CN113742754A - Fixed value file encryption method and related device - Google Patents
Fixed value file encryption method and related device Download PDFInfo
- Publication number
- CN113742754A CN113742754A CN202111081739.6A CN202111081739A CN113742754A CN 113742754 A CN113742754 A CN 113742754A CN 202111081739 A CN202111081739 A CN 202111081739A CN 113742754 A CN113742754 A CN 113742754A
- Authority
- CN
- China
- Prior art keywords
- file
- value file
- target
- hash
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000004364 calculation method Methods 0.000 claims abstract description 24
- 230000004048 modification Effects 0.000 claims description 16
- 238000012986 modification Methods 0.000 claims description 16
- 230000008569 process Effects 0.000 abstract description 10
- 238000013500 data storage Methods 0.000 abstract description 4
- 238000012545 processing Methods 0.000 abstract description 4
- 230000006870 function Effects 0.000 description 7
- 230000006399 behavior Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a method for encrypting a constant value file and a related device, wherein the method comprises the following steps: performing first hash calculation on the current fixed value file through a SM3 algorithm to obtain a first hash value; performing second hash calculation on the current constant value file through an SHA256 algorithm to obtain a second hash value; and generating a target encryption fixed value file according to the first hash value, the second hash value and the current fixed value file. No matter the calling or the storage of the file is to operate the encrypted constant value file, decryption processing is needed, the safety of the constant value file is improved, and the reliability of the storage calling operation process is also improved. The method and the device solve the technical problem that the behavior judgment of the device is influenced because the data potential safety hazard is easily caused in the frequent data storage and calling processes in the conventional relay protection device.
Description
Technical Field
The application relates to the technical field of information encryption, in particular to a constant value file encryption method and a related device.
Background
In the relay protection device, programs and data volume are huge, and a lot of data are stored in a flash in a file form and are called into a memory when needed. In the engineering use process of the relay protection device, a large number of files such as fixed values, events, logs and the like need to be recorded, and frequent file operations and situations that a power supply is abnormal may occur on site all cause hidden dangers to the stable operation of a file system and affect the safe and stable operation of the device.
Disclosure of Invention
The application provides a definite value file encryption method and a related device, which are used for solving the technical problem that the behavior judgment of the device is influenced because the data potential safety hazard is easily caused in the frequent data storage and calling processes in the conventional relay protection device.
In view of the above, a first aspect of the present application provides a method for encrypting a fixed-value file, including:
performing first hash calculation on the current fixed value file through a SM3 algorithm to obtain a first hash value;
performing second hash calculation on the current definite value file through an SHA256 algorithm to obtain a second hash value;
and generating a target encryption fixed value file according to the first hash value, the second hash value and the current fixed value file.
Optionally, the generating a target encrypted constant value file according to the first hash value, the second hash value and the current constant value file further includes:
and judging whether a target constant value file exists, if so, covering the target constant value file with a target encryption constant value file, and if not, storing the target encryption constant value file as the target constant value file.
Optionally, the generating a target encrypted constant value file according to the first hash value, the second hash value and the current constant value file further includes:
recording the current serial number, the latest modification time and the record check code of the adjacent file in the target encryption constant value file;
and tracing and analyzing the accident file according to the current sequence number, the latest modification time and the record check code of the adjacent file.
Optionally, the generating a target encrypted constant value file according to the first hash value, the second hash value and the current constant value file further includes:
and when the current constant value file is read, performing self-checking operation on the target encrypted file, and allowing the reading operation if the checking is passed.
A second aspect of the present application provides a fixed-value file encryption apparatus, including:
the first calculation module is used for performing first hash calculation on the current fixed value file through the SM3 algorithm to obtain a first hash value;
the second calculation module is used for performing second hash calculation on the current definite value file through an SHA256 algorithm to obtain a second hash value;
and the file encryption module is used for generating a target encrypted constant value file according to the first hash value, the second hash value and the current constant value file.
Optionally, the method further includes:
and the storage judging module is used for judging whether a target constant value file exists or not, if so, covering the target constant value file by adopting a target encryption constant value file, and if not, storing the target encryption constant value file as the target constant value file.
Optionally, the method further includes:
the information recording module is used for recording the current serial number, the latest modification time and the recording check code of the adjacent file in the target encryption constant value file;
and the accident tracing module is used for tracing and analyzing the accident file according to the current sequence number, the latest modification time and the record check code of the adjacent file.
Optionally, the method further includes:
and the reading and checking module is used for performing self-checking operation on the target encrypted file when the current fixed-value file is read, and allowing the reading operation if the checking is passed.
A third aspect of the present application provides a fixed-value file encryption device, the device comprising a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the fixed-value file encryption method according to the first aspect according to instructions in the program code.
A fourth aspect of the present application provides a computer-readable storage medium for storing program code for executing the method for encrypting a fixed-value file according to the first aspect.
According to the technical scheme, the embodiment of the application has the following advantages:
the application provides a fixed value file encryption method, which comprises the following steps: performing first hash calculation on the current fixed value file through a SM3 algorithm to obtain a first hash value; performing second hash calculation on the current definite value file through an SHA256 algorithm to obtain a second hash value; and generating a target encryption fixed value file according to the first hash value, the second hash value and the current fixed value file.
According to the constant value file encryption method, the SM3 algorithm and the SHA256 algorithm are adopted to encrypt and calculate the same current constant value file respectively to obtain different hash values, the two hash values and the current constant value file are combined to generate a target encrypted constant value file, the encrypted constant value file is required to be decrypted no matter whether the file is called or stored, the safety of the constant value file is improved, and the reliability of the storage calling operation process is improved. Therefore, the method and the device can solve the technical problem that the behavior judgment of the device is influenced because the data potential safety hazard is easily caused in the frequent data storage and calling process in the conventional relay protection device.
Drawings
Fig. 1 is a schematic flowchart of a method for encrypting a constant value file according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an encryption apparatus for a constant value file according to an embodiment of the present disclosure;
fig. 3 is a schematic diagram of a storage structure of a constant value file stream according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
For easy understanding, please refer to fig. 1, an embodiment of a method for encrypting a constant value file provided in the present application includes:
The SM3 cryptographic algorithm is a cryptographic hash function standard, and is mainly used for digital signature and verification, message authentication code generation and verification, random number generation and the like in a commercial cryptosystem. The password hash function is a one-way function, namely, input data is difficult to reversely deduce from the result output by the hash function; the input data of such a hash function is called a message, and the output result calculated via the hash function is called a message digest.
The hash value is represented by a short string of random letters and numbers; in this embodiment, a national secret SM3 algorithm is used to perform a first hash calculation on a current fixed-value file to obtain a 32-byte first hash value corresponding to the fixed-value file; namely a 32-byte message digest obtained after encryption by using the cryptographic SM3 algorithm.
And 102, carrying out second hash calculation on the current constant value file through an SHA256 algorithm to obtain a second hash value.
The hash value used by the SHA256 algorithm has a length of 256 bits, that is, the length of the message digest calculated by the algorithm is 256 bits; it is also a hash function, or hash algorithm; it can compress the message or data into summary, so that the data volume becomes smaller, and the format of the data is fixed. Preprocessing in the SHA256 algorithm is to supplement the hash message with the required information so that the entire message satisfies the specified structure.
In this embodiment, a SHA256 algorithm is used to perform a second hash calculation on the current fixed-value file to obtain a corresponding 32-byte second hash value, that is, a 32-byte message digest obtained by using the SHA256 algorithm.
And 103, generating a target encryption fixed value file according to the first hash value, the second hash value and the current fixed value file.
Fusing and storing the first hash value, the second hash value and the current fixed value file as a target encryption fixed value file; thus, each time the constant value file is called and modified, the decryption operation is required.
Further, step 103, thereafter, further includes:
and judging whether the target constant value file exists, if so, covering the target constant value file with the target encryption constant value file, and if not, storing the target encryption constant value file as the target constant value file.
The storage process of the target constant value file is not directly determined by the target encryption constant value file, but is firstly used as an intermediate file to carry out judgment operation; if the file already exists, the newly generated intermediate file is required to cover the originally stored target fixed value file, namely, the original file is deleted; if the target encryption constant value file does not exist, the target encryption constant value file is directly named and stored.
Further, step 103 further includes:
recording the current serial number, the latest modification time and the record check code of the adjacent file in the target encryption constant value file;
and tracing and analyzing the accident file according to the current sequence number, the latest modification time and the record check code of the adjacent file.
After the current constant value file is encrypted, the record check code of the previous adjacent file is saved, and the sequence number and the latest modification time of the current constant value file, namely the current modification time, are also recorded. The current sequence number of the record, the latest modification time and the record check code of the adjacent file can be used for tracing the calling, encryption or storage process under the condition that the file has an accident, and analyzing the accident reason. Please refer to fig. 3 for a specific structure.
Further, step 103, thereafter, further includes:
when the current fixed value file is read, self-checking operation is carried out on the target encrypted file, and if the check is passed, the reading operation is allowed.
The encrypted constant value file needs to be subjected to self-checking comparison operation when a request is read, if the decrypted constant value file is consistent with a preset file, the check is passed, otherwise, the check is not passed, and an alarm prompt or an error response can be directly given or returned.
According to the encryption method for the fixed value file, the SM3 algorithm and the SHA256 algorithm are adopted to perform encryption calculation processing on the same current fixed value file respectively to obtain different hash values, the two hash values and the current fixed value file are combined to generate a target encrypted fixed value file, decryption processing is needed no matter whether the file is called or stored to operate the encrypted fixed value file, the safety of the fixed value file is improved, and the reliability of the storage calling operation process is improved. Therefore, the technical problem that the behavior judgment of the device is influenced due to the fact that data potential safety hazards are easily caused in the frequent data storage and calling processes in the conventional relay protection device can be solved.
For ease of understanding, referring to fig. 2, the present application provides an embodiment of a constant value file encryption apparatus, comprising:
the first calculation module 201 is configured to perform a first hash calculation on the current fixed-value file through a public key SM3 algorithm to obtain a first hash value;
the second calculating module 202 is configured to perform a second hash calculation on the current fixed-value file through the SHA256 algorithm to obtain a second hash value;
and the file encryption module 203 is used for generating a target encrypted constant value file according to the first hash value, the second hash value and the current constant value file.
Further, still include:
and the storage judging module 204 is configured to judge whether the target constant value file exists, if so, cover the target constant value file with the target encryption constant value file, and if not, store the target encryption constant value file as the target constant value file.
Further, still include:
an information recording module 205, configured to record a current sequence number, a latest modification time, and a record check code of an adjacent file in the target encrypted constant value file;
and the accident tracing module 206 is configured to trace and analyze the accident file according to the current sequence number, the latest modification time, and the record check code of the adjacent file.
Further, still include:
and the reading and checking module 207 is used for performing self-checking operation on the target encrypted file when the current fixed-value file is read, and allowing the reading operation if the checking is passed.
The application also provides a fixed value file encryption device, which comprises a processor and a memory;
the memory is used for storing the program codes and transmitting the program codes to the processor;
the processor is used for executing the fixed value file encryption method in the method embodiment according to the instructions in the program codes.
The present application also provides a computer-readable storage medium for storing program code for executing the method for encrypting a constant value file in the above method embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for executing all or part of the steps of the method described in the embodiments of the present application through a computer device (which may be a personal computer, a server, or a network device). And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.
Claims (10)
1. A method for encrypting a constant value file, comprising:
performing first hash calculation on the current fixed value file through a SM3 algorithm to obtain a first hash value;
performing second hash calculation on the current definite value file through an SHA256 algorithm to obtain a second hash value;
and generating a target encryption fixed value file according to the first hash value, the second hash value and the current fixed value file.
2. The method of claim 1, wherein generating a target encrypted fixed value file from the first hash value, the second hash value, and the current fixed value file further comprises:
and judging whether a target constant value file exists, if so, covering the target constant value file with a target encryption constant value file, and if not, storing the target encryption constant value file as the target constant value file.
3. The method of claim 1, wherein generating a target encrypted fixed value file from the first hash value, the second hash value, and the current fixed value file, further comprises:
recording the current serial number, the latest modification time and the record check code of the adjacent file in the target encryption constant value file;
and tracing and analyzing the accident file according to the current sequence number, the latest modification time and the record check code of the adjacent file.
4. The method of claim 1, wherein generating a target encrypted fixed value file from the first hash value, the second hash value, and the current fixed value file further comprises:
and when the current constant value file is read, performing self-checking operation on the target encrypted file, and allowing the reading operation if the checking is passed.
5. A constant value file encryption apparatus, comprising:
the first calculation module is used for performing first hash calculation on the current fixed value file through the SM3 algorithm to obtain a first hash value;
the second calculation module is used for performing second hash calculation on the current definite value file through an SHA256 algorithm to obtain a second hash value;
and the file encryption module is used for generating a target encrypted constant value file according to the first hash value, the second hash value and the current constant value file.
6. The constant-value file encryption device according to claim 5, further comprising:
and the storage judging module is used for judging whether a target constant value file exists or not, if so, covering the target constant value file by adopting a target encryption constant value file, and if not, storing the target encryption constant value file as the target constant value file.
7. The constant-value file encryption device according to claim 5, further comprising:
the information recording module is used for recording the current serial number, the latest modification time and the recording check code of the adjacent file in the target encryption constant value file;
and the accident tracing module is used for tracing and analyzing the accident file according to the current sequence number, the latest modification time and the record check code of the adjacent file.
8. The constant-value file encryption device according to claim 5, further comprising:
and the reading and checking module is used for performing self-checking operation on the target encrypted file when the current fixed-value file is read, and allowing the reading operation if the checking is passed.
9. A constant value file encryption device, comprising a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the method of encrypting a fixed-value file according to any one of claims 1 to 4 according to instructions in the program code.
10. A computer-readable storage medium for storing program code for executing the method for encrypting a fixed-value file according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111081739.6A CN113742754A (en) | 2021-09-15 | 2021-09-15 | Fixed value file encryption method and related device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111081739.6A CN113742754A (en) | 2021-09-15 | 2021-09-15 | Fixed value file encryption method and related device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113742754A true CN113742754A (en) | 2021-12-03 |
Family
ID=78739057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111081739.6A Pending CN113742754A (en) | 2021-09-15 | 2021-09-15 | Fixed value file encryption method and related device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113742754A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102364511A (en) * | 2011-10-09 | 2012-02-29 | 南京航天银山电气有限公司 | Constant value correcting method and device of failure information main station, and power system device |
CN103177222A (en) * | 2011-12-23 | 2013-06-26 | 腾讯科技(深圳)有限公司 | Processing method for file shell adding and shell removing and device thereof |
CN111052120A (en) * | 2017-08-24 | 2020-04-21 | 甲骨文国际公司 | Digital asset traceability and assurance using distributed ledgers |
CN111125781A (en) * | 2019-12-24 | 2020-05-08 | 腾讯科技(深圳)有限公司 | File signature method and device and file signature verification method and device |
CN112734361A (en) * | 2020-12-29 | 2021-04-30 | 卡乐电子(苏州)有限责任公司 | Distributed cooperative office data processing method and system |
-
2021
- 2021-09-15 CN CN202111081739.6A patent/CN113742754A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102364511A (en) * | 2011-10-09 | 2012-02-29 | 南京航天银山电气有限公司 | Constant value correcting method and device of failure information main station, and power system device |
CN103177222A (en) * | 2011-12-23 | 2013-06-26 | 腾讯科技(深圳)有限公司 | Processing method for file shell adding and shell removing and device thereof |
CN111052120A (en) * | 2017-08-24 | 2020-04-21 | 甲骨文国际公司 | Digital asset traceability and assurance using distributed ledgers |
CN111125781A (en) * | 2019-12-24 | 2020-05-08 | 腾讯科技(深圳)有限公司 | File signature method and device and file signature verification method and device |
CN112734361A (en) * | 2020-12-29 | 2021-04-30 | 卡乐电子(苏州)有限责任公司 | Distributed cooperative office data processing method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113378236B (en) | Evidence data online security notarization platform and security method | |
CN109740309B (en) | File protection method and device | |
CN103295046A (en) | Method and device for generating and using safe two-dimensional codes | |
CN101770552B (en) | Method for clearing computer password, computer and system for clearing computer password | |
EP3316160A1 (en) | Authentication method and apparatus for reinforced software | |
CN110929291A (en) | Method and device for accessing text file and computer readable storage medium | |
CN111385084A (en) | Key management method and device for digital assets and computer readable storage medium | |
CN106682521B (en) | File transparent encryption and decryption system and method based on driver layer | |
Park et al. | A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system | |
CN111585995A (en) | Method and device for transmitting and processing safety wind control information, computer equipment and storage medium | |
CN114615031A (en) | File storage method and device, electronic equipment and storage medium | |
CN110545542A (en) | Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment | |
CN112199730A (en) | Method and device for processing application data on terminal and electronic equipment | |
CN107918739B (en) | Data protection method and device and storage medium | |
CN116132041A (en) | Key processing method and device, storage medium and electronic equipment | |
CN113742754A (en) | Fixed value file encryption method and related device | |
CN107330340B (en) | File encryption method, file encryption equipment, file decryption method, file decryption equipment and storage medium | |
CN112825093B (en) | Security baseline checking method, host, server, electronic device and storage medium | |
CN111859408A (en) | File encryption and decryption method and device, electronic equipment and readable storage medium | |
CN110378133B (en) | File protection method and device, electronic equipment and storage medium | |
CN114491661A (en) | Log tamper-proofing method and system based on block chain | |
CN112883397A (en) | Data storage method, data reading method, device, equipment and storage medium | |
CN111292082A (en) | Public key management method, device and equipment in block chain type account book | |
CN114095175B (en) | Gray-check-capable data confidentiality method, device and storage medium | |
CN114697119B (en) | Data checking method, device, computer readable storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |