CN110737925A - storage system hard disk protection method and device - Google Patents

storage system hard disk protection method and device Download PDF

Info

Publication number
CN110737925A
CN110737925A CN201910819282.0A CN201910819282A CN110737925A CN 110737925 A CN110737925 A CN 110737925A CN 201910819282 A CN201910819282 A CN 201910819282A CN 110737925 A CN110737925 A CN 110737925A
Authority
CN
China
Prior art keywords
hard disk
identification information
storage system
local
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910819282.0A
Other languages
Chinese (zh)
Inventor
葛宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Wave Intelligent Technology Co Ltd
Original Assignee
Suzhou Wave Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Wave Intelligent Technology Co Ltd filed Critical Suzhou Wave Intelligent Technology Co Ltd
Priority to CN201910819282.0A priority Critical patent/CN110737925A/en
Publication of CN110737925A publication Critical patent/CN110737925A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention provides storage system hard disk protection methods and devices, which include the following steps of S1, before a storage system product leaves a factory, logging in a storage system by a legal user, analyzing a configuration file, obtaining a product model, S2, obtaining a hard disk identifier of a hard disk to be protected, generating identifier information according to the hard disk identifier and the product model, writing the identifier information into the hard disk to be protected, S3, when the storage system is started, automatically reading the identifier information preset in the hard disk, S4, obtaining a local product model and the hard disk identifier, generating local identifier information according to the local product model and the hard disk identifier, S5, comparing the identifier information preset in the hard disk with the local identifier information, judging whether is the result, if the result is the hard disk is normally used, if not the result is the result, reporting an alarm, and prompting that the user hard disk is not matched, wherein the device comprises a product management module, an identifier writing module, an identifier recognition module and.

Description

storage system hard disk protection method and device
Technical Field
The invention belongs to the technical field of storage product hard disk protection, and particularly relates to storage system hard disk protection methods and devices.
Background
The current new -generation information technology represented by cloud computing, big data and artificial intelligence is different day by day, and the rapid development of the internet, the mobile terminal and the internet of things leads to the explosive growth of information data of enterprise customers, and the demand on a storage system is increased day by day.
The -level storage product is cheap and has relatively high cost performance compared with the middle and high-end storage product, wherein the price of the carried hard disk is lower under the condition of the same capacity, but the hard disk of the middle and high-end storage product is more excellent in reliability and performance and is matched with the overall functional characteristics and indexes of the product.
This is a disadvantage of the prior art, and therefore, it is very necessary to provide methods and apparatuses for protecting hard disks of storage systems in order to overcome the above-mentioned disadvantages of the prior art.
Disclosure of Invention
Aiming at the defects that in the prior art, the hard disks of different storage system products are mixed to cause the reduction of reliability and performance, further the reduction of the overall index of the product and the reduction of the safety of user data, the invention provides storage system hard disk protection methods and devices to solve the technical problems.
, the invention provides storage system hard disk protection methods, including the following steps:
s1, before a storage system product leaves a factory, a legal user logs in the storage system, a configuration file is analyzed, and a product model is obtained;
s2, acquiring a hard disk identifier of the hard disk to be protected, generating identification information according to the hard disk identifier and the product model, and writing the identification information into the hard disk to be protected;
s3, when the storage system is started, automatically reading the preset identification information in the hard disk;
s4, obtaining the model of the local product and the hard disk identification, and generating local identification information according to the model of the local product and the hard disk identification;
s5, comparing preset identification information in the hard disk with local identification information, and judging whether is satisfied;
if result, the hard disk is normally used;
if not , an alarm is reported to prompt the user that the hard disks are not matched.
Step , step S1 preferably includes step S1a. setting a valid user, specifically including:
S1A1, presetting a default super user for a storage system, and setting a new administrator user authority for the super user;
S1A2, setting the super user and the administrator user as legal users, and setting the authority of the legal users to log in the storage system. And the safety of the identification information is ensured through user management.
, the configuration file in step S1 includes the product model, the hard disk type and the number.
, in step S2, generating identification information according to the hard disk identification and the product model, specifically including:
the method comprises the steps of connecting character strings of product models and hard disk identifications in series; and the hard disk identification adopts a hard disk SN code.
, before writing the identification information into the hard disk to be protected, encrypting the identification information to generate an identification information ciphertext, and writing the identification information ciphertext into the hard disk to be protected in step S2;
in step S3, when the storage system is started, the identification information ciphertext preset in the hard disk is automatically read out, and the original identification information is obtained after the identification information ciphertext is decrypted. And the identification information is encrypted by adopting an encryption algorithm, so that the identification information is prevented from being known and forged by a third party.
, in step S2, performing hash operation on the identification information to generate an identification information hash digest, and encrypting the identification information hash digest to generate an identification information ciphertext;
in step S3, when the storage system is started, automatically reading an identification information ciphertext preset in the hard disk, decrypting the identification information ciphertext, and obtaining an original identification information hash digest;
in step S4, after the local identification information is acquired, performing hash operation on the local identification information to generate a local identification information hash digest;
in step S5, the original identification information hash digest preset in the hard disk is compared with the local identification information hash digest to determine whether is satisfied.
, encrypting and decrypting by RSA asymmetric key algorithm, wherein the public key and the private key are stored and imported by using digital certificate;
in step S2, before writing the identification information into the hard disk to be protected, encrypting the identification information by a private key to generate an identification information ciphertext, and then writing the identification information ciphertext into the hard disk to be protected;
in step S3, when the storage system is started, the identification information ciphertext preset in the hard disk is automatically read out, and the original identification information is obtained after the identification information ciphertext is decrypted by the public key. And the RSA asymmetric key algorithm is adopted to realize the protection of the key.
In a second aspect, the present invention provides kinds of hard disk protection devices for storage system, which comprises
The product management module is used for verifying and analyzing the configuration file to obtain the product model after a legal user logs in the storage system before the storage system products leave a factory;
the identification writing module is used for acquiring a hard disk identification of the hard disk to be protected, generating identification information according to the hard disk identification and the product model, and writing the identification information into the hard disk to be protected;
the identification recognition module is used for automatically reading the preset identification information in the hard disk when the storage system is started, acquiring the model of the local product and the identification of the hard disk, generating local identification information according to the model of the local product and the identification of the hard disk, comparing the preset identification information in the hard disk with the local identification information and judging whether the result is ;
and the alarm reporting module is used for reporting an alarm to prompt the user that the hard disk is not matched when the preset identification information is not the local identification information.
, it also includes user management module and key management module;
the user management module is used for presetting a default super user for the storage system and setting a new administrator user authority for the super user; the system is also used for setting the super user and the administrator user as legal users and setting the authority of the legal users to log in the storage system; and also for modifying supervisor and administrator user passwords;
the key management module is used for importing a key certificate used by an encryption algorithm, verifying and storing the key and sending the key to the identifier writing module;
the identification writing module is used for acquiring a hard disk identification of the hard disk to be protected, generating identification information according to the hard disk identification and the product model, carrying out hash operation on the identification information to generate an identification information hash abstract, encrypting the identification information hash abstract to generate an identification information ciphertext, and writing the identification information ciphertext into the hard disk to be protected;
the identification recognition module is used for automatically reading an identification information ciphertext preset in the hard disk when the storage system is started, decrypting the identification information ciphertext to obtain an identification information hash abstract, obtaining a local product model and a hard disk identification, generating local identification information according to the local product model and the hard disk identification, performing hash operation on the local identification information to generate a local identification information hash abstract, comparing the identification information hash abstract preset in the hard disk with the local identification information hash abstract, and judging whether the identification information is -caused or not.
further comprises
And the hard disk management module is used for calling the identification module when the storage system is started or a hard disk is newly installed, and identifying the product model relevance of the hard disk.
The user management module, the key management module, the product management module and the identifier writing module can be deployed on a server and used for protecting a hard disk before product delivery; the identification module, the alarm reporting module and the hard disk management module can be arranged in a storage system and used for identifying the hard disk when a product is installed and used.
The beneficial effect of the invention is that,
the method and the device for protecting the hard disk of the storage system, provided by the invention, can realize the matching of the hard disk and the product model by presetting the identification information associated with the product model in the hard disk and carrying out identification and recognition, and can effectively prevent the reduction of the overall performance and the reliability index of the product caused by the mixed use of different grades of storage product hard disks by user maintainers, thereby protecting the data safety of users.
Therefore, compared with the prior art, the invention has prominent substantive features and remarkable progress, and the beneficial effects of the implementation are also obvious.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a schematic flow chart of the method of the present invention;
FIG. 2 is a second schematic flow chart of the method of the present invention;
FIG. 3 is a schematic view of the apparatus of the present invention;
in the figure, 1-product management module; 2-identify write module; 3-an identification recognition module; 4-alarm reporting module; 5-a user management module; 6-key management module; 7-hard disk management module.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a partial embodiment of of the present invention, rather than a whole embodiment.
Example 1:
as shown in fig. 1, the present invention provides storage system hard disk protection methods, which include the following steps:
s1, before a storage system product leaves a factory, a legal user logs in the storage system, a configuration file is analyzed, and a product model is obtained; the configuration file comprises a product model, a hard disk type and the number;
s2, acquiring a hard disk identifier of the hard disk to be protected, generating identification information according to the hard disk identifier and the product model, and writing the identification information into the hard disk to be protected; the character strings of the product model and the hard disk identification are connected in series to form representation information; the hard disk identification adopts a hard disk SN code;
s3, when the storage system is started, automatically reading the preset identification information in the hard disk;
s4, obtaining the model of the local product and the hard disk identification, and generating local identification information according to the model of the local product and the hard disk identification;
s5, comparing preset identification information in the hard disk with local identification information, and judging whether is satisfied;
if result, the hard disk is normally used;
if not , an alarm is reported to prompt the user that the hard disks are not matched.
Example 2:
as shown in fig. 2, the present invention provides storage system hard disk protection methods, which include the following steps:
step S1A, setting a legal user, specifically comprising:
S1A1, presetting a default super user for a storage system, and setting a new administrator user authority for the super user;
S1A2, setting a super user and an administrator user as legal users, and setting the authority of the legal users to log in a storage system;
s1, before a storage system product leaves a factory, a legal user logs in the storage system, a configuration file is analyzed, and a product model is obtained;
s2, acquiring a hard disk identifier of a hard disk to be protected, generating identifier information according to the hard disk identifier and the product model, carrying out Hash operation on the identifier information to generate an identifier information Hash abstract, encrypting the identifier information Hash abstract to generate an identifier information ciphertext, and writing the identifier information ciphertext into the hard disk to be protected;
s3, when the storage system is started, automatically reading an identification information ciphertext preset in the hard disk, decrypting the identification information ciphertext and acquiring an original identification information hash abstract;
s4, obtaining the model of the local product and the hard disk identification, generating local identification information according to the model of the local product and the hard disk identification, and performing hash operation on the local identification information to generate a hash abstract of the local identification information;
s5, comparing the original identification information hash abstract preset in the hard disk with the local identification information hash abstract, and judging whether the result is ;
if result, the hard disk is normally used;
if not , an alarm is reported to prompt the user that the hard disks are not matched.
In the above embodiment 2, the RSA asymmetric key algorithm is used for encryption and decryption; the public key and the private key are stored and imported by using a digital certificate;
in step S2, before writing the identification information into the hard disk to be protected, encrypting the identification information by a private key to generate an identification information ciphertext, and then writing the identification information ciphertext into the hard disk to be protected;
in step S3, when the storage system is started, the identification information ciphertext preset in the hard disk is automatically read out, and the original identification information is obtained after the identification information ciphertext is decrypted by the public key.
Example 3:
as shown in FIG. 3, the present invention provides kinds of hard disk protection devices for storage system, which comprises
The product management module 1 is used for verifying and analyzing the configuration file to obtain the product model after a legal user logs in the storage system before the storage system products leave a factory;
the identification writing module 2 is used for acquiring a hard disk identification of the hard disk to be protected, generating identification information according to the hard disk identification and the product model, performing hash operation on the identification information to generate an identification information hash abstract, encrypting the identification information hash abstract to generate an identification information ciphertext, and writing the identification information ciphertext into the hard disk to be protected;
the identification recognition module 3 is used for automatically reading an identification information ciphertext preset in the hard disk when the storage system is started, decrypting the identification information ciphertext to obtain an identification information hash abstract, obtaining a local product model and a hard disk identification, generating local identification information according to the local product model and the hard disk identification, performing hash operation on the local identification information to generate a local identification information hash abstract, comparing the identification information hash abstract preset in the hard disk with the local identification information hash abstract, and judging whether the identification information hash abstract is ;
the alarm reporting module 4 is used for reporting an alarm to prompt the hard disk of the user to be unmatched when the preset identification information is not with the local identification information;
the user management module 5 is used for presetting a default super user for the storage system and setting a new administrator user authority for the super user; the system is also used for setting the super user and the administrator user as legal users and setting the authority of the legal users to log in the storage system; and also for modifying supervisor and administrator user passwords;
the key management module 6 is used for importing a key certificate used by an encryption algorithm, verifying and storing the key, and sending the key to the identifier writing module 2;
and the hard disk management module 7 is used for calling the identification module when the storage system is started or a hard disk is newly installed, and performing product model relevance identification on the hard disk.
Although the present invention has been described in detail by referring to the drawings in connection with the preferred embodiments, the present invention is not limited thereto. Various equivalent modifications or substitutions can be made on the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications or substitutions are within the scope of the present invention/any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1, storage system hard disk protection method, characterized by that, including the following steps:
s1, before a storage system product leaves a factory, a legal user logs in the storage system, a configuration file is analyzed, and a product model is obtained;
s2, acquiring a hard disk identifier of the hard disk to be protected, generating identification information according to the hard disk identifier and the product model, and writing the identification information into the hard disk to be protected;
s3, when the storage system is started, automatically reading the preset identification information in the hard disk;
s4, obtaining the model of the local product and the hard disk identification, and generating local identification information according to the model of the local product and the hard disk identification;
s5, comparing preset identification information in the hard disk with local identification information, and judging whether is satisfied;
if result, the hard disk is normally used;
if not , an alarm is reported to prompt the user that the hard disks are not matched.
2. The method for protecting a hard disk of a storage system according to claim 1, wherein step S1 is preceded by step S1a. setting a valid user, specifically comprising:
S1A1, presetting a default super user for a storage system, and setting a new administrator user authority for the super user;
S1A2, setting the super user and the administrator user as legal users, and setting the authority of the legal users to log in the storage system.
3. The method for protecting a hard disk of a storage system according to claim 1, wherein the configuration file in step S1 includes a product model, a hard disk type and a number.
4. The method for protecting a hard disk of a storage system according to claim 1, wherein in step S2, generating identification information according to the hard disk identification and the product model number specifically comprises:
the method comprises the steps of connecting character strings of product models and hard disk identifications in series; and the hard disk identification adopts a hard disk SN code.
5. The method of claim 1, wherein the hard disk protection of the storage system,
in step S2, before writing the identification information into the hard disk to be protected, encrypting the identification information to generate an identification information ciphertext, and then writing the identification information ciphertext into the hard disk to be protected;
in step S3, when the storage system is started, the identification information ciphertext preset in the hard disk is automatically read out, and the original identification information is obtained after the identification information ciphertext is decrypted.
6. The method of claim 5, wherein the hard disk protection of the storage system,
step S2, performing hash operation on the identification information to generate an identification information hash digest, and encrypting the identification information hash digest to generate an identification information ciphertext;
in step S3, when the storage system is started, automatically reading an identification information ciphertext preset in the hard disk, decrypting the identification information ciphertext, and obtaining an original identification information hash digest;
in step S4, after the local identification information is acquired, performing hash operation on the local identification information to generate a local identification information hash digest;
in step S5, the original identification information hash digest preset in the hard disk is compared with the local identification information hash digest, and it is determined whether matches the local identification information hash digest.
7. The method of claim 5, wherein the hard disk protection of the storage system,
encrypting and decrypting by adopting an RSA asymmetric key algorithm; the public key and the private key are stored and imported by using a digital certificate;
in step S2, before writing the identification information into the hard disk to be protected, encrypting the identification information by a private key to generate an identification information ciphertext, and then writing the identification information ciphertext into the hard disk to be protected;
in step S3, when the storage system is started, the identification information ciphertext preset in the hard disk is automatically read out, and the original identification information is obtained after the identification information ciphertext is decrypted by the public key.
8, protection device for hard disk of storage system, comprising
The product management module (1) is used for verifying and analyzing the configuration file to obtain the product model after a legal user logs in the storage system before the storage system products leave a factory;
the identification writing module (2) is used for acquiring a hard disk identification of the hard disk to be protected, generating identification information according to the hard disk identification and the product model, and writing the identification information into the hard disk to be protected;
the identification recognition module (3) is used for automatically reading the preset identification information in the hard disk when the storage system is started, acquiring the model of the local product and the identification of the hard disk, generating local identification information according to the model of the local product and the identification of the hard disk, comparing the preset identification information in the hard disk with the local identification information and judging whether the result is ;
and the alarm reporting module (4) is used for reporting an alarm to prompt the user that the hard disk is not matched when the preset identification information and the local identification information are not .
9. The storage system hard disk protection device according to claim 8, further comprising a user management module (5) and a key management module (6);
the user management module (5) is used for presetting a default super user for the storage system and setting a new administrator user authority for the super user; the system is also used for setting the super user and the administrator user as legal users and setting the authority of the legal users to log in the storage system; and also for modifying supervisor and administrator user passwords;
the key management module (6) is used for importing a key certificate used by an encryption algorithm, verifying and storing the key, and sending the key to the identifier writing module (2);
the identification writing module (2) is used for acquiring a hard disk identification of the hard disk to be protected, generating identification information according to the hard disk identification and the product model, carrying out hash operation on the identification information to generate an identification information hash abstract, encrypting the identification information hash abstract to generate an identification information ciphertext, and writing the identification information ciphertext into the hard disk to be protected;
the identification recognition module (3) is used for automatically reading an identification information ciphertext preset in the hard disk when the storage system is started, decrypting the identification information ciphertext to obtain an identification information hash abstract, obtaining a local product model and a hard disk identification, generating local identification information according to the local product model and the hard disk identification, performing hash operation on the local identification information to generate a local identification information hash abstract, and comparing the identification information hash abstract preset in the hard disk with the local identification information hash abstract to judge whether the identification information hash abstract is .
10. The storage system hard disk protection device of claim 8, further comprising
And the hard disk management module (7) is used for calling the identification module when the storage system is started or a hard disk is newly installed, and identifying the product model relevance of the hard disk.
CN201910819282.0A 2019-08-31 2019-08-31 storage system hard disk protection method and device Pending CN110737925A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910819282.0A CN110737925A (en) 2019-08-31 2019-08-31 storage system hard disk protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910819282.0A CN110737925A (en) 2019-08-31 2019-08-31 storage system hard disk protection method and device

Publications (1)

Publication Number Publication Date
CN110737925A true CN110737925A (en) 2020-01-31

Family

ID=69267426

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910819282.0A Pending CN110737925A (en) 2019-08-31 2019-08-31 storage system hard disk protection method and device

Country Status (1)

Country Link
CN (1) CN110737925A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114465805A (en) * 2022-02-18 2022-05-10 深圳市优博讯科技股份有限公司 Active identification control method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1641610A (en) * 2004-01-08 2005-07-20 英业达股份有限公司 Hard disk replacement control and management method for network storage system
KR100618386B1 (en) * 2004-10-18 2006-08-31 삼성전자주식회사 Image display apparatus for restricting hard disk drive's use and hard disk drive's use restricting method thereof
CN105245337A (en) * 2015-10-30 2016-01-13 南京未来网络产业创新有限公司 Improved file encryption and decryption method
CN109582238A (en) * 2018-12-03 2019-04-05 郑州云海信息技术有限公司 A kind of hard disk binding, matching process, system and electronic equipment and storage medium
CN109582514A (en) * 2018-12-03 2019-04-05 郑州云海信息技术有限公司 A kind of hard disk screening technique, device, equipment and readable storage medium storing program for executing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1641610A (en) * 2004-01-08 2005-07-20 英业达股份有限公司 Hard disk replacement control and management method for network storage system
KR100618386B1 (en) * 2004-10-18 2006-08-31 삼성전자주식회사 Image display apparatus for restricting hard disk drive's use and hard disk drive's use restricting method thereof
CN105245337A (en) * 2015-10-30 2016-01-13 南京未来网络产业创新有限公司 Improved file encryption and decryption method
CN109582238A (en) * 2018-12-03 2019-04-05 郑州云海信息技术有限公司 A kind of hard disk binding, matching process, system and electronic equipment and storage medium
CN109582514A (en) * 2018-12-03 2019-04-05 郑州云海信息技术有限公司 A kind of hard disk screening technique, device, equipment and readable storage medium storing program for executing

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114465805A (en) * 2022-02-18 2022-05-10 深圳市优博讯科技股份有限公司 Active identification control method and system

Similar Documents

Publication Publication Date Title
US9998441B2 (en) Client authentication using social relationship data
AU2019203153A1 (en) Key export techniques
CN110798315B (en) Data processing method and device based on block chain and terminal
CN107220559B (en) Encryption storage method for non-tamperable file
CN110162936A (en) A kind of use authorization method of software content
CN109522328B (en) Data processing method and device, medium and terminal thereof
US11329817B2 (en) Protecting data using controlled corruption in computer networks
WO2019233951A1 (en) A software application and a computer server for authenticating the identity of a digital content creator and the integrity of the creator's published content
CN112329042A (en) Big data secure storage system and method
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN110737925A (en) storage system hard disk protection method and device
CN110493011B (en) Block chain-based certificate issuing management method and device
CN111600701A (en) Private key storage method and device based on block chain and storage medium
CN113726515B (en) UKEY-based key processing method, storage medium and electronic device
CN108171078B (en) Data preservation method and device of cloud platform evaluation system facing third party
CN115514470A (en) Storage method and system for community correction data security
CN113868699A (en) UKey-based personal information protection method and system
TWI656454B (en) Method and system for preventing password file leakage detection
CN116830181A (en) Service providing system
US11522691B2 (en) Techniques for virtual cryptographic key ceremonies
CN114640527B (en) Real estate registration service network security risk identification method and system based on log audit
CN108881220B (en) Exchange server-based data encryption authenticity verification method and system
CN117034213B (en) Method for encryption protection of NFT (network File transfer) of digital work
CN116647413B (en) Application login method, device, computer equipment and storage medium
CN109660348B (en) Password recording system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200131

RJ01 Rejection of invention patent application after publication