CN110324150A - Date storage method, device, computer readable storage medium and electronic equipment - Google Patents

Date storage method, device, computer readable storage medium and electronic equipment Download PDF

Info

Publication number
CN110324150A
CN110324150A CN201910507170.1A CN201910507170A CN110324150A CN 110324150 A CN110324150 A CN 110324150A CN 201910507170 A CN201910507170 A CN 201910507170A CN 110324150 A CN110324150 A CN 110324150A
Authority
CN
China
Prior art keywords
data
data sectional
sectional
digital signature
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910507170.1A
Other languages
Chinese (zh)
Other versions
CN110324150B (en
Inventor
赵振国
丁雪艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neusoft Corp
Original Assignee
Neusoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neusoft Corp filed Critical Neusoft Corp
Priority to CN201910507170.1A priority Critical patent/CN110324150B/en
Publication of CN110324150A publication Critical patent/CN110324150A/en
Application granted granted Critical
Publication of CN110324150B publication Critical patent/CN110324150B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

This disclosure relates to a kind of date storage method, device, computer readable storage medium and electronic equipment, the described method includes: when the storage state in the data area of the first data sectional meets preset condition, first digital signature of data content and the second data sectional in the data area of first data sectional is encrypted, the first digital signature of first data sectional is obtained;First digital signature of first data sectional is stored into the signature region of first data sectional;It is completed if the data area of first data sectional stores, and a data sectional in the presence of the first data sectional described in the data sectional set, then the first digital signature of first data sectional is stored into the signature region of next data sectional.Through the above technical solutions, can guarantee the safety and integrality of data storage, user can be directly viewable, and reduce the complexity of user's operation, promote user experience.

Description

Date storage method, device, computer readable storage medium and electronic equipment
Technical field
This disclosure relates to field of data storage, and in particular, to a kind of date storage method, computer-readable is deposited device Storage media and electronic equipment.
Background technique
With the fast development of computer internet technology, generated in the business and business procession on internet Data also welcome fulminant growth.Wherein, partial data during service operation is usually not revisable.For this Class data, the prior art, so as to prevent the data to be not modified, guarantee that its is complete generally by encrypting to such data Whole property.Although data can be carried out with secure storage through the above way, the data after storage are encryption datas, and user needs The data can just be checked by being decrypted, and aforesaid way is not easy to user and checks.
Summary of the invention
Purpose of this disclosure is to provide a kind of data storage sides that can be guaranteed data security, completely and convenient for user check Method, device, computer readable storage medium and electronic equipment.
To achieve the goals above, according to the disclosure in a first aspect, provide a kind of date storage method, the method packet It includes:
When storage state in the data area of the first data sectional meets preset condition, by first data sectional First digital signature of data content and the second data sectional in the data area is encrypted, and first data are obtained First digital signature of segmentation, wherein first data sectional and second data sectional belong to same data sectional collection It closes, second data sectional is a upper data sectional for first data sectional, each in the data sectional set Data sectional includes signature region and data region, and described the is stored in the signature region of first data sectional First digital signature of two data sectionals;
By the first digital signature storage of first data sectional to the signature region of first data sectional In;
It is completed if the data area of first data sectional stores, and first described in the data sectional set A data sectional in the presence of data sectional, then by the first digital signature storage of first data sectional to next data In the signature region of segmentation.
Optionally, it using next data sectional as the first new data sectional, returns described in the first data sectional The storage state of data area when meeting preset condition, will be in the data in the data area of first data sectional Hold and the first digital signature of the second data sectional is encrypted, obtains the step of the first digital signature of first data sectional Suddenly.
Optionally, the preset condition includes that the data area storage of first data sectional is completed;The method is also Include:
Instruction is sealed up for safekeeping for the data sectional set in response to receiving, by the first number of first data sectional Word signature storage is into the signature region of first data sectional in the data sectional set.
Optionally, the preset condition include first data sectional data area in store a new data note Record;
The method also includes:
By the first digital signature storage of first data sectional to first data in the data sectional set In the signature region of segmentation.
Optionally, institute of the first digital signature storage by first data sectional to first data sectional It states in signature region, comprising:
If the number label of not stored first data sectional before in the signature region of first data sectional Name, then by first digital signature storage of first data sectional to the signature region of first data sectional In;
If being stored with the number label of first data sectional before in the signature region of first data sectional Name then signs first number that the digital signature of the first data sectional stored before replaces with first data sectional Name.
Optionally, the method also includes:
It stores by first digital signature of first data sectional to first in the data sectional set After in the signature region of a data sectional, if receiving new data record to be stored, according to described first The identification information of data sectional, determines first data sectional, and by the data record storage to be stored to this first In the data area of data sectional.
Optionally, the method also includes:
In response to receiving checking command, in the data area for the data sectional to be verified that the checking command is indicated A upper data for data sectional to be verified stored in the signature region of data content and the data sectional to be verified, described point First digital signature of section is encrypted, and the second digital signature of the data sectional to be verified is obtained;
If the first number label of the data sectional to be verified stored in the signature region of the data sectional to be verified Name is different with the second digital signature of the data sectional to be verified, determines that the data content of the data sectional to be verified is usurped Change;
If the first digital signature of the data sectional to be verified of the signature region storage of the data sectional to be verified Data sectional to be verified described in the data sectional set identical and described with the second digital signature of the data sectional to be verified In the presence of a data sectional, then under the second digital signature and the data sectional to be verified of the data sectional to be verified In the case that first digital signature of the data sectional to be verified stored in one data sectional is different, determine described to be verified The data content of data sectional is tampered.
Optionally, each data sectional in the data sectional set also includes redundancy backup region;
The method also includes:
After by data record storage to the data area of first data sectional, the data record is divided Piece, to obtain multiple sub-pieces of the data record;
According to other data sectionals in the data sectional set in addition to first data sectional, the number is determined According to the hashed value of each sub-piece of record;
According to the hashed value, each sub-piece is respectively stored into data corresponding with the hashed value of the sub-piece In the redundancy backup region of segmentation, wherein the sub-piece is for restoring the data record.
According to the second aspect of the disclosure, a kind of data storage device is provided, described device includes:
First signature blocks will when meeting preset condition for the storage state in the data area of the first data sectional First digital signature of data content and the second data sectional in the data area of first data sectional is added It is close, obtain the first digital signature of first data sectional, wherein first data sectional and second data sectional Belong to same data sectional set, second data sectional is a upper data sectional for first data sectional, the number It include signature region and data region, the signature of first data sectional according to each data sectional in segmentation set The first digital signature of second data sectional is stored in region;
First memory module, for dividing the first digital signature storage of first data sectional to first data In the signature region of section;
Second memory module is completed if the data area for first data sectional stores, and the data A data sectional in the presence of first data sectional described in segmentation set, then by the first digital signature of first data sectional It stores in the signature region of next data sectional.
Optionally, described device further include: the first determining module, for using next data sectional as new first Data sectional, and when triggering storage state of first signature blocks in the data area of the first data sectional and meeting preset condition, First digital signature of data content and the second data sectional in the data area of first data sectional is carried out Encryption obtains the first digital signature of first data sectional.
Optionally, the preset condition includes that the data area storage of first data sectional is completed;Described device is also Include:
Third memory module, for being directed to the data sectional set in response to receiving and sealing instruction up for safekeeping, by described the First digital signature of one data sectional is stored to the signature area of first data sectional in the data sectional set In domain.
Optionally, the preset condition include first data sectional data area in store a new data note Record;
Described device further include:
4th memory module, for storing the first digital signature of first data sectional to the data sectional collection In the signature region of first data sectional in conjunction.
Optionally, first memory module includes:
First sub-module stored, for before in the signature region of first data sectional not stored described In the case where the digital signature of one data sectional, by first digital signature of first data sectional storage to described the In the signature region of one data sectional;
Second sub-module stored, for being stored with described before in the signature region of first data sectional In the case where the digital signature of one data sectional, the digital signature of the first data sectional stored before is replaced with described first First digital signature of data sectional.
Optionally, described device further include:
Second determining module, for storing by first digital signature of first data sectional to the data After in the signature region of first data sectional in segmentation set, if receiving new data record to be stored, Then according to the identification information of first data sectional, first data sectional is determined, and by the data to be stored Record storage is into the data area of first data sectional.
Optionally, described device further include:
Second signature blocks, the data to be verified in response to receiving checking command, the checking command to be indicated Number to be verified stored in the signature region of data content and the data sectional to be verified in the data area of segmentation, described It is encrypted according to the first digital signature of a upper data sectional for segmentation, obtains the second number label of the data sectional to be verified Name;
Third determining module, the data to be verified for being stored in the signature region of the data sectional to be verified In the case that first digital signature of segmentation is different with the second digital signature of the data sectional to be verified, determine described to school The data content for testing data sectional is tampered;
4th determining module, if the data to be verified point of the signature region storage for the data sectional to be verified First digital signature of section is identical with the second digital signature of the data sectional to be verified and the data sectional set in institute State a data sectional in the presence of data sectional to be verified, then the second digital signature of the data sectional to be verified and it is described to Verify the different situation of the first digital signature of the data sectional to be verified stored in next data sectional of data sectional Under, determine that the data content of the data sectional to be verified is tampered.
Optionally, each data sectional in the data sectional set also includes redundancy backup region;
Described device further include:
Fragment module, for by data record storage to behind the data area of first data sectional, to the number Fragment is carried out according to record, to obtain multiple sub-pieces of the data record;
5th determining module, for according to other numbers in the data sectional set in addition to first data sectional According to segmentation, the hashed value of each sub-piece of the data record is determined;
5th memory module, for according to the hashed value, each sub-piece to be respectively stored into and the sub-piece The corresponding data sectional of hashed value the redundancy backup region in, wherein the sub-piece is for restoring data note Record.
According to the third aspect of the disclosure, a kind of computer readable storage medium is provided, computer program is stored thereon with, The program realizes the step of above-mentioned first aspect any the method when being executed by processor.
According to the fourth aspect of the disclosure, a kind of electronic equipment is provided, comprising:
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, with any side of above-mentioned first aspect The step of method.
In the above-mentioned technical solutions, the digital signature of a upper data sectional is stored in current data segmentation, and is based on working as The digital signature of the data content of preceding data sectional and a upper data sectional generates the digital signature of current data segmentation, thus shape At a kind of concatenated Linked Storage Structure.It, will be to data if there is bad attack based on the data storage method that the disclosure provides When being distorted, needs the content being segmented to current data and its content of follow-up data segmentation to modify, increase data and usurp Change required complexity, guarantees the secure storage of data.Also, when data content is modified, corresponding digital signature must It can so change, pass through above-mentioned Linked Storage Structure and digital signature, it is also ensured that find in time when data are tampered Probability, be further ensured that data storage safety and integrality.In addition, in the disclosure, data content can be deposited directly Storage does not need to carry out encryption storage, so that user can be directly viewable, reduces the complexity of user's operation in data area Degree promotes user experience.
Other feature and advantage of the disclosure will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is and to constitute part of specification for providing further understanding of the disclosure, with following tool Body embodiment is used to explain the disclosure together, but does not constitute the limitation to the disclosure.In the accompanying drawings:
Fig. 1 is the flow chart of the date storage method provided according to an embodiment of the present disclosure;
Fig. 2 is the schematic diagram of the data sectional provided according to an embodiment of the present disclosure;
Fig. 3 is the schematic diagram of the data sectional set provided according to an embodiment of the present disclosure;
Fig. 4 is the schematic diagram of the data sectional set provided according to the another embodiment of the disclosure;
Fig. 5 is the schematic diagram of the data sectional provided according to the another embodiment of the disclosure;
Fig. 6 is the block diagram of the data storage device provided according to an embodiment of the present disclosure;
Fig. 7 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment;
Fig. 8 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
Specific embodiment
It is described in detail below in conjunction with specific embodiment of the attached drawing to the disclosure.It should be understood that this place is retouched The specific embodiment stated is only used for describing and explaining the disclosure, is not limited to the disclosure.
As described in the background art, a large amount of data can be generated in the business on internet and business procession.This Some data are revisable in a little data, such as the relevant data of user information, such as user password, logging device, part number According to being not revisable, such as daily record data, need to guarantee its integrality and readability.The disclosure is exactly directed to and this kind of can not repair The scheme that the data changed propose, is described in detail by taking daily record data as an example below.
Shown in Fig. 1, for the flow chart of the date storage method provided according to an embodiment of the present disclosure.Such as Fig. 1 institute Show, which comprises
In S11, when the storage state in the data area of the first data sectional meets preset condition, by the first data point First digital signature of data content and the second data sectional in the data area of section is encrypted, and the first data sectional is obtained The first digital signature, wherein first data sectional and second data sectional belong to same data sectional set, institute State the upper data sectional that the second data sectional is first data sectional, each data point in the data sectional set Duan Jun includes signature region and data region, is stored with second data in the signature region of first data sectional First digital signature of segmentation.
Illustratively, as shown in Fig. 2, being the schematic diagram of data sectional, wherein region A is the signature region of data sectional, area Domain B is the data area of data sectional.It is stored with the first digital signature of a upper data sectional in signature region, in data area It is stored with the data content of current data segmentation, it can be directly by first number of the data content and a upper data sectional for storage Word signature is encrypted, and the first digital signature of current data segmentation is obtained.Wherein, the above process can be using in the prior art Digital signature encryption mode, key can by user setting, can also by the way of default setting, the disclosure to this without limit It is fixed.
Optionally, a data sectional set corresponds to a type of data storage file.Illustratively, it is with daily record data Example, a data sectional set correspond to a kind of storage file of auditing flow daily record data, as an example, audit stream of asking for leave Journey journal file corresponding data segmentation set 1, reimbursement auditing flow journal file corresponding data segmentation set 2.Therefore, in business In treatment process, the storage location for the journal file that it is generated can be determined, convenient for data according to the corresponding process of the business It searches and checks.
In S12, the first digital signature of the first data sectional is stored into the signature region of the first data sectional.
Illustratively, as shown in Fig. 2, can store the current data sectional in the signature region of current data segmentation First digital signature of the first digital signature and a data sectional on this;In data area, it can store and the data sectional is written Data, e.g., journal file etc..
In S13, completed if the data area of the first data sectional stores, and the first data sectional in data sectional set In the presence of a data sectional, then by the first digital signature of the first data sectional storage to the signature region of next data sectional In.
Wherein it is possible to the memory size of the corresponding storage region of each data sectional is preset, and illustratively, each data Segmentation can correspond to the memory space of 20M.Further, sign in data sectional region and data region point also can be set Not corresponding memory space.As an example, default threshold can be less than in the residual storage capacity of the data area of the data sectional When value, determine that the data storage areas storage of data sectional is completed.Wherein, the preset threshold can according to actual use scene into Row setting, the disclosure is to this without limiting.
In the above-mentioned technical solutions, the digital signature of a upper data sectional is stored in current data segmentation, and is based on working as The digital signature of the data content of preceding data sectional and a upper data sectional generates the digital signature of current data segmentation, thus shape At a kind of concatenated Linked Storage Structure.It, will be to data if there is bad attack based on the data storage method that the disclosure provides When being distorted, it is necessary to which the content of content and its follow-up data segmentation to current data segmentation is modified, and is greatly increased Add the complexity of data tampering, to guarantee the secure storage of data.Also, when data content is modified, corresponding number Word signature will necessarily change, and pass through above-mentioned Linked Storage Structure and digital signature, it is also ensured that when data are tampered The probability found in time is further ensured that the safety and integrality of data storage.In addition, in the disclosure, data content can It to be stored directly in data area, does not need to carry out encryption storage, so that user can be directly viewable, reduces user's operation Complexity, promoted user experience.
Optionally, if the first data sectional is first data sectional in the data sectional set, in the first data It, can be directly by the number in the data area of the first data sectional when the storage state of the data area of segmentation meets preset condition It is encrypted according to content, obtains the first data signature of first data sectional, and first number is arrived into data signature storage According in the signature region of segmentation.It is completed if the data area of the first data sectional stores, by the first number of first data sectional Word signature is stored in the signature region of next data sectional of first data sectional.
Through the above technical solutions, can be deposited to the data content of first data sectional in data sectional set Storage, and its safety and accuracy are guaranteed by way of digital signature.
Optionally, the method also includes: using next data sectional as the first new data sectional, described in return It, will be in the data area of the first data sectional when storage state in the data area of the first data sectional meets preset condition First digital signature of data content and the second data sectional is encrypted, and the first digital signature of the first data sectional is obtained Step 11.
Illustratively, as shown in figure 3, being the schematic diagram of a data sectional set.As shown in figure 3, D1, D2, D3, D4 distinguish table Show that a data sectional, D1 are first data sectional in data sectional set, D2 is next data sectional of D1, and D3 is D2's Next data sectional, D4 are next data sectional of D3.In the examples described above, the digital signature of D1 is by the data to D1 Hold what encryption obtained, and after the completion of the data area of D1 stores, by the digital signature storage of acquisition to the signature region of D2 In.
Later, D2 (that is, first data sectional) can according to its storage D1 digital signature and D2 data content into Row encryption, it is hereby achieved that the digital signature of D2, meanwhile, after the completion of the data area of D2 stores, then the number of D2 is signed Name storage is into the signature region of D3.At this point, D3 can be used as the first new data sectional, above-mentioned steps are repeated, thus Form data store organisation shown in Fig. 3.Through the above technical solutions, can guarantee each data sectional in data sectional set Between relevance, further increase the complexity of data modification, with guarantee data storage safety.
Optionally, in one embodiment, the preset condition includes that the data area of first data sectional has stored At;The method also includes:
Instruction is sealed up for safekeeping for data sectional set in response to receiving, and the first digital signature of the first data sectional is deposited In the signature region for storing up first data sectional in data sectional set.
For the partial data generated in business procedure, if business changes, the data generated before general no longer make With, need to seal these data up for safekeeping at this time, in order to later to business carry out check or version recall.In the embodiment In, when needing to seal data up for safekeeping, instruction is sealed up for safekeeping for data sectional set in response to receiving, by the first data point First digital signature of section (at this point, the last one data sectional in data sectional set) is stored into data sectional set In the signature region of first data sectional.Wherein, this is sealed instruction up for safekeeping and can be triggered by user, is also possible to default triggering, such as Automatic trigger when business processing flow changes.Illustratively, as shown in figure 4, the first data sectional is D4, in response to receiving It seals instruction up for safekeeping, the digital signature of D4 is stored into the signature region of D1.
In the above-mentioned technical solutions, when the data area of the first data sectional stores completion, first data point are calculated First digital signature of section can reduce the calculation amount of digital signature, guarantee data storage efficiency.Also, it is carried out to data When sealing up for safekeeping, by storing the first digital signature of the first data sectional to first data sectional in data sectional set It signs in region, the incidence relation of closed loop can be formed between each data sectional in the data sectional set, so that Bad attack can not determine first data sectional in data sectional set in altered data content, and then can not continuously usurp Change data, is further ensured that the safety and integrality of data.
In another embodiment, optionally, the preset condition include the first data sectional data area in store One new data record;
The method also includes:
By the label of the first digital signature storage of the first data sectional to first data sectional in data sectional set In name region.
In this embodiment, a new data record is stored in the data area of the first data sectional, can all be incited somebody to action Data content (that is, data content comprising the new data record) and the second data in the data area of first data sectional First digital signature of segmentation is encrypted, and the first digital signature of the first data sectional is obtained.
Also, in order to further ensure the safety of data storage, in this embodiment, the first data sectional is being obtained After first digital signature, which is stored in the signature region of first data sectional of data sectional set In.That is, in this embodiment, after storing a new data record, then by current data sectional (that is, the first number According to segmentation) the first digital signature store into the signature region of first data sectional in data sectional set so that should The incidence relation of closed loop is formed between each data sectional of data sectional set.
Therefore, through the above technical solutions, in the first data sectional storage once new data record obtain this first Newest first digital signature of data sectional, and first digital signature is stored to first number in data sectional set According in the signature region of segmentation, so that being between each data sectional in data sectional set when being stored without data The incidence relation of closed loop, to effectively data be avoided to be tampered.
Optionally, the method also includes:
It stores by the first digital signature of the first data sectional to first data sectional in data sectional set After in the signature region, if receiving new data record to be stored, according to the mark of first data sectional Know information, determine first data sectional, and the data record storage to be stored is arrived to the institute of first data sectional It states in data area.
It in this embodiment, can be by the first data sectional after new data record being stored in the first data sectional First digital signature is stored into the signature region of first data sectional in data sectional set, and the association for forming closed loop is closed System.Therefore, it when receiving the new data record wait store, needs to determine the data record to be stored from data sectional Stored data segmentation, i.e. the first data sectional.
Illustratively, first data sectional can be determined according to the identification information of first data sectional.As an example, should Identification information can be ID, and the ID of first data sectional can be stored in advance, then is receiving new data note to be stored When record, first data sectional in data sectional set directly can be determined according to the ID, and then determine data to be stored Record stored first data sectional.
As shown in figure 4, being received if the ID of first data sectional in pre-recorded data sectional set is D1 When the new data record wait store, first data sectional D1 can be determined in data sectional set by D1, later, D4 is determined as the first data sectional by the digital signature by the D4 stored in D1, which is arrived In D4.
In the above-mentioned technical solutions, when receiving the data record wait store, data sectional is determined based on identification information First data sectional in set, and then determine stored first data sectional of the data record to be stored, a side Face can guarantee the accuracy of data write-in and storage, on the other hand it is also ensured that the integrality of data storage, effectively avoids Data are tampered.
In the above-described embodiments, a new data record is stored in the data area of the first data sectional, all can By the data content (that is, data content comprising the new data record) and the second number in the data area of the first data sectional It is encrypted according to the first digital signature of segmentation, obtains the first digital signature of the first data sectional.As an example, in S12, First digital signature of first data sectional is stored into the signature region of first data sectional, comprising:
If the number label of not stored first data sectional before in the signature region of first data sectional Name, then by first digital signature storage of first data sectional to the signature region of first data sectional In;
If being stored with the number label of first data sectional before in the signature region of first data sectional Name then signs first number that the digital signature of the first data sectional stored before replaces with first data sectional Name.
Through the above technical solutions, only saving the newest of first data sectional in the signature region of the first data sectional The first digital signature, so as to while guaranteeing data storage safety, avoid the storage of unnecessary resource from occupying.
Optionally, the first digital signature of first data sectional is being stored to the into the data sectional set It, can also be in the signature area of first data sectional in data sectional set when in the signature region of one data sectional Newest first digital signature for only saving first data sectional in domain through the above way mentions to lower resource occupation High resource utilization.
Optionally, the method also includes:
In response to receiving checking command, in the data area for the data sectional to be verified that the checking command is indicated A upper data for data sectional to be verified stored in the signature region of data content and the data sectional to be verified, described point First digital signature of section is encrypted, and the second digital signature of the data sectional to be verified is obtained;
If the first number label of the data sectional to be verified stored in the signature region of the data sectional to be verified Name is different with the second digital signature of the data sectional to be verified, determines that the data content of the data sectional to be verified is usurped Change;
If the first digital signature of the data sectional to be verified of the signature region storage of the data sectional to be verified Data sectional to be verified described in the data sectional set identical and described with the second digital signature of the data sectional to be verified In the presence of a data sectional, then under the second digital signature and the data sectional to be verified of the data sectional to be verified In the case that first digital signature of the data sectional to be verified stored in one data sectional is different, determine described to be verified The data content of data sectional is tampered.
It needs to be illustrated, carry out when encryption generates digital signature in the disclosure using unified key and encryption side Formula is signed.
As an example, the check command can be triggered by timer, i.e., during data store, in order to and Whether Shi Faxian data are tampered, and checking command can be triggered every a cycle, to test to stored data.Make For another example, which can also be triggered by user behavior.Wherein, number to be verified can be indicated in checking command It e.g., in checking command may include the ID of field to be tested according to segmentation, if not including ID in checking command, number can be defaulted It is data sectional to be tested according to each data sectional in segmentation set.
Below according to data sectional set shown in Fig. 4, checking procedure is described in detail.
For the data sectional D2 in data sectional set, when being verified to D2, will be stored in the data area of D2 Data content and D2 signature region in the first digital signature of D1 for storing encrypted, obtain the second number label of D2 Name.If the data content in the data area of D2 is not tampered with, by with obtain the same side of encryption of the first digital signature The first digital signature of the D2 stored in the second digital signature of D2 and the signature region of D2 of formula and key acquisition should be phase With, it therefore, can be with when the first digital signature difference of the D2 stored in the second digital signature of D2 and the signature region of D2 Determine that the data content of D2 is tampered.
In another embodiment, bad attack, may be simultaneously by the D2's stored in D2 in the data content for distorting D2 First digital signature is modified, therefore, the of the D2 stored in the signature region for the second digital signature and D2 for determining D2 When one digital signature is identical, the first number label for the D2 for needing to store in the signature region by next data sectional D3 with D2 Name compares, if the first digital signature of D2 stored in the second digital signature of D2 and the signature region of D3 is different, indicates The first digital signature of the D2 stored in the signature region of D2 is modified, and the data content of D2 is also tampered.
For first data sectional D1 in data sectional set, since its first digital signature is by its data Content carries out encryption acquisition, therefore, when being verified to it, and the second number by encrypting its data content acquisition D1 Word signature, to guarantee the consistency of verification.Checking procedure after the second digital signature for obtaining D1 is same as above, herein It repeats no more.
Through the above technical solutions, by current data segmentation in store current data segmentation the first digital signature, First digital signature of the current data segmentation stored in next data sectional carries out school to the data content of current data segmentation It tests, then can be found in time when data content is tampered, also, even if bad attack in the data in current data segmentation Hold and current data segmentation in the first digital signature for storing all changed, by rapidly scheme provided by the disclosure, Content can also accurately be verified out to be tampered, so that user formulates counter-measure in time, guarantee user experience.
Optionally, each data sectional in data sectional set also includes redundancy backup region, as shown in figure 5, its In, region C is the redundancy backup region;
The method can also include:
After by data record storage to the data area of the first data sectional, fragment is carried out to data record, to obtain Multiple sub-pieces of data record.Illustratively, by taking daily record data as an example, a data record can be a journal file, then After storing the journal file, which can be divided into 2nA sub-piece.Wherein, n is positive integer, can be according to reality Border usage scenario is configured.N is bigger, and the safety of data storage is higher.
According to other data sectionals in data sectional set in addition to the first data sectional, each of data record is determined The hashed value of sub-piece.Wherein it is possible to determine each sub-piece using hash algorithm using other data sectionals as memory space Hashed value, wherein hash algorithm is the prior art, and details are not described herein.
According to hashed value, each sub-piece is respectively stored into the superfluous of data sectional corresponding with the hashed value of the sub-piece In remaining backup region, wherein the sub-piece is for restoring the data record.
Each sub-piece is stored by hashed value, each sub-piece can be made a backup store, and will be each A sub-piece is stored in data sectional set other data sectionals in addition to the first data sectional, can both be effectively ensured standby The safety of part data storage, also can effectively improve search efficiency and the accuracy of each sub-piece.
As an example, by taking data record is journal file as an example, when being stored to journal file, for each data Segmentation, it is continuous and unique that the number ID of each journal file in the data sectional can be sequence, by journal file point When at multiple sub-pieces, the backup hash storage of each sub-piece can be arrived by other data according to the number ID of the journal file Segmentation.Through the above scheme, by way of sequential storage, guarantee the uniformity of data structure, convenient for in data sectional The management of data record improves the efficiency of data query.
Optionally, in one embodiment, however, it is determined that the data content of data sectional to be verified is tampered, then according to be verified The hashed value of the sub-piece of each data record is from the superfluous of data sectional corresponding with hashed value in the data content of data sectional The sub-piece of each data record in the data content of data sectional to be verified is obtained in remaining backup region;According to belonging to same number According to the sub-piece of record, the data record is regenerated.
Illustratively, the data record stored in D2 be L1, L2, L3, wherein L1 is divided into 2 sub-pieces, be denoted as L1-1, L1-2 carries out the explanation of data record recovery by taking L1 as an example below.If it is determined that the data content of D2 is tampered, can determine at this time The each data record stored in D2 out.For L1, determine that its is corresponding standby according to the corresponding hashed value of L1-1, L1-2 Part.Illustratively, the backup that L1-1 is extracted from the redundancy backup region of D1 extracts L1-2 from the redundancy backup region of D3 Backup, then L1 can be regenerated according to the backup and the backup of L1-2 of L1-1 later.The data for needing to restore for other For record, execution step is same as described above, is the prior art according to the mode that each sub-piece generates data record, herein It repeats no more.
Through the above technical solutions, can be when the data content for verifying determining data sectional be tampered, to the data point The data content of section is restored, and can both guarantee the readability of data, it is also ensured that the integrality of data is subsequent number Accurate data are provided according to analysis to support.
It optionally, can also include an index file in the data area of data sectional.It include multiple numbers in data content According to record, the index of each data record is recorded in the index file, so as to quickly determine pair based on the index file The data record answered.Data sectional signature region in can also include data sectional number and index area reference, wherein It numbers for uniquely indicating that the data sectional, index area are used to indicate the storage location of the index file in data area, In order to quick search to the index file, the efficiency of data record inquiry is further increased.
Need to be illustrated, be illustrated in the embodiment of the present disclosure by journal file, not to the disclosure into Row limits, for that can be directly viewable and need to guarantee that the storage of data of integrality can be using data described in the disclosure Storage method.
The disclosure also provides a kind of data storage device, as shown in fig. 6, described device 10 includes:
First signature blocks 100, when meeting preset condition for the storage state in the data area of the first data sectional, First digital signature of data content and the second data sectional in the data area of first data sectional is carried out Encryption obtains the first digital signature of first data sectional, wherein first data sectional and second data point Section belongs to same data sectional set, and second data sectional is a upper data sectional for first data sectional, described Each data sectional in data sectional set includes signature region and data region, the label of first data sectional The first digital signature of second data sectional is stored in name region;
First memory module 200, for counting the first digital signature storage of first data sectional to described first According in the signature region of segmentation;
Second memory module 300 is completed if the data area for first data sectional stores, and the number According to a data sectional in the presence of the first data sectional described in segmentation set, then the first number of first data sectional is signed Name storage is into the signature region of next data sectional.
Optionally, described device further include: the first determining module, for using next data sectional as new first Data sectional, and when triggering storage state of first signature blocks in the data area of the first data sectional and meeting preset condition, First digital signature of data content and the second data sectional in the data area of first data sectional is carried out Encryption obtains the first digital signature of first data sectional.
Optionally, the preset condition includes that the data area storage of first data sectional is completed;Described device is also Include:
Third memory module, for being directed to the data sectional set in response to receiving and sealing instruction up for safekeeping, by described the First digital signature of one data sectional is stored to the signature area of first data sectional in the data sectional set In domain.
Optionally, the preset condition include first data sectional data area in store a new data note Record;
Described device further include:
4th memory module, for storing the first digital signature of first data sectional to the data sectional collection In the signature region of first data sectional in conjunction.
Optionally, first memory module includes:
First sub-module stored, for before in the signature region of first data sectional not stored described In the case where the digital signature of one data sectional, by first digital signature of first data sectional storage to described the In the signature region of one data sectional;
Second sub-module stored, for being stored with described before in the signature region of first data sectional In the case where the digital signature of one data sectional, the digital signature of the first data sectional stored before is replaced with described first First digital signature of data sectional.
Optionally, described device further include:
Second determining module, for storing by first digital signature of first data sectional to the data After in the signature region of first data sectional in segmentation set, if receiving new data record to be stored, Then according to the identification information of first data sectional, first data sectional is determined, and by the data to be stored Record storage is into the data area of first data sectional.
Optionally, described device further include:
Second signature blocks, the data to be verified in response to receiving checking command, the checking command to be indicated Number to be verified stored in the signature region of data content and the data sectional to be verified in the data area of segmentation, described It is encrypted according to the first digital signature of a upper data sectional for segmentation, obtains the second number label of the data sectional to be verified Name;
Third determining module, the data to be verified for being stored in the signature region of the data sectional to be verified In the case that first digital signature of segmentation is different with the second digital signature of the data sectional to be verified, determine described to school The data content for testing data sectional is tampered;
4th determining module, if the data to be verified point of the signature region storage for the data sectional to be verified First digital signature of section is identical with the second digital signature of the data sectional to be verified and the data sectional set in institute State a data sectional in the presence of data sectional to be verified, then the second digital signature of the data sectional to be verified and it is described to Verify the different situation of the first digital signature of the data sectional to be verified stored in next data sectional of data sectional Under, determine that the data content of the data sectional to be verified is tampered.
Optionally, each data sectional in the data sectional set also includes redundancy backup region;
Described device further include:
Fragment module, for by data record storage to behind the data area of first data sectional, to the number Fragment is carried out according to record, to obtain multiple sub-pieces of the data record;
5th determining module, for according to other numbers in the data sectional set in addition to first data sectional According to segmentation, the hashed value of each sub-piece of the data record is determined;
5th memory module, for according to the hashed value, each sub-piece to be respectively stored into and the sub-piece The corresponding data sectional of hashed value the redundancy backup region in, wherein the sub-piece is for restoring data note Record.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 7 is the block diagram of a kind of electronic equipment 700 shown according to an exemplary embodiment.As shown in fig. 7, the electronics is set Standby 700 may include: processor 701, memory 702.The electronic equipment 700 can also include multimedia component 703, input/ Export one or more of (I/O) interface 704 and communication component 705.
Wherein, processor 701 is used to control the integrated operation of the electronic equipment 700, to complete above-mentioned data storage side All or part of the steps in method.Memory 702 is for storing various types of data to support the behaviour in the electronic equipment 700 To make, these data for example may include the instruction of any application or method for operating on the electronic equipment 700, with And the relevant data of application program, such as contact data, the message of transmitting-receiving, picture, audio, video etc..The memory 702 It can be realized by any kind of volatibility or non-volatile memory device or their combination, such as static random-access is deposited Reservoir (Static Random Access Memory, abbreviation SRAM), electrically erasable programmable read-only memory (Electrically Erasable Programmable Read-Only Memory, abbreviation EEPROM), erasable programmable Read-only memory (Erasable Programmable Read-Only Memory, abbreviation EPROM), programmable read only memory (Programmable Read-Only Memory, abbreviation PROM), and read-only memory (Read-Only Memory, referred to as ROM), magnetic memory, flash memory, disk or CD.Multimedia component 703 may include screen and audio component.Wherein Screen for example can be touch screen, and audio component is used for output and/or input audio signal.For example, audio component may include One microphone, microphone is for receiving external audio signal.The received audio signal can be further stored in storage Device 702 is sent by communication component 705.Audio component further includes at least one loudspeaker, is used for output audio signal.I/O Interface 704 provides interface between processor 701 and other interface modules, other above-mentioned interface modules can be keyboard, mouse, Button etc..These buttons can be virtual push button or entity button.Communication component 705 is for the electronic equipment 700 and other Wired or wireless communication is carried out between equipment.Wireless communication, such as Wi-Fi, bluetooth, near-field communication (Near Field Communication, abbreviation NFC), 2G, 3G, 4G, NB-IOT, eMTC or other 5G etc. or they one or more of Combination, it is not limited here.Therefore the corresponding communication component 705 may include: Wi-Fi module, bluetooth module, NFC mould Block etc..
In one exemplary embodiment, electronic equipment 700 can be by one or more application specific integrated circuit (Application Specific Integrated Circuit, abbreviation ASIC), digital signal processor (Digital Signal Processor, abbreviation DSP), digital signal processing appts (Digital Signal Processing Device, Abbreviation DSPD), programmable logic device (Programmable Logic Device, abbreviation PLD), field programmable gate array (Field Programmable Gate Array, abbreviation FPGA), controller, microcontroller, microprocessor or other electronics member Part is realized, for executing above-mentioned date storage method.
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should The step of above-mentioned date storage method is realized when program instruction is executed by processor.For example, the computer readable storage medium It can be the above-mentioned memory 702 including program instruction, above procedure instruction can be executed by the processor 701 of electronic equipment 700 To complete above-mentioned date storage method.
Fig. 8 is the block diagram of a kind of electronic equipment 1900 shown according to an exemplary embodiment.For example, electronic equipment 1900 It may be provided as a server.Referring to Fig. 8, electronic equipment 1900 includes processor 1922, and quantity can be one or more A and memory 1932, for storing the computer program that can be executed by processor 1922.The meter stored in memory 1932 Calculation machine program may include it is one or more each correspond to one group of instruction module.In addition, processor 1922 can To be configured as executing the computer program, to execute above-mentioned date storage method.
In addition, electronic equipment 1900 can also include power supply module 1926 and communication component 1950, the power supply module 1926 It can be configured as the power management for executing electronic equipment 1900, which can be configured as realization electronic equipment 1900 communication, for example, wired or wireless communication.In addition, the electronic equipment 1900 can also include that input/output (I/O) connects Mouth 1958.Electronic equipment 1900 can be operated based on the operating system for being stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM etc..
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should The step of above-mentioned date storage method is realized when program instruction is executed by processor.For example, the computer readable storage medium It can be the above-mentioned memory 1932 including program instruction, above procedure instruction can be held by the processor 1922 of electronic equipment 1900 Row is to complete above-mentioned date storage method.
In a further exemplary embodiment, a kind of computer program product is also provided, which includes energy Enough computer programs executed by programmable device, which has is used for when being executed by the programmable device Execute the code section of above-mentioned date storage method.
The preferred embodiment of the disclosure is described in detail in conjunction with attached drawing above, still, the disclosure is not limited to above-mentioned reality The detail in mode is applied, in the range of the technology design of the disclosure, a variety of letters can be carried out to the technical solution of the disclosure Monotropic type, these simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case where shield, it can be combined in any appropriate way.In order to avoid unnecessary repetition, the disclosure to it is various can No further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originally Disclosed thought equally should be considered as disclosure disclosure of that.

Claims (10)

1. a kind of date storage method, which is characterized in that the described method includes:
It, will be described in first data sectional when storage state in the data area of the first data sectional meets preset condition First digital signature of data content and the second data sectional in data area is encrypted, and first data sectional is obtained The first digital signature, wherein first data sectional and second data sectional belong to same data sectional set, institute State the upper data sectional that the second data sectional is first data sectional, each data point in the data sectional set Duan Jun includes signature region and data region, is stored with second data in the signature region of first data sectional First digital signature of segmentation;
First digital signature of first data sectional is stored into the signature region of first data sectional;
It is completed if the data area of first data sectional stores, and the first data described in the data sectional set A data sectional in the presence of segmentation, then by the first digital signature storage of first data sectional to next data sectional The signature region in.
2. the method according to claim 1, wherein using next data sectional as new the first data point Section, when the return storage state in the data area of the first data sectional meets preset condition, by first data point First digital signature of data content and the second data sectional in the data area of section is encrypted, and obtains described first The step of first digital signature of data sectional.
3. according to the method described in claim 2, it is characterized in that, the preset condition includes the number of first data sectional It stores and completes according to region;The method also includes:
Instruction is sealed up for safekeeping for the data sectional set in response to receiving, and the first number of first data sectional is signed Name storage is into the signature region of first data sectional in the data sectional set.
4. according to the method described in claim 2, it is characterized in that, the preset condition includes the number of first data sectional According to storing a new data record in region;
The method also includes:
By the first digital signature storage of first data sectional to first data sectional in the data sectional set The signature region in.
5. according to the method described in claim 4, it is characterized in that, first digital signature by first data sectional It stores in the signature region of first data sectional, comprising:
If the digital signature of not stored first data sectional before in the signature region of first data sectional, First digital signature of first data sectional is stored into the signature region of first data sectional;
If being stored with the digital signature of first data sectional before in the signature region of first data sectional, The digital signature of the first data sectional stored before is replaced with to first digital signature of first data sectional.
6. according to the method described in claim 4, it is characterized in that, the method also includes:
It stores by first digital signature of first data sectional to first number in the data sectional set After in the signature region of segmentation, if receiving new data record to be stored, according to first data The identification information of segmentation determines first data sectional, and first data is arrived in the data record storage to be stored In the data area of segmentation.
7. the method according to claim 1, wherein the method also includes:
Data in response to receiving checking command, in the data area for the data sectional to be verified that the checking command is indicated A upper data sectional for data sectional to be verified stored in the signature region of content and the data sectional to be verified, described First digital signature is encrypted, and the second digital signature of the data sectional to be verified is obtained;
If the first digital signature of the data sectional to be verified stored in the signature region of the data sectional to be verified and Second digital signature of the data sectional to be verified is different, determines that the data content of the data sectional to be verified is tampered;
If the first digital signature and the institute of the data sectional to be verified of the signature region storage of the data sectional to be verified State data sectional to be verified the second digital signature is identical and the data sectional set described in data sectional to be verified exist Next data sectional, then in next number of the second digital signature of the data sectional to be verified and the data sectional to be verified In the case where the first digital signature difference according to the data sectional to be verified stored in segmentation, the data to be verified are determined The data content of segmentation is tampered.
8. a kind of data storage device, which is characterized in that described device includes:
First signature blocks will be described when meeting preset condition for the storage state in the data area of the first data sectional First digital signature of data content and the second data sectional in the data area of the first data sectional is encrypted, and is obtained Obtain the first digital signature of first data sectional, wherein first data sectional and second data sectional belong to Same data sectional set, second data sectional are a upper data sectional for first data sectional, the data point Each data sectional in Duan Jihe includes signature region and data region, the signature region of first data sectional In be stored with the first digital signature of second data sectional;
First memory module, for storing the first digital signature of first data sectional to first data sectional In the signature region;
Second memory module is completed if the data area for first data sectional stores, and the data sectional A data sectional in the presence of first data sectional described in set then stores the first digital signature of first data sectional Into the signature region of next data sectional.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The step of any one of claim 1-7 the method is realized when row.
10. a kind of electronic equipment characterized by comprising
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize described in any one of claim 1-7 The step of method.
CN201910507170.1A 2019-06-12 2019-06-12 Data storage method and device, computer readable storage medium and electronic equipment Active CN110324150B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910507170.1A CN110324150B (en) 2019-06-12 2019-06-12 Data storage method and device, computer readable storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910507170.1A CN110324150B (en) 2019-06-12 2019-06-12 Data storage method and device, computer readable storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN110324150A true CN110324150A (en) 2019-10-11
CN110324150B CN110324150B (en) 2022-03-22

Family

ID=68120892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910507170.1A Active CN110324150B (en) 2019-06-12 2019-06-12 Data storage method and device, computer readable storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110324150B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090044018A1 (en) * 2007-08-08 2009-02-12 Mark Louis Kirchner Section Inclusion and Section Order Authentication Method for Computer Electronic Documents
US20090113136A1 (en) * 2007-10-30 2009-04-30 Sandisk Il Ltd. Caching for structural integrity schemes
US20150169901A1 (en) * 2013-12-12 2015-06-18 Sandisk Technologies Inc. Method and Systems for Integrity Checking a Set of Signed Data Sections
CN109118223A (en) * 2018-08-21 2019-01-01 上海点融信息科技有限责任公司 For managing the method, apparatus and medium of electronic data in block chain
CN109194466A (en) * 2018-10-29 2019-01-11 南开大学 A kind of cloud data integrity detection method and system based on block chain
CN109302495A (en) * 2018-11-20 2019-02-01 北京邮电大学 A kind of date storage method and device
US20190074968A1 (en) * 2017-09-06 2019-03-07 Alibaba Group Holding Limited Method, apparatus and system for data encryption and decryption

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090044018A1 (en) * 2007-08-08 2009-02-12 Mark Louis Kirchner Section Inclusion and Section Order Authentication Method for Computer Electronic Documents
US20090113136A1 (en) * 2007-10-30 2009-04-30 Sandisk Il Ltd. Caching for structural integrity schemes
US20150169901A1 (en) * 2013-12-12 2015-06-18 Sandisk Technologies Inc. Method and Systems for Integrity Checking a Set of Signed Data Sections
US20190074968A1 (en) * 2017-09-06 2019-03-07 Alibaba Group Holding Limited Method, apparatus and system for data encryption and decryption
CN109118223A (en) * 2018-08-21 2019-01-01 上海点融信息科技有限责任公司 For managing the method, apparatus and medium of electronic data in block chain
CN109194466A (en) * 2018-10-29 2019-01-11 南开大学 A kind of cloud data integrity detection method and system based on block chain
CN109302495A (en) * 2018-11-20 2019-02-01 北京邮电大学 A kind of date storage method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
FILIPE APOLINÁRIO;MIGUEL PARDAL;MIGUEL CORREIA: ""S-Audit: Efficient Data Integrity Verification for Cloud Storage"", 《2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/ 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE)》 *
翟社平等: "区块链中的隐私保护技术", 《西安邮电大学学报》 *

Also Published As

Publication number Publication date
CN110324150B (en) 2022-03-22

Similar Documents

Publication Publication Date Title
US11849023B2 (en) Verifiable redactable audit log
CN105337941B (en) A kind of device identification providing method and device
CN107679393B (en) Android integrity verification method and device based on trusted execution environment
CN107392040A (en) A kind of method and device for checking of knowing together
CN107015882A (en) A kind of block data method of calibration and device
TW202036347A (en) Method and apparatus for data storage and verification
CN108256354B (en) Test data-based storage method and storage medium
CN109033772A (en) A kind of input method and device of verification information
CN112417485A (en) Model training method, system and device based on trusted execution environment
CN108090364B (en) Method and system for positioning data leakage source
CN107124407B (en) Data transmission method, device, readable storage medium storing program for executing, electronic equipment and system
CN109766688A (en) A kind of Linux program run time verification based on Merkle tree and management-control method and system
US11934539B2 (en) Method and apparatus for storing and processing application program information
CN102685121A (en) Digital signature method and digital signature device
CN110324150A (en) Date storage method, device, computer readable storage medium and electronic equipment
CN111008389B (en) Data processing method and device based on file system in satellite
CN107545185A (en) Android mobile terminal administration authority detection method, device, terminal and storage medium
CN109167785B (en) Calling method of virtual trusted root and service server
CN109002710A (en) A kind of detection method, device and computer readable storage medium
CN113378195A (en) Method, apparatus, medium, and program product for encrypted communication
CN107239712A (en) The hidden method and device of user profile based on application program
CN112016336A (en) Method, device, equipment and storage medium for detecting copy card
CN110995447A (en) Data storage method, device, equipment and medium
CN110321384A (en) A kind of data record method based on block chain, device and electronic equipment
CN110263585B (en) Test supervision method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant