CN106295406A - A kind of block chain that is used for is from safe storage system and method thereof - Google Patents

A kind of block chain that is used for is from safe storage system and method thereof Download PDF

Info

Publication number
CN106295406A
CN106295406A CN201610665287.9A CN201610665287A CN106295406A CN 106295406 A CN106295406 A CN 106295406A CN 201610665287 A CN201610665287 A CN 201610665287A CN 106295406 A CN106295406 A CN 106295406A
Authority
CN
China
Prior art keywords
file
transaction
data
storage system
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610665287.9A
Other languages
Chinese (zh)
Inventor
张丛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Fanxi Electronics Co Ltd
Original Assignee
Shenzhen Fanxi Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Fanxi Electronics Co Ltd filed Critical Shenzhen Fanxi Electronics Co Ltd
Priority to CN201610665287.9A priority Critical patent/CN106295406A/en
Priority to PCT/CN2016/095580 priority patent/WO2018032376A1/en
Publication of CN106295406A publication Critical patent/CN106295406A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of for block chain from safe storage system and method thereof, including (1) finger daemon module, be arranged on client, for for file access services;(2) former data evolution module, for one redaction of former data creation for each access file;(3) besel, for getting off all data and former data recording, for tracing to the source and analyzing the access that any discomfort is suitable;(4) transaction data completeness maintaining module, for there is the invasion under besel monitors any time, system ensure that the integrity of the All Activity data at place is selected in invasion;(5) isolation module, is used for guaranteeing that user will not be by being queried the in-problem transaction file of degree of belief, and described transaction file can lose transaction data in phagocytic process, and the file after the unwitting access of user will not be allowed to be changed by invader.Use this block chain from safe storage system and method, the same files that recovery that can be the most complete is invaded.

Description

A kind of block chain that is used for is from safe storage system and method thereof
Technical field
The present invention relates to the transaction data safety problem of block chain, a kind of block chain from safe storage system and Its method.
Background technology
The appearance of bit coin in 2009 brings a kind of subversive achievement--and block chain technology, block chain is a safety Account book class data base, be made up of data block one by one, user can this constantly update upgrading platform search number According to, for financial institution, block chain can accelerate trading processing process, reduce cost, reduce go-between, improve market see clearly Power, increases business transparency.
Calculating and storage are two big basic tasks of computer system, along with the explosive increase of information, memory unit meeting Experience direct-connected storage based on Single-Server, store to cluster grid based on LAN, finally develop into based on wide area network Data grids, block chain technology is the least significant end of development at present, and the intrinsic speciality of this data storage medium includes intelligentized Storage, storage service quality can ensure that applies offer service differentiation and performance guarantee for user, and storage is OO sea Amount stores, and the network storage must assure that it is that secret is complete and safe, and existing the Internet does not also have well or side Just way ensure the data in block chain transmitting procedure and preserve the confidentiality of data on a storage device, integrity, can With property, non repudiation and the unfailing performance of whole network store system, the most in recent years block chain reliable computing technology Generation, to the network storage safety higher requirement is proposed again.
Summary of the invention
It is an object of the invention to provide a kind of for block chain from safe storage system and method thereof, including: (1) is kept Protect scheduler module, be arranged on client, be used for as file access services;(2) former data evolution module, for accessing literary composition for each One redaction of the former data creation of part;(3) besel, for getting off all data and former data recording, except record is each Planting outside the dominant write operation of amendment data, the access to file all can be recorded by updating the daily record of file every time, For tracing to the source and analyzing the access that any discomfort is suitable;(4) transaction data completeness maintaining module, for occurring at any time Invasion under besel monitors, system ensure that the integrity of the All Activity data at place is selected in invasion;(5) isolation mode Block, is used for guaranteeing that user will not be by being queried the in-problem transaction file of degree of belief, described transaction file is at phagocytic process In can lose transaction data, and the file after the unwitting access of user will not be allowed to be changed by invader.
Preferably, also include that a secondary transaction data recovers module, be used for recovering occur when invasion and find invasion Between the transaction data that caused of legal change lose.
Preferably, last before transaction file can return to invasion reliably accesses, and single in checking After the access log of transaction file, without finding unfavorable exception record, these transaction files can be by the most extensive Multiple.
Preferably, carrying out recording transaction file in terms of time and space two, a kind of is to use former transaction based on daily record Data time writing-method, the second is binary tree spatial registration method based on multi version daily record.
Preferably, the module that guarantee confidentiality is not provided from safe storage system of block chain, it is assumed that these are from safe magnetic Dish and one use the transaction file server of standard authentication protocol to connect, and all are sent to this request from safe storage system Need not extra certification and encryption.
Use this block chain from safe storage system, the transaction data literary composition that recovery that can be the most complete is invaded Part.
The present invention's.
According to below in conjunction with the accompanying drawing detailed description to the specific embodiment of the invention, those skilled in the art will be brighter Above-mentioned and other purposes, advantage and the feature of the present invention.
Accompanying drawing explanation
Describe some specific embodiments of the present invention the most by way of example, and not by way of limitation in detail. Reference identical in accompanying drawing denotes same or similar parts or part.It should be appreciated by those skilled in the art that these Accompanying drawing is not necessarily drawn to scale.The target of the present invention and feature will be apparent from view of the description below in conjunction with accompanying drawing, In accompanying drawing:
Fig. 1 is that the block chain according to the embodiment of the present invention is from the structural representation of safe storage system.
Detailed description of the invention
Before carrying out the explanation of detailed description of the invention, the content discussed for apparent expression, first define Some very important concepts.
Transaction: the essence of transaction is a relational data structure, comprises transaction participant's value Transfer in this data structure Relevant information.These Transaction Informations are referred to as ledger of keeping accounts.Transaction need to create through three, verify, write block chain.Hand over Easily have to pass through digital signature, it is ensured that the legitimacy of transaction.
Block: all of Transaction Information is deposited in block, a Transaction Information is exactly a record, as an independence Record deposit in block chain.Block is made up of block head and data division, and block head field comprises each of block itself Plant characteristic, the most previous block information, merkle value and timestamp etc..Wherein block head cryptographic Hash and block height are tag slots The topmost two indices of block.Block primary identifier is its cryptographic hash, and one carries out two by SHA algorithm to block head Secondary Hash calculation and the digital finger-print that obtains.The 32 byte cryptographic Hash produced are referred to as block cryptographic Hash, or block head Hash Value, only block head are used for calculating.Block cryptographic Hash can uniquely, specifically identify a block, and any node leads to Cross and simply block head is carried out Hash calculation can obtain this block cryptographic Hash independently.
Block chain: the data structure being chained up in order according to chain structure by block.Block chain is vertical just as one Storehouse, first block is placed on other blocks as the first block at the bottom of stack, the most each block.When block writes To change never after block chain, and backup on other block chain server.
Embodiment:
The confidentiality of any system the most all can be broken, and therefore primary goal is to prevent transaction data from being destroyed, And by detection and the source of diagnosis capture invasion block catenary system.See Fig. 1, a kind of storing from safety for block chain System, storage principle based on the distrust to host operating system, need some basic computings to manage file system, visitor Family end installs a finger daemon module, serves file access.Should not provide from safe storage system and ensured arranging of confidentiality Execute, it is assumed that these use the transaction file server of standard authentication protocol to connect from security disk and one, all be sent to Extra certification and encryption should be need not from the request of safe storage system.
Block chain include former data evolution module from safe storage system, for for each access file former data create Build a redaction.
And also include a besel, for all data and former data recording being got off, except recording various amendment Outside the dominant write operation of data, the access to file all can be recorded by updating the daily record of file every time, so appoints What unfavorable access can be traced to the source and analyzed, and once arranges besel, the most inevitable close to prison off guard during data Depending on, thus get rid of invader in the way of not detectable, change data.Also include transaction data completeness maintaining module, for right Invasion under besel monitors occurs at any time, and system ensure that the complete of the All Activity data at invasion point Property, by detailed record, after block chain manager finds invasion, it is last that file can return to before invasion reliably One access, additionally, after the access log verifying single transaction file, without finding unfavorable exception record, this A little transaction files can intactly be recovered.
Also including isolation module, those are queried the in-problem transaction file of degree of belief and will be lost in phagocytic process By from the interrupter of safe storage system, transaction data, guarantees that user can not receive these problematic files, and will not File after allowing the unwitting access of user be changed by invader.
Can also include that a secondary transaction data recovers module, be used for recovering to occur when invasion and find between invasion The transaction data that caused of legal change lose, thus improve transaction data availability, minimization of loss.
Being required for doing a daily record in view of accessing for each transaction file, the present embodiment was carried out in terms of time and space two Record, a kind of is to use former transaction data chronography based on daily record, and the second is binary system based on multi version daily record Tree spatial registration method.From the point of view of recovery time of transaction data after the invasion to certain a transaction file and recovery, should System is obtained in that the speed improvement than legacy system more than about 1 times, and 100% recovers transaction data.
Although the present invention is described by reference to specific illustrative embodiment, but will not be by these embodiments Restriction and only limited by accessory claim.Skilled artisan would appreciate that can be without departing from the present invention's In the case of protection domain and spirit, embodiments of the invention can be modified and revise.

Claims (10)

1. one kind for block chain from safe storage system, it is characterised in that including:
(1) finger daemon module, is arranged on client, is used for as file access services;
(2) former data evolution module, for one redaction of former data creation for each access file;
(3) besel, for getting off all data and former data recording, except recording the dominant write operation of various amendment data Outward, the access to file all can be recorded by updating the daily record of file every time, is used for tracing to the source and analyzing any discomfort Suitable access;
(4) transaction data completeness maintaining module, for the invasion occurred at any time under besel monitors, system energy Enough integrity ensureing to select the All Activity data at place to invasion;
(5) isolation module, is used for guaranteeing that user will not be by being queried the in-problem transaction file of degree of belief, described transaction literary composition Part can lose transaction data in phagocytic process, and the file after the unwitting access of user will not be allowed to be changed by invader.
The most according to claim 1 a kind of for block chain from safe storage system, it is characterised in that: also include one Secondary transaction data recovers module, the transaction that the legal change for recovering to occur when invasion and find between invasion is caused Loss of data.
The most according to claim 1 a kind of for block chain from safe storage system, it is characterised in that:, described transaction Last before file can return to invasion reliably accesses, and is verifying the access log of single transaction file After, without finding unfavorable exception record, these transaction files can intactly be recovered.
The most according to claim 1 a kind of for block chain from safe storage system, it is characterised in that: from time and sky Between two aspects carry out recording described transaction file, a kind of is to use former transaction data chronography based on daily record, the second It it is binary tree spatial registration method based on multi version daily record.
The most according to claim 1 a kind of for block chain from safe storage system, it is characterised in that: described block chain The module ensureing confidentiality is not provided from safe storage system, it is assumed that these use standard authentication association from security disk and one The transaction file server of view connects, and all are sent to this and need not extra certification from the request of safe storage system and add Close.
6. one kind for block chain from safe storage system, it is characterised in that comprise the steps:
(1) finger daemon module, is arranged on client, is used for as file access services;
(2) former data evolution module, for one redaction of former data creation for each access file;
(3) besel, for getting off all data and former data recording, except recording the dominant write operation of various amendment data Outward, the access to file all can be recorded by updating the daily record of file every time, is used for tracing to the source and analyzing any discomfort Suitable access;
(4) transaction data completeness maintaining module, for the invasion occurred at any time under besel monitors, system energy Enough integrity ensureing to select the All Activity data at place to invasion;
(5) isolation module, is used for guaranteeing that user will not be by being queried the in-problem transaction file of degree of belief, described transaction literary composition Part can lose transaction data in phagocytic process, and the file after the unwitting access of user will not be allowed to be changed by invader.
The most according to claim 6 a kind of for block chain from safe storage system, it is characterised in that: also include one Secondary transaction data recovers module, the transaction that the legal change for recovering to occur when invasion and find between invasion is caused Loss of data.
The most according to claim 6 a kind of for block chain from safe storage system, it is characterised in that:, described transaction Last before file can return to invasion reliably accesses, and is verifying the access log of single transaction file After, without finding unfavorable exception record, these transaction files can intactly be recovered.
The most according to claim 6 a kind of for block chain from safe storage system, it is characterised in that: from time and sky Between two aspects carry out recording described transaction file, a kind of is to use former transaction data chronography based on daily record, the second It it is binary tree spatial registration method based on multi version daily record.
The most according to claim 6 a kind of for block chain from safe storage system, it is characterised in that: described block The module that guarantee confidentiality is not provided from method for secure storing of chain, it is assumed that these use standard authentication from security disk and one The transaction file server of agreement connects, and all are sent to this and need not extra certification from the request of safe storage system and add Close.
CN201610665287.9A 2016-08-13 2016-08-13 A kind of block chain that is used for is from safe storage system and method thereof Pending CN106295406A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610665287.9A CN106295406A (en) 2016-08-13 2016-08-13 A kind of block chain that is used for is from safe storage system and method thereof
PCT/CN2016/095580 WO2018032376A1 (en) 2016-08-13 2016-08-16 Self-securing storage system and method for block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610665287.9A CN106295406A (en) 2016-08-13 2016-08-13 A kind of block chain that is used for is from safe storage system and method thereof

Publications (1)

Publication Number Publication Date
CN106295406A true CN106295406A (en) 2017-01-04

Family

ID=57670625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610665287.9A Pending CN106295406A (en) 2016-08-13 2016-08-13 A kind of block chain that is used for is from safe storage system and method thereof

Country Status (2)

Country Link
CN (1) CN106295406A (en)
WO (1) WO2018032376A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107241360A (en) * 2017-08-04 2017-10-10 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system
CN107329888A (en) * 2017-05-31 2017-11-07 深圳前海微众银行股份有限公司 Intelligent contract command code coverage rate computational methods and system
CN107943833A (en) * 2017-10-25 2018-04-20 华南农业大学 A kind of storage of non-stop layer distributed document and search method based on block chain
CN108521434A (en) * 2018-05-29 2018-09-11 广西电网有限责任公司 A kind of network security intrusion detecting system based on block chain technology
CN109558064A (en) * 2017-09-25 2019-04-02 航天信息股份有限公司 A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain
CN109829297A (en) * 2017-11-23 2019-05-31 财团法人资讯工业策进会 Monitoring device, method and its computer storage medium
CN110019235A (en) * 2017-12-29 2019-07-16 百度在线网络技术(北京)有限公司 Data storage, restoration methods, device, equipment and medium based on block chain
CN110163007A (en) * 2019-04-23 2019-08-23 西安邮电大学 Data integrity verification method, equipment and storage medium based on block chain
CN110309166A (en) * 2019-07-10 2019-10-08 中国电子科技集团公司第二十八研究所 A kind of geographical altitude data polishing method traced to the source
WO2020010763A1 (en) * 2018-07-12 2020-01-16 中国科学院深圳先进技术研究院 Blockchain spatio-temporal data querying method and system, and electronic apparatus
CN114553488A (en) * 2022-01-24 2022-05-27 四川华西集采电子商务有限公司 Square encryption bidding method and system

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741064B (en) * 2019-01-10 2023-05-05 广东工业大学 Method and system for processing censoring attack, electronic equipment and storage medium
CN110781531B (en) * 2019-09-04 2023-04-07 安徽省粮油信息中心(安徽粮食批发交易市场管委会) Tamper-proof grain depot data secure storage system and method
CN111680111B (en) * 2020-05-29 2023-09-01 泰康保险集团股份有限公司 Billing method and device, computer equipment and computer readable storage medium
CN113570384A (en) * 2021-07-26 2021-10-29 大连民族大学 Agricultural product tracing method and system based on block chain
CN115437852B (en) * 2022-11-07 2023-02-03 四川大学 Rapid block chain system and method based on disaster recovery and file partition table

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101403988A (en) * 2008-11-05 2009-04-08 中国科学院计算技术研究所 File back-up system and method of computer system
CN102082704A (en) * 2009-11-30 2011-06-01 ***通信集团河北有限公司 Safety monitoring method and system
CN102339321A (en) * 2011-11-09 2012-02-01 上海盛霄云计算技术有限公司 Network file system with version control and method using same
CN104392405A (en) * 2014-11-14 2015-03-04 杭州银江智慧医疗集团有限公司 Electronic medical record safety system
CN105844505A (en) * 2016-03-17 2016-08-10 深圳市新世纪启航科技开发有限公司 Method of carrying out digital currency trading through block chain technology

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8799247B2 (en) * 2011-02-11 2014-08-05 Purdue Research Foundation System and methods for ensuring integrity, authenticity, indemnity, and assured provenance for untrusted, outsourced, or cloud databases
CN102981945B (en) * 2012-12-31 2016-02-10 北京京东世纪贸易有限公司 A kind of unfailing performance supervisory system and method
CN104281808B (en) * 2014-09-25 2017-09-01 中国科学院信息工程研究所 A kind of general Android malicious act detection methods
CN105183609B (en) * 2015-09-16 2017-03-15 焦点科技股份有限公司 A kind of real-time monitoring system for being applied to software system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101403988A (en) * 2008-11-05 2009-04-08 中国科学院计算技术研究所 File back-up system and method of computer system
CN102082704A (en) * 2009-11-30 2011-06-01 ***通信集团河北有限公司 Safety monitoring method and system
CN102339321A (en) * 2011-11-09 2012-02-01 上海盛霄云计算技术有限公司 Network file system with version control and method using same
CN104392405A (en) * 2014-11-14 2015-03-04 杭州银江智慧医疗集团有限公司 Electronic medical record safety system
CN105844505A (en) * 2016-03-17 2016-08-10 深圳市新世纪启航科技开发有限公司 Method of carrying out digital currency trading through block chain technology

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107329888A (en) * 2017-05-31 2017-11-07 深圳前海微众银行股份有限公司 Intelligent contract command code coverage rate computational methods and system
CN107329888B (en) * 2017-05-31 2019-10-18 深圳前海微众银行股份有限公司 Intelligent contract operation code coverage rate calculation method and system
CN107241360A (en) * 2017-08-04 2017-10-10 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system
CN107241360B (en) * 2017-08-04 2019-01-18 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system
CN109558064A (en) * 2017-09-25 2019-04-02 航天信息股份有限公司 A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain
CN109558064B (en) * 2017-09-25 2022-06-07 航天信息股份有限公司 Electronic invoice data chain synchronization method, device, medium and electronic equipment
CN107943833A (en) * 2017-10-25 2018-04-20 华南农业大学 A kind of storage of non-stop layer distributed document and search method based on block chain
CN109829297A (en) * 2017-11-23 2019-05-31 财团法人资讯工业策进会 Monitoring device, method and its computer storage medium
CN109829297B (en) * 2017-11-23 2022-04-19 财团法人资讯工业策进会 Monitoring device, method and computer storage medium thereof
CN110019235A (en) * 2017-12-29 2019-07-16 百度在线网络技术(北京)有限公司 Data storage, restoration methods, device, equipment and medium based on block chain
CN110019235B (en) * 2017-12-29 2021-08-17 百度在线网络技术(北京)有限公司 Block chain based data storage and recovery method, device, equipment and medium
CN108521434A (en) * 2018-05-29 2018-09-11 广西电网有限责任公司 A kind of network security intrusion detecting system based on block chain technology
WO2020010763A1 (en) * 2018-07-12 2020-01-16 中国科学院深圳先进技术研究院 Blockchain spatio-temporal data querying method and system, and electronic apparatus
CN110163007A (en) * 2019-04-23 2019-08-23 西安邮电大学 Data integrity verification method, equipment and storage medium based on block chain
CN110163007B (en) * 2019-04-23 2021-05-04 西安邮电大学 Block chain-based data integrity verification method, equipment and storage medium
CN110309166B (en) * 2019-07-10 2021-10-01 中国电子科技集团公司第二十八研究所 Traceable geographic elevation data completion method
CN110309166A (en) * 2019-07-10 2019-10-08 中国电子科技集团公司第二十八研究所 A kind of geographical altitude data polishing method traced to the source
CN114553488A (en) * 2022-01-24 2022-05-27 四川华西集采电子商务有限公司 Square encryption bidding method and system

Also Published As

Publication number Publication date
WO2018032376A1 (en) 2018-02-22

Similar Documents

Publication Publication Date Title
CN106295406A (en) A kind of block chain that is used for is from safe storage system and method thereof
US11829494B2 (en) Distributed privately subspaced blockchain data structures with secure access restriction management
US10789597B2 (en) Systems and methods for using a distributed ledger for data handling
CN106131048A (en) A kind of non-trusted remote transaction file security for block chain stores system
CN106295401A (en) A kind of read-only secure file storage system and method for block chain
CN106302720A (en) A kind of for block chain Survivable storage system and method
US8321688B2 (en) Secure and private backup storage and processing for trusted computing and data services
CN106055993A (en) Encryption storage system for block chains and method for applying encryption storage system
US11907199B2 (en) Blockchain based distributed file systems
JP2021518705A (en) Runtime self-modification for blockchain ledger
US20100318782A1 (en) Secure and private backup storage and processing for trusted computing and data services
CN106330452A (en) Security network attachment device and method for block chain
CN109741162A (en) The storage of personal collage-credit data, processing, sharing method and system based on block chain
US11082409B2 (en) Verifying message authenticity with decentralized tamper-evident logs
EP3709568A1 (en) Deleting user data from a blockchain
JP7358396B2 (en) Secure dataset management
US20220329446A1 (en) Enhanced asset management using an electronic ledger
US11868339B2 (en) Blockchain based distributed file systems
CN106326752B (en) A kind of program-controlled encryption document storage system and its method for block chain
WO2022116761A1 (en) Self auditing blockchain
US20230129227A1 (en) System and method for generating a table-driven mutable blockchain
US20230054904A1 (en) Layered-Infrastructure Blockchain-Based System for Software License Distribution
Kumar et al. Improved write access control and stronger freshness guarantee to outsourced data
Nagesh et al. Cloud architectures encountering data security and privacy concerns—A review
Veloso Automated support tool for forensics investigation on hard disk images

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170104

WD01 Invention patent application deemed withdrawn after publication