CN115982771A - Data security protection method and device - Google Patents

Data security protection method and device Download PDF

Info

Publication number
CN115982771A
CN115982771A CN202310044692.9A CN202310044692A CN115982771A CN 115982771 A CN115982771 A CN 115982771A CN 202310044692 A CN202310044692 A CN 202310044692A CN 115982771 A CN115982771 A CN 115982771A
Authority
CN
China
Prior art keywords
data
user
client
request
grade
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310044692.9A
Other languages
Chinese (zh)
Inventor
柳峰
吴浩杰
李娇娇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Shutuxing Information Technology Co ltd
Original Assignee
Shaanxi Shutuxing Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Shutuxing Information Technology Co ltd filed Critical Shaanxi Shutuxing Information Technology Co ltd
Priority to CN202310044692.9A priority Critical patent/CN115982771A/en
Publication of CN115982771A publication Critical patent/CN115982771A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a data security protection method and a device, wherein the protection method comprises the following steps: the data are divided into five grades in sequence according to the damage degree of the damaged data to the legal rights and interests of the damaged individuals from small to large; sequentially dividing the client into five grades according to the authority of the client from low to high; receiving a data access request sent by a client; adopting a preset data protection mode to perform security detection on a user triggering a data access request; the preset data protection mode is a protection mode based on security key verification; when the user is a normal user, screening out request data with the data grade less than or equal to the grade of the client according to the data access request and the grade of the client; desensitizing the request data to obtain a request result, and returning the request result to the client. The scheme can ensure that the user can only access the data with the authority level less than or equal to the authority level of the user when accessing the data, and effectively improves the data protection effect.

Description

Data security protection method and device
Technical Field
The present invention relates to the field of data security technologies, and in particular, to a data security protection method and apparatus.
Background
Data security protection means that necessary measures are taken to ensure that data is in a state of effective protection and legal utilization, and the data security protection has the capability of ensuring a continuous security state. The data security shall ensure the security of the whole process of data production, storage, transmission, access, use, destruction, disclosure and the like, and ensure the confidentiality, integrity and availability of the data processing process.
The traditional data security protection usually adopts a blacklist library and a blacklist rule matching method. For example, an Internet Protocol (IP) address, a User Agent string User-Agent, and other User access parameters are used as matching items in the blacklist matching rule, and when a User accesses, the content of the matching item of the User is matched with the corresponding content in the blacklist library. And if the matching is consistent, the user is considered as an abnormal user, and the access and operation of the user to the data in the data platform are intercepted.
The existing data security protection method can only limit users in the blacklist to obtain data, and the protection effect is limited.
Disclosure of Invention
The invention provides a data security protection method and a data security protection device, which solve the technical problem that the protection effect of the existing data protection method is limited.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect, the present invention provides a data security protection method, including:
the data are divided into five grades in sequence according to the damage degree of the damaged data to the legal rights and interests of the damaged individuals from small to large;
sequentially dividing the client into five grades according to the authority of the client from low to high;
receiving a data access request sent by a client;
adopting a preset data protection mode to perform security detection on the user triggering the data access request; the preset data protection mode is a protection mode based on security key verification;
when the user is a normal user, screening out request data with a data grade smaller than or equal to the grade of the client according to the data access request and the grade of the client;
desensitizing the request data to obtain a request result, and returning the request result to the client.
In a possible implementation manner, after the performing security detection on the user triggering the data access request by using a preset data protection manner, the method further includes:
when the user is a normal user and the level of data expected to be accessed by the data access request of the user is greater than the level of the client, screening all request data and taking a small part of all request data as first preview data;
returning the first preview data and the permission upgrading prompt to the client; and the permission upgrading prompt is used for prompting the client to carry out permission upgrading.
In one possible implementation manner, after the returning the first preview data and the permission upgrade prompt to the client, the method further includes:
sending a client authority upgrading request to a data platform, wherein the client authority upgrading request comprises identity information of a requester;
verifying the identity information of the applicant;
and after the verification is passed, upgrading the authority of the client to one level, and returning upgrading success information to the client.
In a possible implementation manner, before the performing security detection on the user triggering the data access request by using a preset data protection manner, the method further includes:
judging whether the current user is in a white list, a grey list and a black list or not according to the access attribute information of the current user triggering the data access request; the system comprises a black list, a white list and a plurality of users, wherein the black list stores user information of access-forbidden data, the gray list stores user information which is warned but not of access-forbidden data, and the white list stores user information of access permission;
if the user is in the blacklist, the client is prohibited from accessing all data in the data platform;
if the user is in the white list, allowing the client to access data with a data grade smaller than or equal to the client grade;
if the user is in the grey list, taking partial data in the data with the data grade less than or equal to the client grade as second preview data, and allowing the client to access the second preview data;
and if the user is not in the blacklist, the grey list and the white list, adding the user into the white list.
In a possible implementation manner, after the performing security detection on the user triggering the data access request by using a preset data protection manner, the method further includes:
when the user is an abnormal user and the warning times of the user are less than or equal to a first preset time, allowing the client to access the second preview data, adding the user to a grey list, and sending warning information to the client;
and when the warning times of the user are greater than the first preset times, forbidding the client to access all data in the data platform, and adding the user into a blacklist.
In a possible implementation manner, after the preset data protection manner is adopted and security detection is performed on the user triggering the data access request, the method further includes:
and if the user in the blacklist is a normal user for a second preset time, moving the user into a white list, and allowing the client to access data with the data grade less than or equal to the client grade.
In a possible implementation manner, the security detection is performed on the user triggering the data access request by the protection manner based on the security key verification, specifically:
and generating a verification ciphertext according to the target security key corresponding to the user and the data access request, and determining that the user is an abnormal user under the condition that the verification ciphertext is inconsistent with the ciphertext of the request key in the data access request.
In a second aspect, the present invention provides a data security device, comprising:
the first processing module is used for sequentially dividing the data into five grades according to the damage degree of the damaged data to the legal rights and interests of an infringed individual from small to large;
the second processing module is used for sequentially dividing the client into five grades according to the permission of the client from low to high;
the third processing module is used for receiving a data access request sent by the client;
the fourth processing module is used for carrying out security detection on the user triggering the data access request in a preset data protection mode; the preset data protection mode is a protection mode based on security key verification;
the fifth processing module is used for screening out request data with the data grade smaller than or equal to the grade of the client according to the data access request and the grade of the client when the user is a normal user;
and the sixth processing module is used for desensitizing the request data to obtain a request result and returning the request result to the client.
In a third aspect, the present invention provides an electronic device, which includes a processor and a memory, where at least one instruction, at least one program, a set of codes, or a set of instructions is stored in the memory, and the at least one instruction, the at least one program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the data security protection method according to any one of the above items.
In a fourth aspect, the present invention provides a computer-readable storage medium having stored therein at least one instruction, at least one program, set of codes, or set of instructions, which is loaded by a processor and executes a method of data security protection as described in any one of the above.
According to the data safety protection method provided by the embodiment of the invention, firstly, data are sequentially divided into five grades according to the damage degree of the damaged data to the legal rights and interests of an invaded individual from small to large; the client sides are sequentially divided into five grades from low to high according to the authority owned by the client; secondly, receiving a data access request sent by a client; thirdly, security detection is carried out on the user triggering the data access request by adopting a protection mode based on security key verification; then, when the user is a normal user, screening out request data with a data grade smaller than that of the client according to the data access request and the grade of the client; and finally, desensitizing the screened request data to obtain a request result, and returning the request result to the client. According to the scheme of the invention, through the grading of the data and the grading of the client, the user can only access the data of which the authority level is less than or equal to that of the user when accessing the data, and the data protection effect is effectively improved.
Drawings
Fig. 1 is a flowchart illustrating steps of a first data security protection method according to an embodiment of the present invention;
fig. 2 is a block diagram of a data security device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the embodiments of the present disclosure, "a plurality" means two or more unless otherwise specified. In addition, the use of "based on" or "according to" is meant to be open and inclusive in that a process, step, calculation, or other action that is "based on" or "according to" one or more stated conditions or values may, in practice, be based on additional conditions or exceed the stated values.
In order to solve the problem that the existing data protection method is limited in protection effect, the embodiment of the invention provides a data security protection method and a data security protection device.
Fig. 1 is a flowchart illustrating steps of a first data security protection method according to an embodiment of the present invention.
As shown in fig. 1, the data security protection method includes:
and step 101, sequentially dividing the data into five grades according to the damage degree of the damaged data to the legal rights and interests of the damaged individuals from small to large.
Specifically, the public data is classified according to the degree of damage to the legitimate rights and interests of an affected individual after the public data is damaged, and the public data is sequentially divided into a first level, a second level, a third level, a fourth level and a fifth level, wherein each level is also correspondingly called a public level, an internal level, a sensitive level, an important level and a core level. The common data is damaged, specifically, the data is attacked, leaked, tampered, illegally used and the like.
And 102, sequentially dividing the client into five grades according to the permission of the client from low to high.
Specifically, the client is also sequentially divided into five levels according to the level of the client authority, and the higher the level of the client is, the higher the authority of the client is.
And step 103, receiving a data access request sent by the client.
The data access request refers to an access request sent when a client accesses data in a data platform, and may include a Uniform Resource Locator (URL) requesting access, system time (i.e., a request timestamp) of the client when the request is sent, a request parameter (i.e., a normal request parameter) agreed by the URL, and other request parameters agreed in a subsequent preset data protection manner.
Specifically, when a client accesses data in a data platform, a data access request is generated according to a website to be accessed and an agreed preset data protection mode, and is sent to a data protection server for performing security protection on the data of the data platform. The data protection server receives the data access request sent by the client.
104, adopting a preset data protection mode to perform security detection on a user triggering a data access request; the preset data protection mode is a protection mode based on security key verification.
The protection mode based on the security key verification refers to a protection mode of encrypting or decrypting some set character strings by using a security key corresponding to a user.
Based on a protection mode of security key verification, security detection is carried out on a user triggering a data access request, and the method specifically comprises the following steps:
and generating a verification ciphertext according to the target security key corresponding to the user and the data access request, and determining that the user is an abnormal user under the condition that the verification ciphertext is inconsistent with the ciphertext of the request key in the data access request.
And 105, screening out request data with the data grade less than or equal to the grade of the client according to the data access request and the grade of the client when the user is a normal user.
Specifically, when the user is detected to be a normal user, communication connection is established between the client and the data platform according to the data access request, and data with a data grade smaller than or equal to that of the client is screened out as request data according to the grade of the client.
And 106, desensitizing the request data to obtain a request result, and returning the request result to the client.
The desensitization processing of the request data refers to data desensitization, namely, data deformation is carried out on certain sensitive information through a desensitization rule, so that reliable protection of sensitive private data is realized. Where customer security data or some business sensitive data is involved, the real data is modified and provided for testing use without violating system rules, for example: personal information such as identification card numbers, mobile phone numbers, card numbers, customer numbers and the like need to be subjected to data desensitization.
Further, after the preset data protection mode is adopted and the security detection is performed on the user triggering the data access request, the method further comprises the following steps:
and screening all the request data and taking a small part of all the request data as first preview data when the user is a normal user and the data grade of the expected access of the data access request of the user is greater than the grade of the client.
Returning the first preview data and the permission upgrading prompt to the client; and the permission upgrading prompt is used for prompting the client to carry out permission upgrading.
When the user is a normal user and the level of the data which the user wants to access in the data access request is greater than that of the client, a small part of the screened request data is displayed, and the user can generally determine whether the data is the data required by the user by previewing the first preview data.
Further, after the first preview data and the permission upgrade prompt are returned to the client, the method further includes:
and sending a client authority upgrading request to the data platform, wherein the client authority upgrading request comprises the identity information of the requester.
And verifying the identity information of the requester.
And after the verification is passed, upgrading the authority of the client to one level, and returning the upgrade success information to the client.
Specifically, if the first preview data is data that the user needs, and the user wants to view the specific content of the data in detail, the upgrade right may be requested at the client.
Further, before the preset data protection mode is adopted and the security detection is performed on the user triggering the data access request, the method further comprises the following steps:
judging whether the current user is in a white list, a grey list and a black list or not according to the access attribute information of the current user triggering the data access request; the system comprises a black list, a gray list and a white list, wherein the black list stores user information of data access prohibition, the gray list stores user information which is warned but not of data access prohibition, and the white list stores user information of data access permission.
If the user is in the blacklist, the client is prohibited from accessing all data in the data platform;
if the user is in the white list, allowing the client to access data with the data grade less than or equal to the client grade;
if the user is in the grey list, taking part of data in the data with the data grade less than or equal to the client grade as second preview data, and allowing the client to access the second preview data;
and if the user is not in the blacklist, the grey list and the white list, adding the user into the white list.
After the preset data protection mode is adopted and the security detection is carried out on the user triggering the data access request, the method further comprises the following steps:
when the user is an abnormal user and the warning times of the user are less than or equal to the first preset times, allowing the client to access the second preview data, adding the user to the grey list, and sending warning information to the client;
and when the warning times of the user are larger than the first preset times, forbidding the client to access all data in the data platform, and adding the user into a blacklist.
After the preset data protection mode is adopted and the security detection is carried out on the user triggering the data access request, the method further comprises the following steps:
and if the user in the blacklist is a normal user for the second preset time, moving the user into the white list, and allowing the client to access the data with the data grade less than or equal to the client grade.
And when the users in the blacklist are normal users continuously for many times, removing the users from the blacklist and adding the users into the white list.
According to the data safety protection method provided by the embodiment of the invention, firstly, data are sequentially divided into five grades according to the damage degree of the damaged data to the legal rights and interests of an invaded individual from small to large; sequentially dividing the client into five grades according to the authority of the client from low to high; secondly, receiving a data access request sent by a client; thirdly, security detection is carried out on the user triggering the data access request by adopting a protection mode based on security key verification; then, when the user is a normal user, screening out request data with a data grade smaller than that of the client according to the data access request and the grade of the client; and finally, desensitizing the screened request data to obtain a request result, and returning the request result to the client.
According to the scheme of the invention, through the grading of the data and the grading of the client, the user can only access the data of which the authority level is less than or equal to that of the user when accessing the data, and the data protection effect is effectively improved.
Fig. 2 is a block diagram of a data security device according to an embodiment of the present invention.
As shown in fig. 2, the present invention further provides a data security device, which includes:
the first processing module 201 is configured to sequentially divide the data into five grades according to the degree of damage to the legitimate rights and interests of an affected individual from small to large after the data is destroyed;
the second processing module 202 is configured to divide the client into five levels in sequence according to the permission of the client from low to high;
the third processing module 203 is configured to receive a data access request sent by a client;
the fourth processing module 204 is configured to perform security detection on a user that triggers a data access request in a preset data protection manner; the preset data protection mode is a protection mode based on security key verification;
a fifth processing module 205, configured to, when the user is a normal user, screen out, according to the data access request and the level of the client, request data whose data level is less than or equal to the level of the client;
and a sixth processing module 206, configured to perform desensitization processing on the request data to obtain a request result, and return the request result to the client.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The embodiment of the present invention further provides an electronic device, where the electronic device includes a processor and a memory, where the memory stores at least one instruction, at least one program, a code set, or an instruction set, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by the processor to implement the data security protection method in the embodiment of the present invention.
The embodiment of the present invention further provides a computer-readable storage medium, where at least one instruction, at least one program, a code set, or an instruction set is stored in the storage medium, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by a processor to implement the data security protection method in the embodiment of the present invention.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the invention are brought about in whole or in part when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
The above description is only an embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions within the technical scope of the present invention are intended to be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. A data security protection method is characterized by comprising the following steps:
the data are divided into five grades in sequence according to the damage degree of the damaged data to the legal rights and interests of the damaged individuals from small to large;
according to the authority of the client from low to high, the client is divided into five grades in sequence;
receiving a data access request sent by a client;
adopting a preset data protection mode to perform security detection on the user triggering the data access request; the preset data protection mode is a protection mode based on security key verification;
when the user is a normal user, screening out request data with a data grade smaller than or equal to the grade of the client according to the data access request and the grade of the client;
desensitizing the request data to obtain a request result, and returning the request result to the client.
2. The method according to claim 1, wherein after the security detection of the user triggering the data access request in the preset data protection manner, the method further comprises:
when the user is a normal user and the level of data expected to be accessed by the data access request of the user is greater than the level of the client, screening all request data and taking a small part of all request data as first preview data;
returning the first preview data and the permission upgrading prompt to the client; and the permission upgrading prompt is used for prompting the client to carry out permission upgrading.
3. The method of claim 2, wherein after the returning the first preview data and the permission upgrade prompt to the client, the method further comprises:
sending a client permission upgrading request to a data platform, wherein the client permission upgrading request comprises identity information of a requester;
verifying the identity information of the applicant;
and after the verification is passed, upgrading the authority of the client to one level, and returning upgrading success information to the client.
4. The method according to claim 1, wherein before the security detection of the user triggering the data access request in the preset data protection manner, the method further comprises:
judging whether the current user is in a white list, a grey list and a black list or not according to the access attribute information of the current user triggering the data access request; the system comprises a black list, a white list and a plurality of users, wherein the black list stores user information of access-forbidden data, the gray list stores user information which is warned but not of access-forbidden data, and the white list stores user information of access permission;
if the user is in the blacklist, the client is prohibited from accessing all data in the data platform;
if the user is in the white list, allowing the client to access data with a data grade smaller than or equal to the client grade;
if the user is in the grey list, taking part of data in the data with the data grade less than or equal to the client grade as second preview data, and allowing the client to access the second preview data;
and if the user is not in the blacklist, the grey list and the white list, adding the user into the white list.
5. The method according to claim 4, wherein after the security detection is performed on the user triggering the data access request in the preset data protection manner, the method further comprises:
when the user is an abnormal user and the warning times of the user are less than or equal to a first preset time, allowing the client to access the second preview data, adding the user to a grey list, and sending warning information to the client;
and when the warning times of the user are larger than the first preset times, forbidding the client to access all data in a data platform, and adding the user into a blacklist.
6. The method according to claim 5, wherein after the security detection of the user triggering the data access request in the preset data protection manner, the method further comprises:
and if the user in the blacklist is a normal user for a second preset time, moving the user into a white list, and allowing the client to access data with the data grade less than or equal to the client grade.
7. The method according to claim 1, wherein the security detection is performed on the user who triggered the data access request based on a protection mode of security key verification, specifically:
and generating a verification ciphertext according to the target security key corresponding to the user and the data access request, and determining that the user is an abnormal user under the condition that the verification ciphertext is inconsistent with the ciphertext of the request key in the data access request.
8. A data security device, comprising:
the first processing module is used for sequentially dividing the data into five grades according to the damage degree of the damaged data to the legal rights and interests of an infringed individual from small to large;
the second processing module is used for sequentially dividing the client into five grades according to the permission of the client from low to high;
the third processing module is used for receiving a data access request sent by the client;
the fourth processing module is used for carrying out security detection on the user triggering the data access request in a preset data protection mode; the preset data protection mode is a protection mode based on security key verification;
the fifth processing module is used for screening out request data with the data grade smaller than or equal to the grade of the client according to the data access request and the grade of the client when the user is a normal user;
and the sixth processing module is used for carrying out desensitization processing on the request data to obtain a request result and returning the request result to the client.
9. An electronic device comprising a processor and a memory, wherein at least one instruction, at least one program, a set of codes, or a set of instructions is stored in the memory, and the at least one instruction, the at least one program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the data security method according to any one of claims 1-7.
10. A computer readable storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the method of data security protection according to any one of claims 1 to 7.
CN202310044692.9A 2023-01-30 2023-01-30 Data security protection method and device Pending CN115982771A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310044692.9A CN115982771A (en) 2023-01-30 2023-01-30 Data security protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310044692.9A CN115982771A (en) 2023-01-30 2023-01-30 Data security protection method and device

Publications (1)

Publication Number Publication Date
CN115982771A true CN115982771A (en) 2023-04-18

Family

ID=85972296

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310044692.9A Pending CN115982771A (en) 2023-01-30 2023-01-30 Data security protection method and device

Country Status (1)

Country Link
CN (1) CN115982771A (en)

Similar Documents

Publication Publication Date Title
US11582242B2 (en) System, computer program product and method for risk evaluation of API login and use
US7925883B2 (en) Attack resistant phishing detection
JP4954979B2 (en) Systems and methods for fraud monitoring, detection, and hierarchical user authentication
JP6068506B2 (en) System and method for dynamic scoring of online fraud detection
KR101558715B1 (en) System and Method for Server-Coupled Malware Prevention
CN112787992A (en) Method, device, equipment and medium for detecting and protecting sensitive data
CN113660224B (en) Situation awareness defense method, device and system based on network vulnerability scanning
WO2010126733A1 (en) Systems and methods for sensitive data remediation
CN111786966A (en) Method and device for browsing webpage
EP3172692A1 (en) Remedial action for release of threat data
WO2019123665A1 (en) Collation server, collation method, and computer program
Shrivastava et al. Android application behavioural analysis for data leakage
US20240330450A1 (en) Performing a security action based on a suspicious cross authorization event
JP2002189643A (en) Method and device for scanning communication traffic
Garba et al. The Current state of cybersecurity readiness in Nigeria organizations
CN115982771A (en) Data security protection method and device
CN114124453B (en) Processing method and device of network security information, electronic equipment and storage medium
CN107172106B (en) Security information interaction method and system
CN101778108B (en) Method and device for preventing falsification of homepage of server
CN114186141B (en) Illegal client detection method, device, equipment and medium
US20240143805A1 (en) Document protection mechanism
CN117499159B (en) Block chain-based data transaction method and device and electronic equipment
CN115964582B (en) Network security risk assessment method and system
Hamdani Digital Forensic Analysis Of APK Files In Phishing Scams On Whatsapp Using The NIST Method
CN117910010A (en) Distributed secure storage method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination