategy, interface mould by api interface provided by calling interface module
Security strategy can be transmitted to security strategy setting module by block;Security strategy setting module is after receiving security strategy, setting peace
Congruent grade sets Encryption Algorithm, sets key, sets associated program, sets strategy switch, sets policy content, and according to peace
The description of full strategy, to wallet access control module, code key file access control module, safety shield module and dynamic encryption and decryption mould
Block sends instruction;Wallet access control module is after the instruction for receiving security strategy setting module, according to the requirement of security strategy,
The operation of all access Wallet Systems in real-time monitoring terminal, and controlled;Code key file access control module is receiving peace
After the instruction of full strategy setting module, according to the requirement of security strategy, all operations to wallet code key file are monitored in real time, and
It is controlled;Safety shield module controls the certification of wallet access safety after the instruction for receiving security strategy setting module in time;Day
Will logging modle, according to the requirement of security strategy, monitors the institute of wallet after the instruction for receiving security strategy setting module in real time
There is operation, and carries out log recording;Dynamic encryption and decryption module is after the instruction for receiving security strategy setting module, according to safe plan
Requirement slightly monitors wallet code key file read-write operations in real time, and carries out encryption and decryption operation.
Specific embodiment:
Server: building HTTP, HTTPS server, connects mysql database.
Client:
Communication layers: it is mainly used for network request, response processing (network data transmission).Communication module belongs to this layer, communicates mould
Block downloads security strategy, upload client-side information, upload file operation log information, code key file backup recovery etc..
Application layer: control strategy is arranged in strategy setting module, controls wallet access control module, file access control mould
Wallet safety is protected in the execution of the modules such as block, safety shield module, dynamic encryption and decryption module in terms of three.
HOOK layers: main capture systems recalls information filters and handles the instruction being arranged in security strategy.
Message reference control module, file access control module and file download monitoring module pass through change operating system work
Make process, realizes access control and log recording to code key file.The system of specific Hook operating system is called: Open,
Read, Write, Delete and Move determine whether file access operation by logic (security policy information) to continue
Or system is blocked to call.
It drives layer: mainly by system drive, dynamic encryption and decryption processing being carried out to code key file.It is notified by strategy setting
Drive layer, read-write operation of the control process to code key file.To prevent operation of the illegal process to code key file.
Moreover, it is achieved that system of the present invention it is important that security strategy setting:
1. security policy specification
Security strategy includes following items content:
1) Encryption Algorithm is set
Different Encryption Algorithm, such as DES, 3DES, AES, RC4 etc. can be set by application program.
2) cipher key setting
Different keys can be set by application program, the key of any length can be set.
3) associated program is set
In order to realize that vertical application is decrypted, to set dedicated reading program, the application program for obtaining authorization can be normal
File is read, driving can be its transparent encryption and decryption, and can only read ciphertext for unauthorized application program, can not normally read
It takes and uses file.
4) strategy switch
Setting whether application strategy, or be whether to allow specific file operation to pass through (PASS) filter layer.
5) policy content is set
Set the detailed content of strategy, such as specific file type (asterisk wildcard * can be used), specific file directory.Strategy
Content can specify any logic sector such as :@: * .*, the exactly All Files under PC storage facilities are all encrypting storings
's.Including following content:
@: -- represent drive.
F:-- log switch setting, setting whether record log.
The file access control attribute of G:-- access authority property control setting policy content defined, comprising:
READONLY、HIDDEN、NODELETE、NOOPEN、NOCOPY…。
Detailed description of the invention
Fig. 1 is a kind of safe wallet module schematic diagram of block chain of the present invention
Fig. 2 is a kind of safe Wallet System schematic diagram of block chain of the present invention.
Claims (10)
1. a kind of safe Wallet System of block chain, it is characterised in that the system includes interface module, security strategy setting module, money
Packet access control module, code key file access control module, safety shield module, code key management module, access log logging modle
With dynamic encryption and decryption module, wherein dynamic encryption and decryption module is located at Mobile operating system inner nuclear layer.
2. a kind of safe Wallet System of block chain as described in claim 1, which is characterized in that interface module can be security application
Program provides api interface, and api interface is called by upper layer application, and data, instruction are passed to the safety of lower layer by interface module
Tactful setting module, interface module can query safe strategy setting module, wallet access control module, code key file access controls
Module, safety shield module, code key management module, the state of access log logging modle and dynamic encryption and decryption module and being reported to are answered
With.
3. such as claim 1 and a kind of safe Wallet System of block chain as claimed in claim 2, which is characterized in that security strategy
The instruction that setting module can be transmitted according to interface module, sets security level, sets Encryption Algorithm, sets key, setting association
Program sets strategy switch, policy content is set, and according to the description of security strategy, to wallet access control module, code key text
Part access control module, safety shield module, code key management module, file access logger module and dynamic encryption and decryption module hair
Instruction is sent, and inquires code key file access control module, the state of file access logger module and dynamic encryption and decryption module
And report interface module.
4. a kind of safe Wallet System of block chain as claimed in claim 3, which is characterized in that wallet access control module passes through
The instruction that security strategy setting module is sent is received, operation when realizing to access block chain wallet controls, wherein controlling
Whether wallet process, which allows, starts, if can trade.
5. a kind of safe Wallet System of block chain as claimed in claim 4, which is characterized in that code key file access control module
The instruction sent by receiving security strategy setting module, realization control the access operation of wallet code key file, wherein
Access operation includes the opening to file object, creation, deletes, renames, replicating, moving, saving, attribute setting operation.
6. a kind of safe Wallet System of block chain as claimed in claim 5, which is characterized in that safety shield module is by receiving peace
The instruction that full strategy setting module is sent is realized and carries out certification control, code key encryption storage to access block chain wallet operation.
7. a kind of safe Wallet System of block chain as claimed in claim 6, which is characterized in that code key management module passes through reception
The instruction that security strategy setting module is sent is realized to the code key file backup encrypted in safety shield to server, when code key text
Part can be restored when losing.
8. a kind of safe Wallet System of block chain as claimed in claim 7, which is characterized in that access log logging modle passes through
The instruction that security strategy setting module is sent is received, realizes operate into log recording, to abnormal operation all to block chain wallet
Behavior is alarmed.
9. a kind of safe Wallet System of block chain as claimed in claim 8, which is characterized in that dynamic encryption and decryption module, which is located at, moves
The inner nuclear layer of dynamic terminal operating system, the instruction sent by receiving security strategy setting module, realization add code key file
Decryption processing, when valid application program reads encrypted data, operation, valid application is decrypted in dynamic encryption and decryption module
Program then can normal use data;When valid application program carries out write operation to file, dynamic encryption and decryption module is encrypted
Operation, the file that valid application program saves are encrypted file;When unauthorized applications read encrypted data, move
For state encryption/decryption module without decryption oprerations, unauthorized applications then can not normal use data;When unauthorized applications are to text
When part carries out write operation, dynamic encryption and decryption module is done nothing.
10. a kind of safe Wallet System of block chain, it is characterised in that use a kind of any safe money of block chain of claim 9
Packet system, application program can carry out the setting of security strategy, interface module by api interface provided by calling interface module
Security strategy can be transmitted to security strategy setting module;Security strategy setting module is after receiving security strategy, setting safety
Grade sets Encryption Algorithm, sets key, sets associated program, sets strategy switch, sets policy content, and according to safety
The description of strategy, to wallet access control module, code key file access control module, safety shield module, code key management module, text
Part access log logging modle and dynamic encryption and decryption module send instruction;Wallet access control module is receiving security strategy setting
After the instruction of module, according to the requirement of security strategy, the operation of all access Wallet Systems on mobile terminal is monitored in real time, is gone forward side by side
Row control;File access control module is after the instruction for receiving security strategy setting module, according to the requirement of security strategy, in real time
It monitors all operations to wallet code key file, and is controlled;Safety shield module is in the finger for receiving security strategy setting module
After order, the certification of wallet access safety is controlled in time;Code key management module executes after the instruction for receiving security strategy setting module
The operation of code key file backup recovery;File access logger module receive security strategy setting module instruction after, according to
The requirement of security strategy, monitors all operations of wallet in real time, and carries out log recording;Dynamic encryption and decryption module is receiving safety
After the instruction of tactful setting module, according to the requirement of security strategy, wallet code key file read-write operations are monitored in real time, and added
Decryption oprerations.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710468335.XA CN109104392A (en) | 2017-06-21 | 2017-06-21 | A kind of safe Wallet System of block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710468335.XA CN109104392A (en) | 2017-06-21 | 2017-06-21 | A kind of safe Wallet System of block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109104392A true CN109104392A (en) | 2018-12-28 |
Family
ID=64795380
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710468335.XA Pending CN109104392A (en) | 2017-06-21 | 2017-06-21 | A kind of safe Wallet System of block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109104392A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107301544A (en) * | 2017-06-26 | 2017-10-27 | 北京泛融科技有限公司 | A kind of safe Wallet System of block chain |
CN117635134A (en) * | 2023-12-07 | 2024-03-01 | 苏州和数智能软件有限公司 | Digital wallet generating and trading system, method and storage medium based on blockchain |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102254124A (en) * | 2011-07-21 | 2011-11-23 | 周亮 | Information security protecting system and method of mobile terminal |
CN103632107A (en) * | 2012-08-23 | 2014-03-12 | 苏州慧盾信息安全科技有限公司 | Mobile terminal information safety protection system and method |
CN103716354A (en) * | 2012-10-09 | 2014-04-09 | 苏州慧盾信息安全科技有限公司 | Security protection system and method for information system |
CN104636675A (en) * | 2013-11-08 | 2015-05-20 | 苏州慧盾信息安全科技有限公司 | System and method for providing safety protection for database |
CN104978543A (en) * | 2015-07-09 | 2015-10-14 | 黄凯锋 | Mobile terminal information safety protection system and method |
CN106537432A (en) * | 2014-07-17 | 2017-03-22 | 卓格莱特有限责任公司 | Method and device for securing access to wallets in which cryptocurrencies are stored |
CN106534092A (en) * | 2016-11-02 | 2017-03-22 | 西安电子科技大学 | Message-based and key-dependent privacy data encryption method |
CN106850200A (en) * | 2017-01-25 | 2017-06-13 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | A kind of method for using the digital cash based on block chain, system and terminal |
-
2017
- 2017-06-21 CN CN201710468335.XA patent/CN109104392A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102254124A (en) * | 2011-07-21 | 2011-11-23 | 周亮 | Information security protecting system and method of mobile terminal |
CN103632107A (en) * | 2012-08-23 | 2014-03-12 | 苏州慧盾信息安全科技有限公司 | Mobile terminal information safety protection system and method |
CN103716354A (en) * | 2012-10-09 | 2014-04-09 | 苏州慧盾信息安全科技有限公司 | Security protection system and method for information system |
CN104636675A (en) * | 2013-11-08 | 2015-05-20 | 苏州慧盾信息安全科技有限公司 | System and method for providing safety protection for database |
CN106537432A (en) * | 2014-07-17 | 2017-03-22 | 卓格莱特有限责任公司 | Method and device for securing access to wallets in which cryptocurrencies are stored |
CN104978543A (en) * | 2015-07-09 | 2015-10-14 | 黄凯锋 | Mobile terminal information safety protection system and method |
CN106534092A (en) * | 2016-11-02 | 2017-03-22 | 西安电子科技大学 | Message-based and key-dependent privacy data encryption method |
CN106850200A (en) * | 2017-01-25 | 2017-06-13 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | A kind of method for using the digital cash based on block chain, system and terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107301544A (en) * | 2017-06-26 | 2017-10-27 | 北京泛融科技有限公司 | A kind of safe Wallet System of block chain |
CN117635134A (en) * | 2023-12-07 | 2024-03-01 | 苏州和数智能软件有限公司 | Digital wallet generating and trading system, method and storage medium based on blockchain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103530570B (en) | A kind of electronic document safety management system and method | |
CN103716354B (en) | Security protection system and method for information system | |
US20190205317A1 (en) | Systems and methods for secure storage and retrieval of data objects | |
CN106330868B (en) | A kind of high speed network encryption storage key management system and method | |
CN107301544A (en) | A kind of safe Wallet System of block chain | |
US9135464B2 (en) | Secure storage system for distributed data | |
CN105426775B (en) | A kind of method and system for protecting smart mobile phone information security | |
CN105378649A (en) | Multiple authority data security and access | |
CN102567688B (en) | File confidentiality keeping system and file confidentiality keeping method on Android operating system | |
KR20080095866A (en) | Computer session management device and system | |
CN101923678A (en) | Data security protection method of enterprise management software | |
CN103686716A (en) | Android access control system for enhancing confidentiality and integrality | |
CN101827101A (en) | Information asset protection method based on credible isolated operating environment | |
CN103390026A (en) | Mobile intelligent terminal security browser and working method thereof | |
CN101072102A (en) | Information leakage preventing technology based on safety desktop for network environment | |
WO2014199197A1 (en) | A method, system and product for securely storing data files at a remote location by splitting and reassembling said files | |
CN104333545A (en) | Method for encrypting cloud storage file data | |
CN103745162A (en) | Secure network file storage system | |
CN104125069A (en) | Secure file catalogue file encryption system towards sharing | |
CN112115199A (en) | Data management system based on block chain technology | |
CN104462998B (en) | Cloud storage encryption system and its implementation based on domestic commercial cipher algorithm | |
CN104580083A (en) | System and method for providing safety protection for financial system | |
CN104636675A (en) | System and method for providing safety protection for database | |
CN102868826A (en) | Terminal and terminal data protection method | |
CN118260264A (en) | User-friendly encrypted storage system and method for distributed file system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181228 |
|
WD01 | Invention patent application deemed withdrawn after publication |