CN117131477A - Full-link data tracing method based on local data blood-edge digital watermark - Google Patents
Full-link data tracing method based on local data blood-edge digital watermark Download PDFInfo
- Publication number
- CN117131477A CN117131477A CN202311017151.3A CN202311017151A CN117131477A CN 117131477 A CN117131477 A CN 117131477A CN 202311017151 A CN202311017151 A CN 202311017151A CN 117131477 A CN117131477 A CN 117131477A
- Authority
- CN
- China
- Prior art keywords
- data
- file
- information
- blood
- digital watermark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 230000008569 process Effects 0.000 claims abstract description 35
- 238000012545 processing Methods 0.000 claims abstract description 32
- 238000012544 monitoring process Methods 0.000 claims abstract description 18
- 238000010276 construction Methods 0.000 claims abstract description 12
- 238000005516 engineering process Methods 0.000 claims abstract description 12
- 238000007726 management method Methods 0.000 claims abstract description 12
- 238000004519 manufacturing process Methods 0.000 claims abstract description 5
- 239000003795 chemical substances by application Substances 0.000 claims description 11
- 230000006399 behavior Effects 0.000 claims description 6
- 230000004048 modification Effects 0.000 claims description 5
- 238000012986 modification Methods 0.000 claims description 5
- 239000012634 fragment Substances 0.000 claims description 2
- 239000008280 blood Substances 0.000 description 6
- 210000004369 blood Anatomy 0.000 description 6
- 238000012217 deletion Methods 0.000 description 3
- 230000037430 deletion Effects 0.000 description 3
- 238000012550 audit Methods 0.000 description 2
- HEFNNWSXXWATRW-UHFFFAOYSA-N Ibuprofen Chemical compound CC(C)CC1=CC=C(C(C)C(O)=O)C=C1 HEFNNWSXXWATRW-UHFFFAOYSA-N 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a full-link data tracing method based on local data blood-edge digital watermarking, which comprises two parts: (1) constructing a local data blood-edge digital watermark: collecting and monitoring the data processing and circulation processes of the whole life cycle of data through monitoring agents deployed at each terminal in the production/office network, maintaining the local data blood-edge relationship through a digital watermarking technology based on the segment information of the data circulation chain, and providing a data basis for constructing a global data blood-edge map for a server; (2) global data blood-source map construction: the data tracing management platform deployed at the cloud receives the local data blood-edge relation data reported by the terminal, the whole data circulation process and the global data blood-edge map are completely reconstructed at the cloud based on the local data blood-edge relation data, and the full-link accurate tracing of the scenes such as data leakage and the like is realized according to the digital watermark information and the data blood-edge map of the leakage file.
Description
Technical Field
The application relates to the technical field of data tracing and leakage prevention, in particular to a full-link data tracing method based on local data blood-margin (LDL) digital watermark.
Background
The data security is closely related to the network security, is an important component of national master and national security, and the data tracing technology is a key technology for realizing data security and privacy protection. The digital watermarking technology is an effective means for solving the problem of data tracing, and is a technology for embedding specific digital signals into digital products to protect the copyright or integrity of the digital products. The method for tracing data by using digital watermark technology generally embeds watermark into carrier, and then propagates along with carrier, and when security event such as data leakage occurs, it can be extracted as the basis of tracing responsibility. For example, in some application scenarios where enterprises trace the whole life cycle circulation process of internal key data assets, the enterprises generally embed trace flag information into the key data assets in advance in a production network, and then exchange the key data assets from the production network to an office network and perform detailed trace and audit on the whole life cycle circulation process of operation and use on different terminals of the office network by using a digital watermark tracing technology.
The traditional tracing mode based on the digital watermark data has the following defects: traditional data tracing usually traces or audits on the boundary side or on nodes where the data is easy to cause security problems, however, the circulation process of the data at different terminals is a complex graph relationship, and the processing process of the data full link is difficult to trace in a mode of monitoring some nodes of the graph, and the tracing process may face the risks of key data operation and the risk that the nodes cannot trace.
Disclosure of Invention
Aiming at the problems, the application aims to provide a full-link data tracing method based on local data blood-margin (LDL) digital watermark, which constructs a data processing chain acquisition, monitoring and full-link tracing method oriented to the full life cycle of data, covers key data processing scenes such as file creation, reading, modification, movement, copying, outgoing, deletion and the like, tracks and analyzes the flowing and processing process of data in a first field of data processing, establishes a full-link data blood-margin relation, a tracing watermark system and a data flow map, and realizes full-link data tracing.
In order to achieve the above purpose, the application adopts the following technical scheme:
a full-link data tracing method based on local data blood-margin (LDL) digital watermark comprises two parts: local data blood-edge digital watermark construction and global data blood-edge map construction. (1) constructing a local data blood-edge digital watermark: the data processing and circulation processes of the whole life cycle of the data are collected and monitored through monitoring agents deployed at each terminal in the production/office network, and the local data blood-edge relationship is maintained through a digital watermarking technology based on the segment information of the data circulation chain, so that a data basis is provided for the construction of the global data blood-edge map by the server. (2) global data blood-source map construction: the data tracing management platform deployed at the cloud receives the local data blood-edge relation data reported by the terminal, the whole data circulation process and the global data blood-edge map are completely reconstructed at the cloud based on the local data blood-edge relation data, and the full-link accurate tracing of the scenes such as data leakage and the like is realized according to the digital watermark information and the data blood-edge map of the leakage file.
The construction of the local data blood-edge digital watermark comprises the following steps:
step 1: monitoring a data processing process, specifically monitoring key data operation behaviors in a terminal by a data tracing monitoring Agent, wherein the monitoring data processing process comprises data processing scenes such as file creation, reading, modification, movement, copying, outgoing, deletion and the like;
step 2: extracting and analyzing LDL digital watermark, in particular when data operation behavior of specific attention type occurs in the terminal, extracting and analyzing LDL digital watermark information from the file according to the LDL digital watermark proposal provided by the application, wherein the LDL digital watermark information records the data stream records of the last 2 terminals (previous hop terminal Prehop and current terminal CurHop), and the Prehop and CurHop both contain terminal user identity identification information ID, file ID, data stream hop number hop and other information; the key point of the application is that any 2 adjacent nodes in the data flow link are reserved by LDL digital watermarking technology, so that the whole data flow process and the data blood-margin map can be completely reconstructed at the cloud.
Step 3: updating LDL digital watermarks is discussed in more detail in the following:
(1) Initializing LDL digital watermark information when the LDL digital watermark is not extracted, wherein a file ID is set as current file identification information, a PreHop data stream record is empty, the ID of the CurHop data stream record is set as a current terminal user identity, and the data stream hop count hop is set as 0; processing the constructed watermark information and loading the processed watermark information into a file; reporting the operation record to a cloud data traceability management platform;
(2) When the LDL digital watermark is extracted and the ID of the CurHop is the same as the current terminal user identity, the processing is not performed;
(3) When the LDL digital watermark is extracted and the ID of the CurHop is different from the current terminal user identity, the PreHop is set as CurHop information, and then the CurHop information is reset, specifically, the ID of the CurHop data stream record is set as the current terminal user identity, and the data stream hop count hop is increased by 1; processing the constructed watermark information and updating the processed watermark information into a file; and reporting the operation record to the cloud data traceability management platform.
The global data blood-margin map construction comprises the following steps:
step 1: the LDL digital watermark of the leakage file to be analyzed is extracted, in particular to the LDL digital watermark proposal provided by the application is used for extracting and analyzing the LDL digital watermark information from the file, the LDL digital watermark information records the file ID and the data flow record of the last 2 terminals (the last hop terminal Prehop and the current terminal CurHop), and the PreHop and the CurHop both contain the information of the terminal user identity ID, the file ID, the data flow hop number hop and the like.
Step 2: and extracting the file data processing log, specifically extracting all terminal operation records related to the file from the management platform tracing log according to the file ID information extracted from the watermark information.
Step 3: and constructing a full-link data blood-edge map, specifically, combining the data flow segments of all adjacent nodes into a complete relation map according to ID and hop information in PreHop, curHop, wherein the map shows the whole process and branching condition of the data flow from the 0 th hop terminal node to the last hop terminal node.
Step 4: based on ID and hop information in PreHop, curHop of the leakage file LDL digital watermark, backtracking is carried out in the full-link data blood-edge map, so that the whole process of the leakage file circulation (from which propagation path branches flow out) is traced out, and key nodes of data leakage are extracted and used as evidence obtaining basis.
Further, the terminal user identity information ID is from Agent login information, and the Agent resides in a terminal process, maintains the identity information of the current user, and represents the unique identifier of each terminal user; the file ID represents the unique identification of the current file, is set during watermark initialization, is not changed after the setting, and is used by the subsequent hop nodes.
The beneficial effects of the application are as follows:
the application is used for collecting and monitoring the data processing and circulation links of the data full life cycle, and tracking and analyzing the flow and processing process of the data in the first field of the data processing. In particular, in each terminal node in the data flow process, the data flow fragments of 2 adjacent nodes of the last hop terminal and the current terminal are reserved as local data blood edges, the local data blood edge relation is reported to a server and updated to the LDL digital watermark, the whole data flow process and the data blood edge map are completely reconstructed in the cloud, and finally, the full-link accurate tracing to the scenes such as data leakage and the like is completed based on the complete data flow process and the data blood edge map.
Drawings
FIG. 1 is a schematic diagram of the core idea of the present application;
FIG. 2 is a flow chart of an embodiment of the present application.
Detailed Description
In order to make the technical solution of the present application better understood by those skilled in the art, the technical solution of the present embodiment will be clearly and completely described in the following description with reference to the accompanying drawings in the embodiments of the present specification, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, shall fall within the scope of the application. The following examples are only for more clearly illustrating the technical aspects of the present application, and are not intended to limit the scope of the present application.
The idea of the embodiment of the specification is shown in fig. 1, namely, each terminal node in the data circulation process keeps the data circulation segments of 2 adjacent nodes of the last hop terminal and the current terminal as the local data blood margin (LDL) relationship, and reports the LDL information to a server and updates the LDL information to the LDL digital watermark, so that the whole data circulation process and the data blood margin map can be completely reconstructed at the cloud, and the full-link accurate tracing to the scenes such as data leakage and the like is realized. The application is further described below with reference to the accompanying drawings. The flow of the method in the implementation of the application is shown in figure 2, and mainly comprises the following steps:
the construction of the local data blood-edge digital watermark comprises the following steps:
step 1: monitoring a data processing process, namely monitoring key data operation behaviors in a terminal by a data tracing monitoring Agent through kernel programming registration system kernel functions, wherein the data processing scenes comprise file creation, reading, modification, movement, copying, outgoing, deletion and the like; optionally, selective interception may be performed according to configured monitoring policies, such as interception only for specific file suffixes, specific file sizes, specific file types, file handling actions of specific file operations.
Step 2: the LDL digital watermark is extracted and analyzed, and in particular, when the data operation behavior of a specific attention type occurs in the terminal, the LDL digital watermark information is extracted and analyzed from the file according to the LDL digital watermark scheme proposed by the application.
a. The watermark extraction and analysis process is the inverse process of watermark loading, and the watermark loading scheme is described in step 3.
Ldl digital watermark information records the data stream record of the last 2 terminals (last hop terminal PreHop, current terminal CurHop), wherein both PreHop and CurHop contain information such as terminal user identity information ID, file ID, data stream hop count hop, etc., such as { file_id=0x123, prehop= { id=alice, hop=1 }, curhop= { id=bob, hop=2 };
1) The terminal user identity information ID comes from Agent login information, the Agent resides in a terminal process, the identity information of the current user in the enterprise network is maintained, and the unique identity of each terminal user (such as a work number in the enterprise network) is represented;
2) The file ID represents the unique identification of the current file, is set during watermark initialization, is not changed after the setting, and is used by the subsequent hop node; alternatively, the file ID may be set according to the file MD5 value.
Step 3: updating LDL digital watermarks is discussed in more detail in the following:
(1) When LDL digital watermark is not extracted, then
a. Initializing LDL digital watermark information, wherein a file ID is set as current file identification information (optionally, according to a file MD5 value), a PreHop data stream record is emptied, the ID of the CurHop data stream record is set as a current terminal user identity, and the data stream hop count hop is set as 0, such as { file_id=0x123, preHop= { }, curHop= { ID=Carol, hop=0 };
b. embedding the constructed watermark information into a file after processing, and optionally, carrying out integrity check and encryption processing on the watermark information before embedding to convert the watermark information into unreadable binary information; for different file types, different embedding modes can be adopted, such as adopting a least significant bit LBS steganography technology for picture files, and watermark embedding modes such as file header, file tail and the like can be adopted for other files.
c. And reporting the operation record to a cloud data traceability management platform, wherein the operation record uploaded to the cloud can comprise information such as an operation time stamp, terminal information (IP, system and the like), an identity ID, a file name, a file attribute, a file watermark, a stream hop count hop, a file ID, a file fingerprint and the like.
(2) When the LDL digital watermark is extracted and the ID of the CurHop is the same as the current terminal user identity, the processing is not performed;
(3) When the LDL digital watermark is extracted and the CurHop ID is different from the current end user ID, then
a. Setting PreHop as CurHop information, and then resetting CurHop information, specifically setting the ID of the CurHop data stream record as the current end user identity, setting the file ID as the current file identity information, and automatically increasing the hop count hop by 1, if the original watermark information is { file_id=0x123, prehop= { id=alice, hop=1 }, curhop= { id=bob, hop=2 }, then the updated watermark information is { file_id=0x123, prehop= { id=bob, hop=2 }, curHop = { id=cindy, hop=3 };
b. embedding the constructed watermark information into a file after processing, and optionally, carrying out integrity check and encryption processing on the watermark information before embedding to convert the watermark information into unreadable binary information; for different file types, different embedding modes can be adopted, such as adopting a least significant bit LBS steganography technology for picture files, and watermark embedding modes such as file header, file tail and the like can be adopted for other files.
c. And reporting the operation record to a cloud data traceability management platform, wherein the operation record uploaded to the cloud can comprise information such as an operation time stamp, terminal information (IP, system and the like), an identity ID, a file name, a file attribute, a file watermark, a stream hop count hop, a file ID, a file fingerprint and the like.
The global data blood-margin map construction comprises the following steps:
step 1: the LDL digital watermark of the leakage file to be analyzed is extracted, in particular LDL digital watermark information is extracted and analyzed from the file according to the LDL digital watermark scheme provided by the application, the LDL digital watermark information records the data flow record of the last 2 terminals (the last hop terminal Prehop and the current terminal CurHop), and the Prehop and CurHop both contain information such as terminal user identity information ID, file ID, data flow hop number hop and the like, for example { file_id=0x123, prehop= { ID=bob, hop=2 }, curHop= { ID=cindy, hop=3 }.
Step 2: extracting the file data processing log, specifically extracting all terminal operation records R= { r|r.file_id=0x123 } related to the file from a management platform tracing log database according to file ID information file_id=0x123 extracted from watermark information, wherein each R contains PreHop and Curhop information.
Step 3: and constructing a full-link data blood-edge map, specifically, combining the data flow segments of all adjacent nodes into a complete relation map according to ID and hop information in PreHop, curHop, wherein the map shows the whole process and branching condition of the data flow from the 0 th hop terminal node to the last hop terminal node. The specific method is to construct a relation map in a top-down mode, and the specific process is as follows:
the first step: traversing R, and extracting a record of r.CurHop.hop=0 from the R as a root node root of the map;
and a second step of: adding the root into a CUR_LIST LIST;
and a third step of: traversing the cur_list LIST for a CUR node in the LIST;
traversing R, filtering all nodes with r.PreHop.ID=cur.CurHop.ID and r.PreHop.hop=cur.CurHop.hop+1, directing father nodes of the nodes to CUR nodes, and adding the father nodes to a CUR_LIST LIST;
deleting CUR nodes from the cur_list LIST;
fourth step: continuing the third step until the CUR_LIST LIST is empty;
step 4: based on ID and hop information in PreHop, curHop of the leakage file LDL digital watermark, backtracking is carried out in the full-link data blood-edge map, so that the whole process of the leakage file circulation (from which propagation path branches flow out) is traced out, and key nodes of data leakage are extracted and used as evidence obtaining basis.
The foregoing description of the preferred embodiments of the present application has been presented only in terms of those specific and detailed descriptions, and is not, therefore, to be construed as limiting the scope of the application. It should be noted that modifications, improvements and substitutions can be made by those skilled in the art without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.
Claims (2)
1. The full-link data tracing method based on the local data blood-edge digital watermark is characterized by comprising two parts: constructing local data blood-edge digital watermarks and constructing global data blood-edge maps;
the local data blood-edge digital watermark is constructed: collecting and monitoring the data processing and circulation processes of the whole life cycle of data through monitoring agents deployed at each terminal in the production/office network, maintaining the local data blood-edge relationship through a digital watermarking technology based on the segment information of the data circulation chain, and providing a data basis for constructing a global data blood-edge map for a server;
the global data blood-source map construction: receiving local data blood-edge relation data reported by a terminal through a data tracing management platform deployed at a cloud end, based on the local data blood-edge relation data, completely reconstructing the whole data circulation process and a global data blood-edge map at the cloud end, and realizing full-link accurate tracing of a data leakage scene according to digital watermark information and the data blood-edge map of a leakage file;
the construction of the local data blood-edge digital watermark comprises the following steps:
step 11: monitoring a data processing process, wherein a data traceability monitoring Agent monitors key data operation behaviors in a terminal, and the key data operation behaviors comprise file creation, reading, modification, movement, copying, outgoing and deleting data processing scenes;
step 12: extracting and analyzing digital watermark, when data operation action of specific attention type occurs in the terminal, extracting and analyzing LDL digital watermark information from the file, wherein the LDL digital watermark information records the data flow records of a previous hop terminal Prehop and a current terminal CurHop, and both the Prehop and CurHop contain terminal user identity information ID, file ID and data flow hop number hop information;
step 13: updating LDL digital watermark, concretely comprises the following cases:
step 131: initializing LDL digital watermark information when the LDL digital watermark is not extracted, wherein a file ID is set as current file identification information, a PreHop data stream record is empty, the ID of the CurHop data stream record is set as a current terminal user identity, and the data stream hop count hop is set as 0; processing the constructed watermark information and loading the processed watermark information into a file; reporting the operation record to a cloud data traceability management platform;
step 132: when the LDL digital watermark is extracted and the ID of the CurHop is the same as the current terminal user identity, the processing is not performed;
step 133: when the LDL digital watermark is extracted and the ID of the CurHop is different from the current terminal user identity, the PreHop is set as CurHop information, and then the CurHop information is reset, specifically, the ID of the CurHop data stream record is set as the current terminal user identity, and the data stream hop count hop is increased by 1; processing the constructed watermark information and updating the processed watermark information into a file; reporting the operation record to a cloud data traceability management platform;
the global data blood-lineage map construction includes the following steps:
step 21: extracting LDL digital watermark of leakage file to be analyzed, extracting and analyzing LDL digital watermark information from the file, wherein the LDL digital watermark information records file ID, previous hop terminal Prehop and current terminal CurHop data stream record, and both PreHop and CurHop contain terminal user identity information ID, file ID and data stream hop number hop information;
step 22: extracting the file data processing log, and extracting all terminal operation records related to the file from the management platform tracing log according to the file ID information extracted from the LDL watermark information;
step 23: constructing a full-link data blood-edge map, and combining the data flow fragments of all adjacent nodes into a complete relation map according to ID (identification) and hop information in PreHop, curHop, wherein the map shows the whole process and branching condition of the data flow from the 0 th hop terminal node to the last hop terminal node of the file;
step 24: and backtracking is carried out in the full-link data blood-margin map based on ID and hop information in PreHop, curHop in the leakage file LDL digital watermark, so that the whole process of the leakage file circulation is traced, and key nodes of data leakage are extracted and used as evidence obtaining basis.
2. The full-link data tracing method based on local data blood-edge digital watermarking according to claim 1, wherein the terminal user identity information ID is from Agent login information, the Agent resides in a terminal process, maintains identity information of a current user, and represents a unique identifier of each terminal user; the file ID represents the unique identification of the current file, is set during watermark initialization, is not changed after the setting, and is used by the subsequent hop nodes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311017151.3A CN117131477B (en) | 2023-08-14 | 2023-08-14 | Full-link data tracing method based on local data blood-edge digital watermark |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311017151.3A CN117131477B (en) | 2023-08-14 | 2023-08-14 | Full-link data tracing method based on local data blood-edge digital watermark |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117131477A true CN117131477A (en) | 2023-11-28 |
CN117131477B CN117131477B (en) | 2024-03-29 |
Family
ID=88855686
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311017151.3A Active CN117131477B (en) | 2023-08-14 | 2023-08-14 | Full-link data tracing method based on local data blood-edge digital watermark |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117131477B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112800149A (en) * | 2021-02-18 | 2021-05-14 | 浪潮云信息技术股份公司 | Data blood margin analysis-based data management method and system |
WO2021218021A1 (en) * | 2020-04-28 | 2021-11-04 | 平安科技(深圳)有限公司 | Data-based blood relationship analysis method, apparatus, and device and computer-readable storage medium |
CN115934855A (en) * | 2022-11-29 | 2023-04-07 | 广发银行股份有限公司 | Full-link field level blood margin analysis method, system, equipment and storage medium |
CN116579008A (en) * | 2023-03-23 | 2023-08-11 | 中国电子科技集团公司第三十研究所 | Identification-based data tracking and tracing method |
-
2023
- 2023-08-14 CN CN202311017151.3A patent/CN117131477B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021218021A1 (en) * | 2020-04-28 | 2021-11-04 | 平安科技(深圳)有限公司 | Data-based blood relationship analysis method, apparatus, and device and computer-readable storage medium |
CN112800149A (en) * | 2021-02-18 | 2021-05-14 | 浪潮云信息技术股份公司 | Data blood margin analysis-based data management method and system |
CN115934855A (en) * | 2022-11-29 | 2023-04-07 | 广发银行股份有限公司 | Full-link field level blood margin analysis method, system, equipment and storage medium |
CN116579008A (en) * | 2023-03-23 | 2023-08-11 | 中国电子科技集团公司第三十研究所 | Identification-based data tracking and tracing method |
Also Published As
Publication number | Publication date |
---|---|
CN117131477B (en) | 2024-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110460594B (en) | Threat information data acquisition processing method, device and storage medium | |
Lone et al. | Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer | |
CN107818150B (en) | Log auditing method and device | |
Neyaz et al. | Security, privacy and steganographic analysis of FaceApp and TikTok | |
EP3709568A1 (en) | Deleting user data from a blockchain | |
CN101330406B (en) | System and method for monitoring WAP imperfect picture | |
CN106777049B (en) | Processing method and system for avoiding repeated log output | |
CN104778123A (en) | Method and device for detecting system performance | |
CN114780370A (en) | Data correction method and device based on log, electronic equipment and storage medium | |
CN108470039A (en) | Data processing method and device in block chain | |
CN114997843A (en) | Enterprise operation management information storage system | |
CN109409659A (en) | Method for prewarning risk, device, computer equipment and storage medium | |
CN117131477B (en) | Full-link data tracing method based on local data blood-edge digital watermark | |
CN108090364B (en) | Method and system for positioning data leakage source | |
CN111885088A (en) | Log monitoring method and device based on block chain | |
CN111884883A (en) | Quick auditing processing method for service interface | |
CN108563396B (en) | Safe cloud object storage method | |
CN112887923B (en) | Unsupervised abnormal short text monitoring method and system based on dynamic communication network | |
CN110489576A (en) | Picture resource processing method and system, client, server, processor and medium | |
CN116185296A (en) | Distributed safe storage system based on multimedia teleconference information | |
US20150286808A1 (en) | Marked image file security system and process | |
CN115827780A (en) | Method, system and storage medium for realizing cross-network-area data synchronization by using scheduling algorithm based on isolation device | |
US20150286807A1 (en) | Marked image file security system and process | |
CN111914147A (en) | Suspected actual control person credit investigation method and system for enterprise | |
US20150286651A1 (en) | Marked image file security system and process |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Shao Guolin Inventor after: Lu Yi Inventor after: Zeng Xuemei Inventor before: Shao Guolin |
|
GR01 | Patent grant | ||
GR01 | Patent grant |