CN110324150A - Date storage method, device, computer readable storage medium and electronic equipment - Google Patents
Date storage method, device, computer readable storage medium and electronic equipment Download PDFInfo
- Publication number
- CN110324150A CN110324150A CN201910507170.1A CN201910507170A CN110324150A CN 110324150 A CN110324150 A CN 110324150A CN 201910507170 A CN201910507170 A CN 201910507170A CN 110324150 A CN110324150 A CN 110324150A
- Authority
- CN
- China
- Prior art keywords
- data
- data sectional
- sectional
- digital signature
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
This disclosure relates to a kind of date storage method, device, computer readable storage medium and electronic equipment, the described method includes: when the storage state in the data area of the first data sectional meets preset condition, first digital signature of data content and the second data sectional in the data area of first data sectional is encrypted, the first digital signature of first data sectional is obtained;First digital signature of first data sectional is stored into the signature region of first data sectional;It is completed if the data area of first data sectional stores, and a data sectional in the presence of the first data sectional described in the data sectional set, then the first digital signature of first data sectional is stored into the signature region of next data sectional.Through the above technical solutions, can guarantee the safety and integrality of data storage, user can be directly viewable, and reduce the complexity of user's operation, promote user experience.
Description
Technical field
This disclosure relates to field of data storage, and in particular, to a kind of date storage method, computer-readable is deposited device
Storage media and electronic equipment.
Background technique
With the fast development of computer internet technology, generated in the business and business procession on internet
Data also welcome fulminant growth.Wherein, partial data during service operation is usually not revisable.For this
Class data, the prior art, so as to prevent the data to be not modified, guarantee that its is complete generally by encrypting to such data
Whole property.Although data can be carried out with secure storage through the above way, the data after storage are encryption datas, and user needs
The data can just be checked by being decrypted, and aforesaid way is not easy to user and checks.
Summary of the invention
Purpose of this disclosure is to provide a kind of data storage sides that can be guaranteed data security, completely and convenient for user check
Method, device, computer readable storage medium and electronic equipment.
To achieve the goals above, according to the disclosure in a first aspect, provide a kind of date storage method, the method packet
It includes:
When storage state in the data area of the first data sectional meets preset condition, by first data sectional
First digital signature of data content and the second data sectional in the data area is encrypted, and first data are obtained
First digital signature of segmentation, wherein first data sectional and second data sectional belong to same data sectional collection
It closes, second data sectional is a upper data sectional for first data sectional, each in the data sectional set
Data sectional includes signature region and data region, and described the is stored in the signature region of first data sectional
First digital signature of two data sectionals;
By the first digital signature storage of first data sectional to the signature region of first data sectional
In;
It is completed if the data area of first data sectional stores, and first described in the data sectional set
A data sectional in the presence of data sectional, then by the first digital signature storage of first data sectional to next data
In the signature region of segmentation.
Optionally, it using next data sectional as the first new data sectional, returns described in the first data sectional
The storage state of data area when meeting preset condition, will be in the data in the data area of first data sectional
Hold and the first digital signature of the second data sectional is encrypted, obtains the step of the first digital signature of first data sectional
Suddenly.
Optionally, the preset condition includes that the data area storage of first data sectional is completed;The method is also
Include:
Instruction is sealed up for safekeeping for the data sectional set in response to receiving, by the first number of first data sectional
Word signature storage is into the signature region of first data sectional in the data sectional set.
Optionally, the preset condition include first data sectional data area in store a new data note
Record;
The method also includes:
By the first digital signature storage of first data sectional to first data in the data sectional set
In the signature region of segmentation.
Optionally, institute of the first digital signature storage by first data sectional to first data sectional
It states in signature region, comprising:
If the number label of not stored first data sectional before in the signature region of first data sectional
Name, then by first digital signature storage of first data sectional to the signature region of first data sectional
In;
If being stored with the number label of first data sectional before in the signature region of first data sectional
Name then signs first number that the digital signature of the first data sectional stored before replaces with first data sectional
Name.
Optionally, the method also includes:
It stores by first digital signature of first data sectional to first in the data sectional set
After in the signature region of a data sectional, if receiving new data record to be stored, according to described first
The identification information of data sectional, determines first data sectional, and by the data record storage to be stored to this first
In the data area of data sectional.
Optionally, the method also includes:
In response to receiving checking command, in the data area for the data sectional to be verified that the checking command is indicated
A upper data for data sectional to be verified stored in the signature region of data content and the data sectional to be verified, described point
First digital signature of section is encrypted, and the second digital signature of the data sectional to be verified is obtained;
If the first number label of the data sectional to be verified stored in the signature region of the data sectional to be verified
Name is different with the second digital signature of the data sectional to be verified, determines that the data content of the data sectional to be verified is usurped
Change;
If the first digital signature of the data sectional to be verified of the signature region storage of the data sectional to be verified
Data sectional to be verified described in the data sectional set identical and described with the second digital signature of the data sectional to be verified
In the presence of a data sectional, then under the second digital signature and the data sectional to be verified of the data sectional to be verified
In the case that first digital signature of the data sectional to be verified stored in one data sectional is different, determine described to be verified
The data content of data sectional is tampered.
Optionally, each data sectional in the data sectional set also includes redundancy backup region;
The method also includes:
After by data record storage to the data area of first data sectional, the data record is divided
Piece, to obtain multiple sub-pieces of the data record;
According to other data sectionals in the data sectional set in addition to first data sectional, the number is determined
According to the hashed value of each sub-piece of record;
According to the hashed value, each sub-piece is respectively stored into data corresponding with the hashed value of the sub-piece
In the redundancy backup region of segmentation, wherein the sub-piece is for restoring the data record.
According to the second aspect of the disclosure, a kind of data storage device is provided, described device includes:
First signature blocks will when meeting preset condition for the storage state in the data area of the first data sectional
First digital signature of data content and the second data sectional in the data area of first data sectional is added
It is close, obtain the first digital signature of first data sectional, wherein first data sectional and second data sectional
Belong to same data sectional set, second data sectional is a upper data sectional for first data sectional, the number
It include signature region and data region, the signature of first data sectional according to each data sectional in segmentation set
The first digital signature of second data sectional is stored in region;
First memory module, for dividing the first digital signature storage of first data sectional to first data
In the signature region of section;
Second memory module is completed if the data area for first data sectional stores, and the data
A data sectional in the presence of first data sectional described in segmentation set, then by the first digital signature of first data sectional
It stores in the signature region of next data sectional.
Optionally, described device further include: the first determining module, for using next data sectional as new first
Data sectional, and when triggering storage state of first signature blocks in the data area of the first data sectional and meeting preset condition,
First digital signature of data content and the second data sectional in the data area of first data sectional is carried out
Encryption obtains the first digital signature of first data sectional.
Optionally, the preset condition includes that the data area storage of first data sectional is completed;Described device is also
Include:
Third memory module, for being directed to the data sectional set in response to receiving and sealing instruction up for safekeeping, by described the
First digital signature of one data sectional is stored to the signature area of first data sectional in the data sectional set
In domain.
Optionally, the preset condition include first data sectional data area in store a new data note
Record;
Described device further include:
4th memory module, for storing the first digital signature of first data sectional to the data sectional collection
In the signature region of first data sectional in conjunction.
Optionally, first memory module includes:
First sub-module stored, for before in the signature region of first data sectional not stored described
In the case where the digital signature of one data sectional, by first digital signature of first data sectional storage to described the
In the signature region of one data sectional;
Second sub-module stored, for being stored with described before in the signature region of first data sectional
In the case where the digital signature of one data sectional, the digital signature of the first data sectional stored before is replaced with described first
First digital signature of data sectional.
Optionally, described device further include:
Second determining module, for storing by first digital signature of first data sectional to the data
After in the signature region of first data sectional in segmentation set, if receiving new data record to be stored,
Then according to the identification information of first data sectional, first data sectional is determined, and by the data to be stored
Record storage is into the data area of first data sectional.
Optionally, described device further include:
Second signature blocks, the data to be verified in response to receiving checking command, the checking command to be indicated
Number to be verified stored in the signature region of data content and the data sectional to be verified in the data area of segmentation, described
It is encrypted according to the first digital signature of a upper data sectional for segmentation, obtains the second number label of the data sectional to be verified
Name;
Third determining module, the data to be verified for being stored in the signature region of the data sectional to be verified
In the case that first digital signature of segmentation is different with the second digital signature of the data sectional to be verified, determine described to school
The data content for testing data sectional is tampered;
4th determining module, if the data to be verified point of the signature region storage for the data sectional to be verified
First digital signature of section is identical with the second digital signature of the data sectional to be verified and the data sectional set in institute
State a data sectional in the presence of data sectional to be verified, then the second digital signature of the data sectional to be verified and it is described to
Verify the different situation of the first digital signature of the data sectional to be verified stored in next data sectional of data sectional
Under, determine that the data content of the data sectional to be verified is tampered.
Optionally, each data sectional in the data sectional set also includes redundancy backup region;
Described device further include:
Fragment module, for by data record storage to behind the data area of first data sectional, to the number
Fragment is carried out according to record, to obtain multiple sub-pieces of the data record;
5th determining module, for according to other numbers in the data sectional set in addition to first data sectional
According to segmentation, the hashed value of each sub-piece of the data record is determined;
5th memory module, for according to the hashed value, each sub-piece to be respectively stored into and the sub-piece
The corresponding data sectional of hashed value the redundancy backup region in, wherein the sub-piece is for restoring data note
Record.
According to the third aspect of the disclosure, a kind of computer readable storage medium is provided, computer program is stored thereon with,
The program realizes the step of above-mentioned first aspect any the method when being executed by processor.
According to the fourth aspect of the disclosure, a kind of electronic equipment is provided, comprising:
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, with any side of above-mentioned first aspect
The step of method.
In the above-mentioned technical solutions, the digital signature of a upper data sectional is stored in current data segmentation, and is based on working as
The digital signature of the data content of preceding data sectional and a upper data sectional generates the digital signature of current data segmentation, thus shape
At a kind of concatenated Linked Storage Structure.It, will be to data if there is bad attack based on the data storage method that the disclosure provides
When being distorted, needs the content being segmented to current data and its content of follow-up data segmentation to modify, increase data and usurp
Change required complexity, guarantees the secure storage of data.Also, when data content is modified, corresponding digital signature must
It can so change, pass through above-mentioned Linked Storage Structure and digital signature, it is also ensured that find in time when data are tampered
Probability, be further ensured that data storage safety and integrality.In addition, in the disclosure, data content can be deposited directly
Storage does not need to carry out encryption storage, so that user can be directly viewable, reduces the complexity of user's operation in data area
Degree promotes user experience.
Other feature and advantage of the disclosure will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is and to constitute part of specification for providing further understanding of the disclosure, with following tool
Body embodiment is used to explain the disclosure together, but does not constitute the limitation to the disclosure.In the accompanying drawings:
Fig. 1 is the flow chart of the date storage method provided according to an embodiment of the present disclosure;
Fig. 2 is the schematic diagram of the data sectional provided according to an embodiment of the present disclosure;
Fig. 3 is the schematic diagram of the data sectional set provided according to an embodiment of the present disclosure;
Fig. 4 is the schematic diagram of the data sectional set provided according to the another embodiment of the disclosure;
Fig. 5 is the schematic diagram of the data sectional provided according to the another embodiment of the disclosure;
Fig. 6 is the block diagram of the data storage device provided according to an embodiment of the present disclosure;
Fig. 7 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment;
Fig. 8 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
Specific embodiment
It is described in detail below in conjunction with specific embodiment of the attached drawing to the disclosure.It should be understood that this place is retouched
The specific embodiment stated is only used for describing and explaining the disclosure, is not limited to the disclosure.
As described in the background art, a large amount of data can be generated in the business on internet and business procession.This
Some data are revisable in a little data, such as the relevant data of user information, such as user password, logging device, part number
According to being not revisable, such as daily record data, need to guarantee its integrality and readability.The disclosure is exactly directed to and this kind of can not repair
The scheme that the data changed propose, is described in detail by taking daily record data as an example below.
Shown in Fig. 1, for the flow chart of the date storage method provided according to an embodiment of the present disclosure.Such as Fig. 1 institute
Show, which comprises
In S11, when the storage state in the data area of the first data sectional meets preset condition, by the first data point
First digital signature of data content and the second data sectional in the data area of section is encrypted, and the first data sectional is obtained
The first digital signature, wherein first data sectional and second data sectional belong to same data sectional set, institute
State the upper data sectional that the second data sectional is first data sectional, each data point in the data sectional set
Duan Jun includes signature region and data region, is stored with second data in the signature region of first data sectional
First digital signature of segmentation.
Illustratively, as shown in Fig. 2, being the schematic diagram of data sectional, wherein region A is the signature region of data sectional, area
Domain B is the data area of data sectional.It is stored with the first digital signature of a upper data sectional in signature region, in data area
It is stored with the data content of current data segmentation, it can be directly by first number of the data content and a upper data sectional for storage
Word signature is encrypted, and the first digital signature of current data segmentation is obtained.Wherein, the above process can be using in the prior art
Digital signature encryption mode, key can by user setting, can also by the way of default setting, the disclosure to this without limit
It is fixed.
Optionally, a data sectional set corresponds to a type of data storage file.Illustratively, it is with daily record data
Example, a data sectional set correspond to a kind of storage file of auditing flow daily record data, as an example, audit stream of asking for leave
Journey journal file corresponding data segmentation set 1, reimbursement auditing flow journal file corresponding data segmentation set 2.Therefore, in business
In treatment process, the storage location for the journal file that it is generated can be determined, convenient for data according to the corresponding process of the business
It searches and checks.
In S12, the first digital signature of the first data sectional is stored into the signature region of the first data sectional.
Illustratively, as shown in Fig. 2, can store the current data sectional in the signature region of current data segmentation
First digital signature of the first digital signature and a data sectional on this;In data area, it can store and the data sectional is written
Data, e.g., journal file etc..
In S13, completed if the data area of the first data sectional stores, and the first data sectional in data sectional set
In the presence of a data sectional, then by the first digital signature of the first data sectional storage to the signature region of next data sectional
In.
Wherein it is possible to the memory size of the corresponding storage region of each data sectional is preset, and illustratively, each data
Segmentation can correspond to the memory space of 20M.Further, sign in data sectional region and data region point also can be set
Not corresponding memory space.As an example, default threshold can be less than in the residual storage capacity of the data area of the data sectional
When value, determine that the data storage areas storage of data sectional is completed.Wherein, the preset threshold can according to actual use scene into
Row setting, the disclosure is to this without limiting.
In the above-mentioned technical solutions, the digital signature of a upper data sectional is stored in current data segmentation, and is based on working as
The digital signature of the data content of preceding data sectional and a upper data sectional generates the digital signature of current data segmentation, thus shape
At a kind of concatenated Linked Storage Structure.It, will be to data if there is bad attack based on the data storage method that the disclosure provides
When being distorted, it is necessary to which the content of content and its follow-up data segmentation to current data segmentation is modified, and is greatly increased
Add the complexity of data tampering, to guarantee the secure storage of data.Also, when data content is modified, corresponding number
Word signature will necessarily change, and pass through above-mentioned Linked Storage Structure and digital signature, it is also ensured that when data are tampered
The probability found in time is further ensured that the safety and integrality of data storage.In addition, in the disclosure, data content can
It to be stored directly in data area, does not need to carry out encryption storage, so that user can be directly viewable, reduces user's operation
Complexity, promoted user experience.
Optionally, if the first data sectional is first data sectional in the data sectional set, in the first data
It, can be directly by the number in the data area of the first data sectional when the storage state of the data area of segmentation meets preset condition
It is encrypted according to content, obtains the first data signature of first data sectional, and first number is arrived into data signature storage
According in the signature region of segmentation.It is completed if the data area of the first data sectional stores, by the first number of first data sectional
Word signature is stored in the signature region of next data sectional of first data sectional.
Through the above technical solutions, can be deposited to the data content of first data sectional in data sectional set
Storage, and its safety and accuracy are guaranteed by way of digital signature.
Optionally, the method also includes: using next data sectional as the first new data sectional, described in return
It, will be in the data area of the first data sectional when storage state in the data area of the first data sectional meets preset condition
First digital signature of data content and the second data sectional is encrypted, and the first digital signature of the first data sectional is obtained
Step 11.
Illustratively, as shown in figure 3, being the schematic diagram of a data sectional set.As shown in figure 3, D1, D2, D3, D4 distinguish table
Show that a data sectional, D1 are first data sectional in data sectional set, D2 is next data sectional of D1, and D3 is D2's
Next data sectional, D4 are next data sectional of D3.In the examples described above, the digital signature of D1 is by the data to D1
Hold what encryption obtained, and after the completion of the data area of D1 stores, by the digital signature storage of acquisition to the signature region of D2
In.
Later, D2 (that is, first data sectional) can according to its storage D1 digital signature and D2 data content into
Row encryption, it is hereby achieved that the digital signature of D2, meanwhile, after the completion of the data area of D2 stores, then the number of D2 is signed
Name storage is into the signature region of D3.At this point, D3 can be used as the first new data sectional, above-mentioned steps are repeated, thus
Form data store organisation shown in Fig. 3.Through the above technical solutions, can guarantee each data sectional in data sectional set
Between relevance, further increase the complexity of data modification, with guarantee data storage safety.
Optionally, in one embodiment, the preset condition includes that the data area of first data sectional has stored
At;The method also includes:
Instruction is sealed up for safekeeping for data sectional set in response to receiving, and the first digital signature of the first data sectional is deposited
In the signature region for storing up first data sectional in data sectional set.
For the partial data generated in business procedure, if business changes, the data generated before general no longer make
With, need to seal these data up for safekeeping at this time, in order to later to business carry out check or version recall.In the embodiment
In, when needing to seal data up for safekeeping, instruction is sealed up for safekeeping for data sectional set in response to receiving, by the first data point
First digital signature of section (at this point, the last one data sectional in data sectional set) is stored into data sectional set
In the signature region of first data sectional.Wherein, this is sealed instruction up for safekeeping and can be triggered by user, is also possible to default triggering, such as
Automatic trigger when business processing flow changes.Illustratively, as shown in figure 4, the first data sectional is D4, in response to receiving
It seals instruction up for safekeeping, the digital signature of D4 is stored into the signature region of D1.
In the above-mentioned technical solutions, when the data area of the first data sectional stores completion, first data point are calculated
First digital signature of section can reduce the calculation amount of digital signature, guarantee data storage efficiency.Also, it is carried out to data
When sealing up for safekeeping, by storing the first digital signature of the first data sectional to first data sectional in data sectional set
It signs in region, the incidence relation of closed loop can be formed between each data sectional in the data sectional set, so that
Bad attack can not determine first data sectional in data sectional set in altered data content, and then can not continuously usurp
Change data, is further ensured that the safety and integrality of data.
In another embodiment, optionally, the preset condition include the first data sectional data area in store
One new data record;
The method also includes:
By the label of the first digital signature storage of the first data sectional to first data sectional in data sectional set
In name region.
In this embodiment, a new data record is stored in the data area of the first data sectional, can all be incited somebody to action
Data content (that is, data content comprising the new data record) and the second data in the data area of first data sectional
First digital signature of segmentation is encrypted, and the first digital signature of the first data sectional is obtained.
Also, in order to further ensure the safety of data storage, in this embodiment, the first data sectional is being obtained
After first digital signature, which is stored in the signature region of first data sectional of data sectional set
In.That is, in this embodiment, after storing a new data record, then by current data sectional (that is, the first number
According to segmentation) the first digital signature store into the signature region of first data sectional in data sectional set so that should
The incidence relation of closed loop is formed between each data sectional of data sectional set.
Therefore, through the above technical solutions, in the first data sectional storage once new data record obtain this first
Newest first digital signature of data sectional, and first digital signature is stored to first number in data sectional set
According in the signature region of segmentation, so that being between each data sectional in data sectional set when being stored without data
The incidence relation of closed loop, to effectively data be avoided to be tampered.
Optionally, the method also includes:
It stores by the first digital signature of the first data sectional to first data sectional in data sectional set
After in the signature region, if receiving new data record to be stored, according to the mark of first data sectional
Know information, determine first data sectional, and the data record storage to be stored is arrived to the institute of first data sectional
It states in data area.
It in this embodiment, can be by the first data sectional after new data record being stored in the first data sectional
First digital signature is stored into the signature region of first data sectional in data sectional set, and the association for forming closed loop is closed
System.Therefore, it when receiving the new data record wait store, needs to determine the data record to be stored from data sectional
Stored data segmentation, i.e. the first data sectional.
Illustratively, first data sectional can be determined according to the identification information of first data sectional.As an example, should
Identification information can be ID, and the ID of first data sectional can be stored in advance, then is receiving new data note to be stored
When record, first data sectional in data sectional set directly can be determined according to the ID, and then determine data to be stored
Record stored first data sectional.
As shown in figure 4, being received if the ID of first data sectional in pre-recorded data sectional set is D1
When the new data record wait store, first data sectional D1 can be determined in data sectional set by D1, later,
D4 is determined as the first data sectional by the digital signature by the D4 stored in D1, which is arrived
In D4.
In the above-mentioned technical solutions, when receiving the data record wait store, data sectional is determined based on identification information
First data sectional in set, and then determine stored first data sectional of the data record to be stored, a side
Face can guarantee the accuracy of data write-in and storage, on the other hand it is also ensured that the integrality of data storage, effectively avoids
Data are tampered.
In the above-described embodiments, a new data record is stored in the data area of the first data sectional, all can
By the data content (that is, data content comprising the new data record) and the second number in the data area of the first data sectional
It is encrypted according to the first digital signature of segmentation, obtains the first digital signature of the first data sectional.As an example, in S12,
First digital signature of first data sectional is stored into the signature region of first data sectional, comprising:
If the number label of not stored first data sectional before in the signature region of first data sectional
Name, then by first digital signature storage of first data sectional to the signature region of first data sectional
In;
If being stored with the number label of first data sectional before in the signature region of first data sectional
Name then signs first number that the digital signature of the first data sectional stored before replaces with first data sectional
Name.
Through the above technical solutions, only saving the newest of first data sectional in the signature region of the first data sectional
The first digital signature, so as to while guaranteeing data storage safety, avoid the storage of unnecessary resource from occupying.
Optionally, the first digital signature of first data sectional is being stored to the into the data sectional set
It, can also be in the signature area of first data sectional in data sectional set when in the signature region of one data sectional
Newest first digital signature for only saving first data sectional in domain through the above way mentions to lower resource occupation
High resource utilization.
Optionally, the method also includes:
In response to receiving checking command, in the data area for the data sectional to be verified that the checking command is indicated
A upper data for data sectional to be verified stored in the signature region of data content and the data sectional to be verified, described point
First digital signature of section is encrypted, and the second digital signature of the data sectional to be verified is obtained;
If the first number label of the data sectional to be verified stored in the signature region of the data sectional to be verified
Name is different with the second digital signature of the data sectional to be verified, determines that the data content of the data sectional to be verified is usurped
Change;
If the first digital signature of the data sectional to be verified of the signature region storage of the data sectional to be verified
Data sectional to be verified described in the data sectional set identical and described with the second digital signature of the data sectional to be verified
In the presence of a data sectional, then under the second digital signature and the data sectional to be verified of the data sectional to be verified
In the case that first digital signature of the data sectional to be verified stored in one data sectional is different, determine described to be verified
The data content of data sectional is tampered.
It needs to be illustrated, carry out when encryption generates digital signature in the disclosure using unified key and encryption side
Formula is signed.
As an example, the check command can be triggered by timer, i.e., during data store, in order to and
Whether Shi Faxian data are tampered, and checking command can be triggered every a cycle, to test to stored data.Make
For another example, which can also be triggered by user behavior.Wherein, number to be verified can be indicated in checking command
It e.g., in checking command may include the ID of field to be tested according to segmentation, if not including ID in checking command, number can be defaulted
It is data sectional to be tested according to each data sectional in segmentation set.
Below according to data sectional set shown in Fig. 4, checking procedure is described in detail.
For the data sectional D2 in data sectional set, when being verified to D2, will be stored in the data area of D2
Data content and D2 signature region in the first digital signature of D1 for storing encrypted, obtain the second number label of D2
Name.If the data content in the data area of D2 is not tampered with, by with obtain the same side of encryption of the first digital signature
The first digital signature of the D2 stored in the second digital signature of D2 and the signature region of D2 of formula and key acquisition should be phase
With, it therefore, can be with when the first digital signature difference of the D2 stored in the second digital signature of D2 and the signature region of D2
Determine that the data content of D2 is tampered.
In another embodiment, bad attack, may be simultaneously by the D2's stored in D2 in the data content for distorting D2
First digital signature is modified, therefore, the of the D2 stored in the signature region for the second digital signature and D2 for determining D2
When one digital signature is identical, the first number label for the D2 for needing to store in the signature region by next data sectional D3 with D2
Name compares, if the first digital signature of D2 stored in the second digital signature of D2 and the signature region of D3 is different, indicates
The first digital signature of the D2 stored in the signature region of D2 is modified, and the data content of D2 is also tampered.
For first data sectional D1 in data sectional set, since its first digital signature is by its data
Content carries out encryption acquisition, therefore, when being verified to it, and the second number by encrypting its data content acquisition D1
Word signature, to guarantee the consistency of verification.Checking procedure after the second digital signature for obtaining D1 is same as above, herein
It repeats no more.
Through the above technical solutions, by current data segmentation in store current data segmentation the first digital signature,
First digital signature of the current data segmentation stored in next data sectional carries out school to the data content of current data segmentation
It tests, then can be found in time when data content is tampered, also, even if bad attack in the data in current data segmentation
Hold and current data segmentation in the first digital signature for storing all changed, by rapidly scheme provided by the disclosure,
Content can also accurately be verified out to be tampered, so that user formulates counter-measure in time, guarantee user experience.
Optionally, each data sectional in data sectional set also includes redundancy backup region, as shown in figure 5, its
In, region C is the redundancy backup region;
The method can also include:
After by data record storage to the data area of the first data sectional, fragment is carried out to data record, to obtain
Multiple sub-pieces of data record.Illustratively, by taking daily record data as an example, a data record can be a journal file, then
After storing the journal file, which can be divided into 2nA sub-piece.Wherein, n is positive integer, can be according to reality
Border usage scenario is configured.N is bigger, and the safety of data storage is higher.
According to other data sectionals in data sectional set in addition to the first data sectional, each of data record is determined
The hashed value of sub-piece.Wherein it is possible to determine each sub-piece using hash algorithm using other data sectionals as memory space
Hashed value, wherein hash algorithm is the prior art, and details are not described herein.
According to hashed value, each sub-piece is respectively stored into the superfluous of data sectional corresponding with the hashed value of the sub-piece
In remaining backup region, wherein the sub-piece is for restoring the data record.
Each sub-piece is stored by hashed value, each sub-piece can be made a backup store, and will be each
A sub-piece is stored in data sectional set other data sectionals in addition to the first data sectional, can both be effectively ensured standby
The safety of part data storage, also can effectively improve search efficiency and the accuracy of each sub-piece.
As an example, by taking data record is journal file as an example, when being stored to journal file, for each data
Segmentation, it is continuous and unique that the number ID of each journal file in the data sectional can be sequence, by journal file point
When at multiple sub-pieces, the backup hash storage of each sub-piece can be arrived by other data according to the number ID of the journal file
Segmentation.Through the above scheme, by way of sequential storage, guarantee the uniformity of data structure, convenient for in data sectional
The management of data record improves the efficiency of data query.
Optionally, in one embodiment, however, it is determined that the data content of data sectional to be verified is tampered, then according to be verified
The hashed value of the sub-piece of each data record is from the superfluous of data sectional corresponding with hashed value in the data content of data sectional
The sub-piece of each data record in the data content of data sectional to be verified is obtained in remaining backup region;According to belonging to same number
According to the sub-piece of record, the data record is regenerated.
Illustratively, the data record stored in D2 be L1, L2, L3, wherein L1 is divided into 2 sub-pieces, be denoted as L1-1,
L1-2 carries out the explanation of data record recovery by taking L1 as an example below.If it is determined that the data content of D2 is tampered, can determine at this time
The each data record stored in D2 out.For L1, determine that its is corresponding standby according to the corresponding hashed value of L1-1, L1-2
Part.Illustratively, the backup that L1-1 is extracted from the redundancy backup region of D1 extracts L1-2 from the redundancy backup region of D3
Backup, then L1 can be regenerated according to the backup and the backup of L1-2 of L1-1 later.The data for needing to restore for other
For record, execution step is same as described above, is the prior art according to the mode that each sub-piece generates data record, herein
It repeats no more.
Through the above technical solutions, can be when the data content for verifying determining data sectional be tampered, to the data point
The data content of section is restored, and can both guarantee the readability of data, it is also ensured that the integrality of data is subsequent number
Accurate data are provided according to analysis to support.
It optionally, can also include an index file in the data area of data sectional.It include multiple numbers in data content
According to record, the index of each data record is recorded in the index file, so as to quickly determine pair based on the index file
The data record answered.Data sectional signature region in can also include data sectional number and index area reference, wherein
It numbers for uniquely indicating that the data sectional, index area are used to indicate the storage location of the index file in data area,
In order to quick search to the index file, the efficiency of data record inquiry is further increased.
Need to be illustrated, be illustrated in the embodiment of the present disclosure by journal file, not to the disclosure into
Row limits, for that can be directly viewable and need to guarantee that the storage of data of integrality can be using data described in the disclosure
Storage method.
The disclosure also provides a kind of data storage device, as shown in fig. 6, described device 10 includes:
First signature blocks 100, when meeting preset condition for the storage state in the data area of the first data sectional,
First digital signature of data content and the second data sectional in the data area of first data sectional is carried out
Encryption obtains the first digital signature of first data sectional, wherein first data sectional and second data point
Section belongs to same data sectional set, and second data sectional is a upper data sectional for first data sectional, described
Each data sectional in data sectional set includes signature region and data region, the label of first data sectional
The first digital signature of second data sectional is stored in name region;
First memory module 200, for counting the first digital signature storage of first data sectional to described first
According in the signature region of segmentation;
Second memory module 300 is completed if the data area for first data sectional stores, and the number
According to a data sectional in the presence of the first data sectional described in segmentation set, then the first number of first data sectional is signed
Name storage is into the signature region of next data sectional.
Optionally, described device further include: the first determining module, for using next data sectional as new first
Data sectional, and when triggering storage state of first signature blocks in the data area of the first data sectional and meeting preset condition,
First digital signature of data content and the second data sectional in the data area of first data sectional is carried out
Encryption obtains the first digital signature of first data sectional.
Optionally, the preset condition includes that the data area storage of first data sectional is completed;Described device is also
Include:
Third memory module, for being directed to the data sectional set in response to receiving and sealing instruction up for safekeeping, by described the
First digital signature of one data sectional is stored to the signature area of first data sectional in the data sectional set
In domain.
Optionally, the preset condition include first data sectional data area in store a new data note
Record;
Described device further include:
4th memory module, for storing the first digital signature of first data sectional to the data sectional collection
In the signature region of first data sectional in conjunction.
Optionally, first memory module includes:
First sub-module stored, for before in the signature region of first data sectional not stored described
In the case where the digital signature of one data sectional, by first digital signature of first data sectional storage to described the
In the signature region of one data sectional;
Second sub-module stored, for being stored with described before in the signature region of first data sectional
In the case where the digital signature of one data sectional, the digital signature of the first data sectional stored before is replaced with described first
First digital signature of data sectional.
Optionally, described device further include:
Second determining module, for storing by first digital signature of first data sectional to the data
After in the signature region of first data sectional in segmentation set, if receiving new data record to be stored,
Then according to the identification information of first data sectional, first data sectional is determined, and by the data to be stored
Record storage is into the data area of first data sectional.
Optionally, described device further include:
Second signature blocks, the data to be verified in response to receiving checking command, the checking command to be indicated
Number to be verified stored in the signature region of data content and the data sectional to be verified in the data area of segmentation, described
It is encrypted according to the first digital signature of a upper data sectional for segmentation, obtains the second number label of the data sectional to be verified
Name;
Third determining module, the data to be verified for being stored in the signature region of the data sectional to be verified
In the case that first digital signature of segmentation is different with the second digital signature of the data sectional to be verified, determine described to school
The data content for testing data sectional is tampered;
4th determining module, if the data to be verified point of the signature region storage for the data sectional to be verified
First digital signature of section is identical with the second digital signature of the data sectional to be verified and the data sectional set in institute
State a data sectional in the presence of data sectional to be verified, then the second digital signature of the data sectional to be verified and it is described to
Verify the different situation of the first digital signature of the data sectional to be verified stored in next data sectional of data sectional
Under, determine that the data content of the data sectional to be verified is tampered.
Optionally, each data sectional in the data sectional set also includes redundancy backup region;
Described device further include:
Fragment module, for by data record storage to behind the data area of first data sectional, to the number
Fragment is carried out according to record, to obtain multiple sub-pieces of the data record;
5th determining module, for according to other numbers in the data sectional set in addition to first data sectional
According to segmentation, the hashed value of each sub-piece of the data record is determined;
5th memory module, for according to the hashed value, each sub-piece to be respectively stored into and the sub-piece
The corresponding data sectional of hashed value the redundancy backup region in, wherein the sub-piece is for restoring data note
Record.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 7 is the block diagram of a kind of electronic equipment 700 shown according to an exemplary embodiment.As shown in fig. 7, the electronics is set
Standby 700 may include: processor 701, memory 702.The electronic equipment 700 can also include multimedia component 703, input/
Export one or more of (I/O) interface 704 and communication component 705.
Wherein, processor 701 is used to control the integrated operation of the electronic equipment 700, to complete above-mentioned data storage side
All or part of the steps in method.Memory 702 is for storing various types of data to support the behaviour in the electronic equipment 700
To make, these data for example may include the instruction of any application or method for operating on the electronic equipment 700, with
And the relevant data of application program, such as contact data, the message of transmitting-receiving, picture, audio, video etc..The memory 702
It can be realized by any kind of volatibility or non-volatile memory device or their combination, such as static random-access is deposited
Reservoir (Static Random Access Memory, abbreviation SRAM), electrically erasable programmable read-only memory
(Electrically Erasable Programmable Read-Only Memory, abbreviation EEPROM), erasable programmable
Read-only memory (Erasable Programmable Read-Only Memory, abbreviation EPROM), programmable read only memory
(Programmable Read-Only Memory, abbreviation PROM), and read-only memory (Read-Only Memory, referred to as
ROM), magnetic memory, flash memory, disk or CD.Multimedia component 703 may include screen and audio component.Wherein
Screen for example can be touch screen, and audio component is used for output and/or input audio signal.For example, audio component may include
One microphone, microphone is for receiving external audio signal.The received audio signal can be further stored in storage
Device 702 is sent by communication component 705.Audio component further includes at least one loudspeaker, is used for output audio signal.I/O
Interface 704 provides interface between processor 701 and other interface modules, other above-mentioned interface modules can be keyboard, mouse,
Button etc..These buttons can be virtual push button or entity button.Communication component 705 is for the electronic equipment 700 and other
Wired or wireless communication is carried out between equipment.Wireless communication, such as Wi-Fi, bluetooth, near-field communication (Near Field
Communication, abbreviation NFC), 2G, 3G, 4G, NB-IOT, eMTC or other 5G etc. or they one or more of
Combination, it is not limited here.Therefore the corresponding communication component 705 may include: Wi-Fi module, bluetooth module, NFC mould
Block etc..
In one exemplary embodiment, electronic equipment 700 can be by one or more application specific integrated circuit
(Application Specific Integrated Circuit, abbreviation ASIC), digital signal processor (Digital
Signal Processor, abbreviation DSP), digital signal processing appts (Digital Signal Processing Device,
Abbreviation DSPD), programmable logic device (Programmable Logic Device, abbreviation PLD), field programmable gate array
(Field Programmable Gate Array, abbreviation FPGA), controller, microcontroller, microprocessor or other electronics member
Part is realized, for executing above-mentioned date storage method.
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should
The step of above-mentioned date storage method is realized when program instruction is executed by processor.For example, the computer readable storage medium
It can be the above-mentioned memory 702 including program instruction, above procedure instruction can be executed by the processor 701 of electronic equipment 700
To complete above-mentioned date storage method.
Fig. 8 is the block diagram of a kind of electronic equipment 1900 shown according to an exemplary embodiment.For example, electronic equipment 1900
It may be provided as a server.Referring to Fig. 8, electronic equipment 1900 includes processor 1922, and quantity can be one or more
A and memory 1932, for storing the computer program that can be executed by processor 1922.The meter stored in memory 1932
Calculation machine program may include it is one or more each correspond to one group of instruction module.In addition, processor 1922 can
To be configured as executing the computer program, to execute above-mentioned date storage method.
In addition, electronic equipment 1900 can also include power supply module 1926 and communication component 1950, the power supply module 1926
It can be configured as the power management for executing electronic equipment 1900, which can be configured as realization electronic equipment
1900 communication, for example, wired or wireless communication.In addition, the electronic equipment 1900 can also include that input/output (I/O) connects
Mouth 1958.Electronic equipment 1900 can be operated based on the operating system for being stored in memory 1932, such as Windows
ServerTM, Mac OS XTM, UnixTM, LinuxTM etc..
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should
The step of above-mentioned date storage method is realized when program instruction is executed by processor.For example, the computer readable storage medium
It can be the above-mentioned memory 1932 including program instruction, above procedure instruction can be held by the processor 1922 of electronic equipment 1900
Row is to complete above-mentioned date storage method.
In a further exemplary embodiment, a kind of computer program product is also provided, which includes energy
Enough computer programs executed by programmable device, which has is used for when being executed by the programmable device
Execute the code section of above-mentioned date storage method.
The preferred embodiment of the disclosure is described in detail in conjunction with attached drawing above, still, the disclosure is not limited to above-mentioned reality
The detail in mode is applied, in the range of the technology design of the disclosure, a variety of letters can be carried out to the technical solution of the disclosure
Monotropic type, these simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance
In the case where shield, it can be combined in any appropriate way.In order to avoid unnecessary repetition, the disclosure to it is various can
No further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originally
Disclosed thought equally should be considered as disclosure disclosure of that.
Claims (10)
1. a kind of date storage method, which is characterized in that the described method includes:
It, will be described in first data sectional when storage state in the data area of the first data sectional meets preset condition
First digital signature of data content and the second data sectional in data area is encrypted, and first data sectional is obtained
The first digital signature, wherein first data sectional and second data sectional belong to same data sectional set, institute
State the upper data sectional that the second data sectional is first data sectional, each data point in the data sectional set
Duan Jun includes signature region and data region, is stored with second data in the signature region of first data sectional
First digital signature of segmentation;
First digital signature of first data sectional is stored into the signature region of first data sectional;
It is completed if the data area of first data sectional stores, and the first data described in the data sectional set
A data sectional in the presence of segmentation, then by the first digital signature storage of first data sectional to next data sectional
The signature region in.
2. the method according to claim 1, wherein using next data sectional as new the first data point
Section, when the return storage state in the data area of the first data sectional meets preset condition, by first data point
First digital signature of data content and the second data sectional in the data area of section is encrypted, and obtains described first
The step of first digital signature of data sectional.
3. according to the method described in claim 2, it is characterized in that, the preset condition includes the number of first data sectional
It stores and completes according to region;The method also includes:
Instruction is sealed up for safekeeping for the data sectional set in response to receiving, and the first number of first data sectional is signed
Name storage is into the signature region of first data sectional in the data sectional set.
4. according to the method described in claim 2, it is characterized in that, the preset condition includes the number of first data sectional
According to storing a new data record in region;
The method also includes:
By the first digital signature storage of first data sectional to first data sectional in the data sectional set
The signature region in.
5. according to the method described in claim 4, it is characterized in that, first digital signature by first data sectional
It stores in the signature region of first data sectional, comprising:
If the digital signature of not stored first data sectional before in the signature region of first data sectional,
First digital signature of first data sectional is stored into the signature region of first data sectional;
If being stored with the digital signature of first data sectional before in the signature region of first data sectional,
The digital signature of the first data sectional stored before is replaced with to first digital signature of first data sectional.
6. according to the method described in claim 4, it is characterized in that, the method also includes:
It stores by first digital signature of first data sectional to first number in the data sectional set
After in the signature region of segmentation, if receiving new data record to be stored, according to first data
The identification information of segmentation determines first data sectional, and first data is arrived in the data record storage to be stored
In the data area of segmentation.
7. the method according to claim 1, wherein the method also includes:
Data in response to receiving checking command, in the data area for the data sectional to be verified that the checking command is indicated
A upper data sectional for data sectional to be verified stored in the signature region of content and the data sectional to be verified, described
First digital signature is encrypted, and the second digital signature of the data sectional to be verified is obtained;
If the first digital signature of the data sectional to be verified stored in the signature region of the data sectional to be verified and
Second digital signature of the data sectional to be verified is different, determines that the data content of the data sectional to be verified is tampered;
If the first digital signature and the institute of the data sectional to be verified of the signature region storage of the data sectional to be verified
State data sectional to be verified the second digital signature is identical and the data sectional set described in data sectional to be verified exist
Next data sectional, then in next number of the second digital signature of the data sectional to be verified and the data sectional to be verified
In the case where the first digital signature difference according to the data sectional to be verified stored in segmentation, the data to be verified are determined
The data content of segmentation is tampered.
8. a kind of data storage device, which is characterized in that described device includes:
First signature blocks will be described when meeting preset condition for the storage state in the data area of the first data sectional
First digital signature of data content and the second data sectional in the data area of the first data sectional is encrypted, and is obtained
Obtain the first digital signature of first data sectional, wherein first data sectional and second data sectional belong to
Same data sectional set, second data sectional are a upper data sectional for first data sectional, the data point
Each data sectional in Duan Jihe includes signature region and data region, the signature region of first data sectional
In be stored with the first digital signature of second data sectional;
First memory module, for storing the first digital signature of first data sectional to first data sectional
In the signature region;
Second memory module is completed if the data area for first data sectional stores, and the data sectional
A data sectional in the presence of first data sectional described in set then stores the first digital signature of first data sectional
Into the signature region of next data sectional.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The step of any one of claim 1-7 the method is realized when row.
10. a kind of electronic equipment characterized by comprising
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize described in any one of claim 1-7
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910507170.1A CN110324150B (en) | 2019-06-12 | 2019-06-12 | Data storage method and device, computer readable storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910507170.1A CN110324150B (en) | 2019-06-12 | 2019-06-12 | Data storage method and device, computer readable storage medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110324150A true CN110324150A (en) | 2019-10-11 |
CN110324150B CN110324150B (en) | 2022-03-22 |
Family
ID=68120892
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910507170.1A Active CN110324150B (en) | 2019-06-12 | 2019-06-12 | Data storage method and device, computer readable storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110324150B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090044018A1 (en) * | 2007-08-08 | 2009-02-12 | Mark Louis Kirchner | Section Inclusion and Section Order Authentication Method for Computer Electronic Documents |
US20090113136A1 (en) * | 2007-10-30 | 2009-04-30 | Sandisk Il Ltd. | Caching for structural integrity schemes |
US20150169901A1 (en) * | 2013-12-12 | 2015-06-18 | Sandisk Technologies Inc. | Method and Systems for Integrity Checking a Set of Signed Data Sections |
CN109118223A (en) * | 2018-08-21 | 2019-01-01 | 上海点融信息科技有限责任公司 | For managing the method, apparatus and medium of electronic data in block chain |
CN109194466A (en) * | 2018-10-29 | 2019-01-11 | 南开大学 | A kind of cloud data integrity detection method and system based on block chain |
CN109302495A (en) * | 2018-11-20 | 2019-02-01 | 北京邮电大学 | A kind of date storage method and device |
US20190074968A1 (en) * | 2017-09-06 | 2019-03-07 | Alibaba Group Holding Limited | Method, apparatus and system for data encryption and decryption |
-
2019
- 2019-06-12 CN CN201910507170.1A patent/CN110324150B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090044018A1 (en) * | 2007-08-08 | 2009-02-12 | Mark Louis Kirchner | Section Inclusion and Section Order Authentication Method for Computer Electronic Documents |
US20090113136A1 (en) * | 2007-10-30 | 2009-04-30 | Sandisk Il Ltd. | Caching for structural integrity schemes |
US20150169901A1 (en) * | 2013-12-12 | 2015-06-18 | Sandisk Technologies Inc. | Method and Systems for Integrity Checking a Set of Signed Data Sections |
US20190074968A1 (en) * | 2017-09-06 | 2019-03-07 | Alibaba Group Holding Limited | Method, apparatus and system for data encryption and decryption |
CN109118223A (en) * | 2018-08-21 | 2019-01-01 | 上海点融信息科技有限责任公司 | For managing the method, apparatus and medium of electronic data in block chain |
CN109194466A (en) * | 2018-10-29 | 2019-01-11 | 南开大学 | A kind of cloud data integrity detection method and system based on block chain |
CN109302495A (en) * | 2018-11-20 | 2019-02-01 | 北京邮电大学 | A kind of date storage method and device |
Non-Patent Citations (2)
Title |
---|
FILIPE APOLINÁRIO;MIGUEL PARDAL;MIGUEL CORREIA: ""S-Audit: Efficient Data Integrity Verification for Cloud Storage"", 《2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/ 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE)》 * |
翟社平等: "区块链中的隐私保护技术", 《西安邮电大学学报》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110324150B (en) | 2022-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11849023B2 (en) | Verifiable redactable audit log | |
CN105337941B (en) | A kind of device identification providing method and device | |
CN107679393B (en) | Android integrity verification method and device based on trusted execution environment | |
CN107392040A (en) | A kind of method and device for checking of knowing together | |
CN107015882A (en) | A kind of block data method of calibration and device | |
TW202036347A (en) | Method and apparatus for data storage and verification | |
CN108256354B (en) | Test data-based storage method and storage medium | |
CN109033772A (en) | A kind of input method and device of verification information | |
CN112417485A (en) | Model training method, system and device based on trusted execution environment | |
CN108090364B (en) | Method and system for positioning data leakage source | |
CN107124407B (en) | Data transmission method, device, readable storage medium storing program for executing, electronic equipment and system | |
CN109766688A (en) | A kind of Linux program run time verification based on Merkle tree and management-control method and system | |
US11934539B2 (en) | Method and apparatus for storing and processing application program information | |
CN102685121A (en) | Digital signature method and digital signature device | |
CN110324150A (en) | Date storage method, device, computer readable storage medium and electronic equipment | |
CN111008389B (en) | Data processing method and device based on file system in satellite | |
CN107545185A (en) | Android mobile terminal administration authority detection method, device, terminal and storage medium | |
CN109167785B (en) | Calling method of virtual trusted root and service server | |
CN109002710A (en) | A kind of detection method, device and computer readable storage medium | |
CN113378195A (en) | Method, apparatus, medium, and program product for encrypted communication | |
CN107239712A (en) | The hidden method and device of user profile based on application program | |
CN112016336A (en) | Method, device, equipment and storage medium for detecting copy card | |
CN110995447A (en) | Data storage method, device, equipment and medium | |
CN110321384A (en) | A kind of data record method based on block chain, device and electronic equipment | |
CN110263585B (en) | Test supervision method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |