CN117131477A - Full-link data tracing method based on local data blood-edge digital watermark - Google Patents

Full-link data tracing method based on local data blood-edge digital watermark Download PDF

Info

Publication number
CN117131477A
CN117131477A CN202311017151.3A CN202311017151A CN117131477A CN 117131477 A CN117131477 A CN 117131477A CN 202311017151 A CN202311017151 A CN 202311017151A CN 117131477 A CN117131477 A CN 117131477A
Authority
CN
China
Prior art keywords
data
file
information
blood
digital watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311017151.3A
Other languages
Chinese (zh)
Other versions
CN117131477B (en
Inventor
邵国林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanchang University
Original Assignee
Nanchang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanchang University filed Critical Nanchang University
Priority to CN202311017151.3A priority Critical patent/CN117131477B/en
Publication of CN117131477A publication Critical patent/CN117131477A/en
Application granted granted Critical
Publication of CN117131477B publication Critical patent/CN117131477B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a full-link data tracing method based on local data blood-edge digital watermarking, which comprises two parts: (1) constructing a local data blood-edge digital watermark: collecting and monitoring the data processing and circulation processes of the whole life cycle of data through monitoring agents deployed at each terminal in the production/office network, maintaining the local data blood-edge relationship through a digital watermarking technology based on the segment information of the data circulation chain, and providing a data basis for constructing a global data blood-edge map for a server; (2) global data blood-source map construction: the data tracing management platform deployed at the cloud receives the local data blood-edge relation data reported by the terminal, the whole data circulation process and the global data blood-edge map are completely reconstructed at the cloud based on the local data blood-edge relation data, and the full-link accurate tracing of the scenes such as data leakage and the like is realized according to the digital watermark information and the data blood-edge map of the leakage file.

Description

Full-link data tracing method based on local data blood-edge digital watermark
Technical Field
The application relates to the technical field of data tracing and leakage prevention, in particular to a full-link data tracing method based on local data blood-margin (LDL) digital watermark.
Background
The data security is closely related to the network security, is an important component of national master and national security, and the data tracing technology is a key technology for realizing data security and privacy protection. The digital watermarking technology is an effective means for solving the problem of data tracing, and is a technology for embedding specific digital signals into digital products to protect the copyright or integrity of the digital products. The method for tracing data by using digital watermark technology generally embeds watermark into carrier, and then propagates along with carrier, and when security event such as data leakage occurs, it can be extracted as the basis of tracing responsibility. For example, in some application scenarios where enterprises trace the whole life cycle circulation process of internal key data assets, the enterprises generally embed trace flag information into the key data assets in advance in a production network, and then exchange the key data assets from the production network to an office network and perform detailed trace and audit on the whole life cycle circulation process of operation and use on different terminals of the office network by using a digital watermark tracing technology.
The traditional tracing mode based on the digital watermark data has the following defects: traditional data tracing usually traces or audits on the boundary side or on nodes where the data is easy to cause security problems, however, the circulation process of the data at different terminals is a complex graph relationship, and the processing process of the data full link is difficult to trace in a mode of monitoring some nodes of the graph, and the tracing process may face the risks of key data operation and the risk that the nodes cannot trace.
Disclosure of Invention
Aiming at the problems, the application aims to provide a full-link data tracing method based on local data blood-margin (LDL) digital watermark, which constructs a data processing chain acquisition, monitoring and full-link tracing method oriented to the full life cycle of data, covers key data processing scenes such as file creation, reading, modification, movement, copying, outgoing, deletion and the like, tracks and analyzes the flowing and processing process of data in a first field of data processing, establishes a full-link data blood-margin relation, a tracing watermark system and a data flow map, and realizes full-link data tracing.
In order to achieve the above purpose, the application adopts the following technical scheme:
a full-link data tracing method based on local data blood-margin (LDL) digital watermark comprises two parts: local data blood-edge digital watermark construction and global data blood-edge map construction. (1) constructing a local data blood-edge digital watermark: the data processing and circulation processes of the whole life cycle of the data are collected and monitored through monitoring agents deployed at each terminal in the production/office network, and the local data blood-edge relationship is maintained through a digital watermarking technology based on the segment information of the data circulation chain, so that a data basis is provided for the construction of the global data blood-edge map by the server. (2) global data blood-source map construction: the data tracing management platform deployed at the cloud receives the local data blood-edge relation data reported by the terminal, the whole data circulation process and the global data blood-edge map are completely reconstructed at the cloud based on the local data blood-edge relation data, and the full-link accurate tracing of the scenes such as data leakage and the like is realized according to the digital watermark information and the data blood-edge map of the leakage file.
The construction of the local data blood-edge digital watermark comprises the following steps:
step 1: monitoring a data processing process, specifically monitoring key data operation behaviors in a terminal by a data tracing monitoring Agent, wherein the monitoring data processing process comprises data processing scenes such as file creation, reading, modification, movement, copying, outgoing, deletion and the like;
step 2: extracting and analyzing LDL digital watermark, in particular when data operation behavior of specific attention type occurs in the terminal, extracting and analyzing LDL digital watermark information from the file according to the LDL digital watermark proposal provided by the application, wherein the LDL digital watermark information records the data stream records of the last 2 terminals (previous hop terminal Prehop and current terminal CurHop), and the Prehop and CurHop both contain terminal user identity identification information ID, file ID, data stream hop number hop and other information; the key point of the application is that any 2 adjacent nodes in the data flow link are reserved by LDL digital watermarking technology, so that the whole data flow process and the data blood-margin map can be completely reconstructed at the cloud.
Step 3: updating LDL digital watermarks is discussed in more detail in the following:
(1) Initializing LDL digital watermark information when the LDL digital watermark is not extracted, wherein a file ID is set as current file identification information, a PreHop data stream record is empty, the ID of the CurHop data stream record is set as a current terminal user identity, and the data stream hop count hop is set as 0; processing the constructed watermark information and loading the processed watermark information into a file; reporting the operation record to a cloud data traceability management platform;
(2) When the LDL digital watermark is extracted and the ID of the CurHop is the same as the current terminal user identity, the processing is not performed;
(3) When the LDL digital watermark is extracted and the ID of the CurHop is different from the current terminal user identity, the PreHop is set as CurHop information, and then the CurHop information is reset, specifically, the ID of the CurHop data stream record is set as the current terminal user identity, and the data stream hop count hop is increased by 1; processing the constructed watermark information and updating the processed watermark information into a file; and reporting the operation record to the cloud data traceability management platform.
The global data blood-margin map construction comprises the following steps:
step 1: the LDL digital watermark of the leakage file to be analyzed is extracted, in particular to the LDL digital watermark proposal provided by the application is used for extracting and analyzing the LDL digital watermark information from the file, the LDL digital watermark information records the file ID and the data flow record of the last 2 terminals (the last hop terminal Prehop and the current terminal CurHop), and the PreHop and the CurHop both contain the information of the terminal user identity ID, the file ID, the data flow hop number hop and the like.
Step 2: and extracting the file data processing log, specifically extracting all terminal operation records related to the file from the management platform tracing log according to the file ID information extracted from the watermark information.
Step 3: and constructing a full-link data blood-edge map, specifically, combining the data flow segments of all adjacent nodes into a complete relation map according to ID and hop information in PreHop, curHop, wherein the map shows the whole process and branching condition of the data flow from the 0 th hop terminal node to the last hop terminal node.
Step 4: based on ID and hop information in PreHop, curHop of the leakage file LDL digital watermark, backtracking is carried out in the full-link data blood-edge map, so that the whole process of the leakage file circulation (from which propagation path branches flow out) is traced out, and key nodes of data leakage are extracted and used as evidence obtaining basis.
Further, the terminal user identity information ID is from Agent login information, and the Agent resides in a terminal process, maintains the identity information of the current user, and represents the unique identifier of each terminal user; the file ID represents the unique identification of the current file, is set during watermark initialization, is not changed after the setting, and is used by the subsequent hop nodes.
The beneficial effects of the application are as follows:
the application is used for collecting and monitoring the data processing and circulation links of the data full life cycle, and tracking and analyzing the flow and processing process of the data in the first field of the data processing. In particular, in each terminal node in the data flow process, the data flow fragments of 2 adjacent nodes of the last hop terminal and the current terminal are reserved as local data blood edges, the local data blood edge relation is reported to a server and updated to the LDL digital watermark, the whole data flow process and the data blood edge map are completely reconstructed in the cloud, and finally, the full-link accurate tracing to the scenes such as data leakage and the like is completed based on the complete data flow process and the data blood edge map.
Drawings
FIG. 1 is a schematic diagram of the core idea of the present application;
FIG. 2 is a flow chart of an embodiment of the present application.
Detailed Description
In order to make the technical solution of the present application better understood by those skilled in the art, the technical solution of the present embodiment will be clearly and completely described in the following description with reference to the accompanying drawings in the embodiments of the present specification, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, shall fall within the scope of the application. The following examples are only for more clearly illustrating the technical aspects of the present application, and are not intended to limit the scope of the present application.
The idea of the embodiment of the specification is shown in fig. 1, namely, each terminal node in the data circulation process keeps the data circulation segments of 2 adjacent nodes of the last hop terminal and the current terminal as the local data blood margin (LDL) relationship, and reports the LDL information to a server and updates the LDL information to the LDL digital watermark, so that the whole data circulation process and the data blood margin map can be completely reconstructed at the cloud, and the full-link accurate tracing to the scenes such as data leakage and the like is realized. The application is further described below with reference to the accompanying drawings. The flow of the method in the implementation of the application is shown in figure 2, and mainly comprises the following steps:
the construction of the local data blood-edge digital watermark comprises the following steps:
step 1: monitoring a data processing process, namely monitoring key data operation behaviors in a terminal by a data tracing monitoring Agent through kernel programming registration system kernel functions, wherein the data processing scenes comprise file creation, reading, modification, movement, copying, outgoing, deletion and the like; optionally, selective interception may be performed according to configured monitoring policies, such as interception only for specific file suffixes, specific file sizes, specific file types, file handling actions of specific file operations.
Step 2: the LDL digital watermark is extracted and analyzed, and in particular, when the data operation behavior of a specific attention type occurs in the terminal, the LDL digital watermark information is extracted and analyzed from the file according to the LDL digital watermark scheme proposed by the application.
a. The watermark extraction and analysis process is the inverse process of watermark loading, and the watermark loading scheme is described in step 3.
Ldl digital watermark information records the data stream record of the last 2 terminals (last hop terminal PreHop, current terminal CurHop), wherein both PreHop and CurHop contain information such as terminal user identity information ID, file ID, data stream hop count hop, etc., such as { file_id=0x123, prehop= { id=alice, hop=1 }, curhop= { id=bob, hop=2 };
1) The terminal user identity information ID comes from Agent login information, the Agent resides in a terminal process, the identity information of the current user in the enterprise network is maintained, and the unique identity of each terminal user (such as a work number in the enterprise network) is represented;
2) The file ID represents the unique identification of the current file, is set during watermark initialization, is not changed after the setting, and is used by the subsequent hop node; alternatively, the file ID may be set according to the file MD5 value.
Step 3: updating LDL digital watermarks is discussed in more detail in the following:
(1) When LDL digital watermark is not extracted, then
a. Initializing LDL digital watermark information, wherein a file ID is set as current file identification information (optionally, according to a file MD5 value), a PreHop data stream record is emptied, the ID of the CurHop data stream record is set as a current terminal user identity, and the data stream hop count hop is set as 0, such as { file_id=0x123, preHop= { }, curHop= { ID=Carol, hop=0 };
b. embedding the constructed watermark information into a file after processing, and optionally, carrying out integrity check and encryption processing on the watermark information before embedding to convert the watermark information into unreadable binary information; for different file types, different embedding modes can be adopted, such as adopting a least significant bit LBS steganography technology for picture files, and watermark embedding modes such as file header, file tail and the like can be adopted for other files.
c. And reporting the operation record to a cloud data traceability management platform, wherein the operation record uploaded to the cloud can comprise information such as an operation time stamp, terminal information (IP, system and the like), an identity ID, a file name, a file attribute, a file watermark, a stream hop count hop, a file ID, a file fingerprint and the like.
(2) When the LDL digital watermark is extracted and the ID of the CurHop is the same as the current terminal user identity, the processing is not performed;
(3) When the LDL digital watermark is extracted and the CurHop ID is different from the current end user ID, then
a. Setting PreHop as CurHop information, and then resetting CurHop information, specifically setting the ID of the CurHop data stream record as the current end user identity, setting the file ID as the current file identity information, and automatically increasing the hop count hop by 1, if the original watermark information is { file_id=0x123, prehop= { id=alice, hop=1 }, curhop= { id=bob, hop=2 }, then the updated watermark information is { file_id=0x123, prehop= { id=bob, hop=2 }, curHop = { id=cindy, hop=3 };
b. embedding the constructed watermark information into a file after processing, and optionally, carrying out integrity check and encryption processing on the watermark information before embedding to convert the watermark information into unreadable binary information; for different file types, different embedding modes can be adopted, such as adopting a least significant bit LBS steganography technology for picture files, and watermark embedding modes such as file header, file tail and the like can be adopted for other files.
c. And reporting the operation record to a cloud data traceability management platform, wherein the operation record uploaded to the cloud can comprise information such as an operation time stamp, terminal information (IP, system and the like), an identity ID, a file name, a file attribute, a file watermark, a stream hop count hop, a file ID, a file fingerprint and the like.
The global data blood-margin map construction comprises the following steps:
step 1: the LDL digital watermark of the leakage file to be analyzed is extracted, in particular LDL digital watermark information is extracted and analyzed from the file according to the LDL digital watermark scheme provided by the application, the LDL digital watermark information records the data flow record of the last 2 terminals (the last hop terminal Prehop and the current terminal CurHop), and the Prehop and CurHop both contain information such as terminal user identity information ID, file ID, data flow hop number hop and the like, for example { file_id=0x123, prehop= { ID=bob, hop=2 }, curHop= { ID=cindy, hop=3 }.
Step 2: extracting the file data processing log, specifically extracting all terminal operation records R= { r|r.file_id=0x123 } related to the file from a management platform tracing log database according to file ID information file_id=0x123 extracted from watermark information, wherein each R contains PreHop and Curhop information.
Step 3: and constructing a full-link data blood-edge map, specifically, combining the data flow segments of all adjacent nodes into a complete relation map according to ID and hop information in PreHop, curHop, wherein the map shows the whole process and branching condition of the data flow from the 0 th hop terminal node to the last hop terminal node. The specific method is to construct a relation map in a top-down mode, and the specific process is as follows:
the first step: traversing R, and extracting a record of r.CurHop.hop=0 from the R as a root node root of the map;
and a second step of: adding the root into a CUR_LIST LIST;
and a third step of: traversing the cur_list LIST for a CUR node in the LIST;
traversing R, filtering all nodes with r.PreHop.ID=cur.CurHop.ID and r.PreHop.hop=cur.CurHop.hop+1, directing father nodes of the nodes to CUR nodes, and adding the father nodes to a CUR_LIST LIST;
deleting CUR nodes from the cur_list LIST;
fourth step: continuing the third step until the CUR_LIST LIST is empty;
step 4: based on ID and hop information in PreHop, curHop of the leakage file LDL digital watermark, backtracking is carried out in the full-link data blood-edge map, so that the whole process of the leakage file circulation (from which propagation path branches flow out) is traced out, and key nodes of data leakage are extracted and used as evidence obtaining basis.
The foregoing description of the preferred embodiments of the present application has been presented only in terms of those specific and detailed descriptions, and is not, therefore, to be construed as limiting the scope of the application. It should be noted that modifications, improvements and substitutions can be made by those skilled in the art without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.

Claims (2)

1. The full-link data tracing method based on the local data blood-edge digital watermark is characterized by comprising two parts: constructing local data blood-edge digital watermarks and constructing global data blood-edge maps;
the local data blood-edge digital watermark is constructed: collecting and monitoring the data processing and circulation processes of the whole life cycle of data through monitoring agents deployed at each terminal in the production/office network, maintaining the local data blood-edge relationship through a digital watermarking technology based on the segment information of the data circulation chain, and providing a data basis for constructing a global data blood-edge map for a server;
the global data blood-source map construction: receiving local data blood-edge relation data reported by a terminal through a data tracing management platform deployed at a cloud end, based on the local data blood-edge relation data, completely reconstructing the whole data circulation process and a global data blood-edge map at the cloud end, and realizing full-link accurate tracing of a data leakage scene according to digital watermark information and the data blood-edge map of a leakage file;
the construction of the local data blood-edge digital watermark comprises the following steps:
step 11: monitoring a data processing process, wherein a data traceability monitoring Agent monitors key data operation behaviors in a terminal, and the key data operation behaviors comprise file creation, reading, modification, movement, copying, outgoing and deleting data processing scenes;
step 12: extracting and analyzing digital watermark, when data operation action of specific attention type occurs in the terminal, extracting and analyzing LDL digital watermark information from the file, wherein the LDL digital watermark information records the data flow records of a previous hop terminal Prehop and a current terminal CurHop, and both the Prehop and CurHop contain terminal user identity information ID, file ID and data flow hop number hop information;
step 13: updating LDL digital watermark, concretely comprises the following cases:
step 131: initializing LDL digital watermark information when the LDL digital watermark is not extracted, wherein a file ID is set as current file identification information, a PreHop data stream record is empty, the ID of the CurHop data stream record is set as a current terminal user identity, and the data stream hop count hop is set as 0; processing the constructed watermark information and loading the processed watermark information into a file; reporting the operation record to a cloud data traceability management platform;
step 132: when the LDL digital watermark is extracted and the ID of the CurHop is the same as the current terminal user identity, the processing is not performed;
step 133: when the LDL digital watermark is extracted and the ID of the CurHop is different from the current terminal user identity, the PreHop is set as CurHop information, and then the CurHop information is reset, specifically, the ID of the CurHop data stream record is set as the current terminal user identity, and the data stream hop count hop is increased by 1; processing the constructed watermark information and updating the processed watermark information into a file; reporting the operation record to a cloud data traceability management platform;
the global data blood-lineage map construction includes the following steps:
step 21: extracting LDL digital watermark of leakage file to be analyzed, extracting and analyzing LDL digital watermark information from the file, wherein the LDL digital watermark information records file ID, previous hop terminal Prehop and current terminal CurHop data stream record, and both PreHop and CurHop contain terminal user identity information ID, file ID and data stream hop number hop information;
step 22: extracting the file data processing log, and extracting all terminal operation records related to the file from the management platform tracing log according to the file ID information extracted from the LDL watermark information;
step 23: constructing a full-link data blood-edge map, and combining the data flow fragments of all adjacent nodes into a complete relation map according to ID (identification) and hop information in PreHop, curHop, wherein the map shows the whole process and branching condition of the data flow from the 0 th hop terminal node to the last hop terminal node of the file;
step 24: and backtracking is carried out in the full-link data blood-margin map based on ID and hop information in PreHop, curHop in the leakage file LDL digital watermark, so that the whole process of the leakage file circulation is traced, and key nodes of data leakage are extracted and used as evidence obtaining basis.
2. The full-link data tracing method based on local data blood-edge digital watermarking according to claim 1, wherein the terminal user identity information ID is from Agent login information, the Agent resides in a terminal process, maintains identity information of a current user, and represents a unique identifier of each terminal user; the file ID represents the unique identification of the current file, is set during watermark initialization, is not changed after the setting, and is used by the subsequent hop nodes.
CN202311017151.3A 2023-08-14 2023-08-14 Full-link data tracing method based on local data blood-edge digital watermark Active CN117131477B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311017151.3A CN117131477B (en) 2023-08-14 2023-08-14 Full-link data tracing method based on local data blood-edge digital watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311017151.3A CN117131477B (en) 2023-08-14 2023-08-14 Full-link data tracing method based on local data blood-edge digital watermark

Publications (2)

Publication Number Publication Date
CN117131477A true CN117131477A (en) 2023-11-28
CN117131477B CN117131477B (en) 2024-03-29

Family

ID=88855686

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311017151.3A Active CN117131477B (en) 2023-08-14 2023-08-14 Full-link data tracing method based on local data blood-edge digital watermark

Country Status (1)

Country Link
CN (1) CN117131477B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800149A (en) * 2021-02-18 2021-05-14 浪潮云信息技术股份公司 Data blood margin analysis-based data management method and system
WO2021218021A1 (en) * 2020-04-28 2021-11-04 平安科技(深圳)有限公司 Data-based blood relationship analysis method, apparatus, and device and computer-readable storage medium
CN115934855A (en) * 2022-11-29 2023-04-07 广发银行股份有限公司 Full-link field level blood margin analysis method, system, equipment and storage medium
CN116579008A (en) * 2023-03-23 2023-08-11 中国电子科技集团公司第三十研究所 Identification-based data tracking and tracing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021218021A1 (en) * 2020-04-28 2021-11-04 平安科技(深圳)有限公司 Data-based blood relationship analysis method, apparatus, and device and computer-readable storage medium
CN112800149A (en) * 2021-02-18 2021-05-14 浪潮云信息技术股份公司 Data blood margin analysis-based data management method and system
CN115934855A (en) * 2022-11-29 2023-04-07 广发银行股份有限公司 Full-link field level blood margin analysis method, system, equipment and storage medium
CN116579008A (en) * 2023-03-23 2023-08-11 中国电子科技集团公司第三十研究所 Identification-based data tracking and tracing method

Also Published As

Publication number Publication date
CN117131477B (en) 2024-03-29

Similar Documents

Publication Publication Date Title
CN110460594B (en) Threat information data acquisition processing method, device and storage medium
Lone et al. Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer
CN107818150B (en) Log auditing method and device
Neyaz et al. Security, privacy and steganographic analysis of FaceApp and TikTok
EP3709568A1 (en) Deleting user data from a blockchain
CN101330406B (en) System and method for monitoring WAP imperfect picture
CN106777049B (en) Processing method and system for avoiding repeated log output
CN104778123A (en) Method and device for detecting system performance
CN114780370A (en) Data correction method and device based on log, electronic equipment and storage medium
CN108470039A (en) Data processing method and device in block chain
CN114997843A (en) Enterprise operation management information storage system
CN109409659A (en) Method for prewarning risk, device, computer equipment and storage medium
CN117131477B (en) Full-link data tracing method based on local data blood-edge digital watermark
CN108090364B (en) Method and system for positioning data leakage source
CN111885088A (en) Log monitoring method and device based on block chain
CN111884883A (en) Quick auditing processing method for service interface
CN108563396B (en) Safe cloud object storage method
CN112887923B (en) Unsupervised abnormal short text monitoring method and system based on dynamic communication network
CN110489576A (en) Picture resource processing method and system, client, server, processor and medium
CN116185296A (en) Distributed safe storage system based on multimedia teleconference information
US20150286808A1 (en) Marked image file security system and process
CN115827780A (en) Method, system and storage medium for realizing cross-network-area data synchronization by using scheduling algorithm based on isolation device
US20150286807A1 (en) Marked image file security system and process
CN111914147A (en) Suspected actual control person credit investigation method and system for enterprise
US20150286651A1 (en) Marked image file security system and process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Shao Guolin

Inventor after: Lu Yi

Inventor after: Zeng Xuemei

Inventor before: Shao Guolin

GR01 Patent grant
GR01 Patent grant