CN111125020A - Block chain-based information security management method, system and server - Google Patents

Block chain-based information security management method, system and server Download PDF

Info

Publication number
CN111125020A
CN111125020A CN201911330924.7A CN201911330924A CN111125020A CN 111125020 A CN111125020 A CN 111125020A CN 201911330924 A CN201911330924 A CN 201911330924A CN 111125020 A CN111125020 A CN 111125020A
Authority
CN
China
Prior art keywords
hash value
stored
information
data
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911330924.7A
Other languages
Chinese (zh)
Inventor
王振辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Fanyi University
Original Assignee
Xian Fanyi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Fanyi University filed Critical Xian Fanyi University
Priority to CN201911330924.7A priority Critical patent/CN111125020A/en
Publication of CN111125020A publication Critical patent/CN111125020A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • G06F16/152File search processing using file content signatures, e.g. hash values
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/172Caching, prefetching or hoarding of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Library & Information Science (AREA)
  • Storage Device Security (AREA)

Abstract

The information safety management method based on the block chain comprises the steps of firstly determining information to be stored, then storing the information to be stored on a data cloud, and obtaining stored data; the information to be stored is registered at any node of the block chain, the block chain calculates the information to be stored according to a preset method to obtain a first hash value, the block chain registers the first hash value, stores the first hash value on the block chain and records the block information.

Description

Block chain-based information security management method, system and server
Technical Field
The invention relates to the technical field of information security, in particular to a block chain-based information security management method, a block chain-based information security management system and a block chain-based information security management server.
Background
Information acquisition is becoming easier today with the popularity of the internet and with its breakthrough growth. In early societies, people looking for information may need to go to a library to look up many related books to find related information. Today, however, people simply sit at home, then connect to a portal site through a tool, and type in keywords, to obtain a lot of relevant information. Although the internet makes human life more convenient, information security is becoming less and less.
The existing method for protecting information safety is to encrypt and store information and encrypt information to be protected, but even if the information is encrypted, a person who knows a decryption method, such as a professional worker, can decrypt the information by himself and change the information, and the person who stores the information cannot know the information without changing the encryption mode, so that the safety degree of the information is poor and the accuracy of the information cannot be guaranteed.
Disclosure of Invention
The embodiment of the invention aims to provide a block chain-based information security management method, a block chain-based information security management system and a block chain-based information security management server so as to improve the accuracy of stored information. The specific technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a block chain-based information security management method, including:
determining information to be stored, wherein the information to be stored is any one of image data, video stream data, computer data and confidential data;
storing the information to be stored on a data cloud to obtain stored data; wherein, the data cloud is any one of Baidu cloud, Google cloud and Microsoft network disk;
registering the information to be stored at any node of a block chain, calculating the information to be stored by the block chain according to a preset method to obtain a first hash value, storing and registering the first hash value by the block chain, and recording block information.
Optionally, after recording the block information, the method further includes:
when the stored data needs to be verified, extracting the stored data from the data cloud, and calculating the stored data by using a preset method to obtain a second hash value;
comparing the first hash value to the second hash value:
when the first hash value is the same as the second hash value, the stored information is authentic;
when the first hash value is different from the second hash value, the stored information is not authentic.
Optionally, the preset method is a hash algorithm.
Optionally, the block information includes a block height and a block chain timestamp.
Optionally, after storing the first hash value on the block chain and recording block information, the method further includes:
and encrypting the first hash value by using a preset secret key.
Optionally, before when the stored data needs to be verified, the method further includes:
and decrypting the first hash value by using a preset secret key.
In a second aspect, an embodiment of the present invention provides an information security management system based on a block chain, including:
the device comprises a determining module, a storage module and a storage module, wherein the determining module is used for determining information to be stored, and the information to be stored is any one of image data, video stream data, computer data and confidential data;
the storage module is used for storing the information to be stored on a data cloud to obtain stored data; wherein, the data cloud is any one of Baidu cloud, Google cloud and Microsoft network disk;
and the block chain module is used for registering the information to be stored at any node of a block chain, the block chain calculates the information to be stored according to a preset method to obtain a first hash value, the block chain registers the first hash value, stores the first hash value on the block chain, and records the block information.
Optionally, the method further includes:
the verification module is used for extracting the stored data from the data cloud when the stored data needs to be verified, and calculating the stored data by using a preset method to obtain a second hash value;
a comparison module to compare the first hash value to the second hash value:
when the first hash value is the same as the second hash value, the stored information is authentic;
when the first hash value is different from the second hash value, the stored information is not authentic.
Optionally, the hash table further includes an encryption module, configured to encrypt the first hash value by using a preset key.
Optionally, the hash table further includes a decryption module, configured to decrypt the first hash value with a preset key.
In a third aspect, an embodiment of the present invention provides a server, including a processor, a communication interface, a memory, and a communication bus, where the processor and the communication interface complete communication between the memory and the processor through the communication bus;
a memory for storing a computer program;
and the processor is used for realizing the steps of the method when executing the program stored in the memory.
The information security management method based on the block chain comprises the steps of firstly determining information to be stored, wherein the information to be stored can be image data, video stream data, computer data or confidential data; then, storing the information to be stored on a data cloud to obtain stored data; the data cloud is any one of Baidu cloud, Google cloud and Microsoft network disk, information to be stored is registered at any node of a block chain, the block chain calculates the information to be stored according to a preset method to obtain a first hash value, the block chain registers the first hash value, stores the first hash value on the block chain and records block information, the block chain-based information security management method can be used for uniquely binding the hash value with a storage file, due to the nature of the block chain, the hash value stored on the block chain cannot be modified by a single block belonging to the block chain, if the hash value is modified by law, the modification of the single block is not identified in other blocks of the block chain, namely the hash value stored on the block chain cannot be modified on the single block, so that the hash value of the block information corresponding to the data is ensured not to be modified, when the stored information needs to be verified, only the data stored on the data cloud needs to be recalculated into the hash value, the recalculated hash value is compared with the hash value stored on the blockchain, and if the recalculated hash value is consistent with the hash value stored on the blockchain, the data stored on the data cloud is not modified.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
Fig. 1 is a flowchart of an information security management method based on a block chain according to an embodiment of the present invention;
fig. 2 is a module connection diagram of an information security management system based on a block chain according to an embodiment of the present invention;
fig. 3 is a module connection diagram of a server according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.
In order to improve the accuracy of stored information, embodiments of the present invention provide a block chain-based information security management method, system, and server.
In a first aspect, referring to fig. 1, an embodiment of the present invention provides a block chain-based information security management method, including:
s110, determining information to be stored, wherein the information to be stored is any one of image data, video stream data, computer data and confidential data;
s120, storing the information to be stored on a data cloud to obtain stored data; wherein, the data cloud is any one of Baidu cloud, Google cloud and Microsoft network disk;
s130, registering the information to be stored at any node of a block chain, calculating the information to be stored by the block chain according to a preset method to obtain a first hash value, storing and registering the first hash value by the block chain, and recording block information.
Specifically, the information security management method based on the block chain provided by the embodiment of the present invention includes first determining information to be stored, where the information to be stored may be image data, video stream data, computer data, or secret data, and in other words, all data encountered by a user in practical application may be stored by using the method provided by the embodiment of the present invention; then, storing the information to be stored on a data cloud to obtain stored data; the data cloud is any one of Baidu cloud, Google cloud and Microsoft network disk, information to be stored is registered at any node of a block chain, the block chain calculates the information to be stored according to a preset method to obtain a first hash value, the block chain registers the first hash value, stores the first hash value on the block chain and records block information, the block chain-based information security management method can be used for uniquely binding the hash value with a storage file, due to the nature of the block chain, the hash value stored on the block chain cannot be modified by a single block belonging to the block chain, if the hash value is modified by law, the modification of the single block is not identified in other blocks of the block chain, namely the hash value stored on the block chain cannot be modified on the single block, so that the hash value of the block information corresponding to the data is ensured not to be modified, when the stored information needs to be verified, only the data stored on the data cloud needs to be recalculated into the hash value, the recalculated hash value is compared with the hash value stored on the blockchain, and if the recalculated hash value is consistent with the hash value stored on the blockchain, the data stored on the data cloud is not modified.
Further, after recording the block information, the method further includes:
s140, when the stored data need to be verified, extracting the stored data from the data cloud, and calculating the stored data by using a preset method to obtain a second hash value;
s150, comparing the first hash value with the second hash value:
when the first hash value is the same as the second hash value, the stored information is authentic;
when the first hash value is different from the second hash value, the stored information is not authentic.
It should be noted that the data cloud may be an existing storage substrate, or may be a hardware storage device, such as a usb disk, a mobile hard disk, or the like, which is not limited in the embodiment of the present invention, when the storage information needs to be verified, only the data stored in the data cloud needs to be recalculated with a hash algorithm, and the recalculated hash value is compared with the hash value stored in the blockchain, and if the hash value is consistent with the hash value stored in the blockchain, the data stored in the data cloud is not modified. If the data are inconsistent, the data stored on the data cloud are proved to be changed, the data are not referential, in the block chain technology, hash values obtained by different data calculation are different necessarily, and the obtained hash values are the same no matter how many times the hash values are calculated by the same object.
Further, the preset method is a hash algorithm.
Further, the block information includes a block height and a block chain timestamp.
Further, after storing the first hash value on the block chain and recording block information, the method further includes:
and encrypting the first hash value by using a preset secret key.
Further, before the time when the stored data needs to be verified, the method further comprises:
and decrypting the first hash value by using a preset secret key.
It should be noted that, in the embodiment of the present invention, an encryption means is used to encrypt the first hash value stored in the blockchain, so that it is possible to effectively prevent a user without a decryption means from being unable to obtain the first hash value, thereby improving the storage security of the first hash value, and further indirectly improving the security of the data uniquely corresponding to the first hash value.
Specifically, the information security management method based on the block chain provided by the embodiment of the present invention includes first determining information to be stored, where the information to be stored may be image data, video stream data, computer data, or secret data, and in other words, all data encountered by a user in practical application may be stored by using the method provided by the embodiment of the present invention; then, storing the information to be stored on a data cloud to obtain stored data; the data cloud is any one of Baidu cloud, Google cloud and Microsoft network disk, information to be stored is registered at any node of a block chain, the block chain calculates the information to be stored according to a preset method to obtain a first hash value, the block chain registers the first hash value, stores the first hash value on the block chain and records block information, the block chain-based information security management method can be used for uniquely binding the hash value with a storage file, due to the nature of the block chain, the hash value stored on the block chain cannot be modified by a single block belonging to the block chain, if the hash value is modified by law, the modification of the single block is not identified in other blocks of the block chain, namely the hash value stored on the block chain cannot be modified on the single block, so that the hash value of the block information corresponding to the data is ensured not to be modified, when the stored information needs to be verified, only the data stored on the data cloud needs to be recalculated into the hash value, the recalculated hash value is compared with the hash value stored on the blockchain, and if the recalculated hash value is consistent with the hash value stored on the blockchain, the data stored on the data cloud is not modified.
In a second aspect, an embodiment of the present invention provides an information security management system based on a block chain, including:
the device comprises a determining module, a storage module and a storage module, wherein the determining module is used for determining information to be stored, and the information to be stored is any one of image data, video stream data, computer data and confidential data;
the storage module is used for storing the information to be stored on a data cloud to obtain stored data; wherein, the data cloud is any one of Baidu cloud, Google cloud and Microsoft network disk;
and the block chain module is used for registering the information to be stored at any node of a block chain, the block chain calculates the information to be stored according to a preset method to obtain a first hash value, the block chain registers the first hash value, stores the first hash value on the block chain, and records the block information.
Further, the method also comprises the following steps:
the verification module is used for extracting the stored data from the data cloud when the stored data needs to be verified, and calculating the stored data by using a preset method to obtain a second hash value;
a comparison module to compare the first hash value to the second hash value:
when the first hash value is the same as the second hash value, the stored information is authentic;
when the first hash value is different from the second hash value, the stored information is not authentic.
Further, the hash table further comprises an encryption module, configured to encrypt the first hash value with a preset key.
Further, the hash table further comprises a decryption module, configured to decrypt the first hash value with a preset key.
In a third aspect, an embodiment of the present invention provides a server, including a processor, a communication interface, a memory, and a communication bus, where the processor and the communication interface complete communication between the memory and the processor through the communication bus;
a memory for storing a computer program;
the processor is used for realizing the following steps when executing the program stored in the memory:
s110, determining information to be stored, wherein the information to be stored is any one of image data, video stream data, computer data and confidential data;
s120, storing the information to be stored on a data cloud to obtain stored data; wherein, the data cloud is any one of Baidu cloud, Google cloud and Microsoft network disk;
s130, registering the information to be stored at any node of a block chain, calculating the information to be stored by the block chain according to a preset method to obtain a first hash value, registering the first hash value by the block chain, storing the first hash value on the block chain, and recording block information.
S140, when the stored data need to be verified, extracting the stored data from the data cloud, and calculating the stored data by using a preset method to obtain a second hash value;
s150, comparing the first hash value with the second hash value:
when the first hash value is the same as the second hash value, the stored information is authentic;
when the first hash value is different from the second hash value, the stored information is not authentic.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
In yet another embodiment provided by the present invention, a computer-readable storage medium is further provided, which has instructions stored therein, and when the instructions are executed on a computer, the instructions cause the computer to execute any one of the steps S110 to S150 in the above-mentioned embodiment.
In a further embodiment provided by the present invention, there is also provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform any of the steps S110-S150 of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (10)

1. An information security management method based on a block chain is characterized by comprising the following steps:
determining information to be stored, wherein the information to be stored is any one of image data, video stream data, computer data and confidential data;
storing the information to be stored on a data cloud to obtain stored data; wherein, the data cloud is any one of Baidu cloud, Google cloud and Microsoft network disk;
registering the information to be stored at any node of a block chain, calculating the information to be stored by the block chain according to a preset method to obtain a first hash value, storing and registering the first hash value by the block chain, and recording block information.
2. The method for managing information security based on block chain of claim 1, further comprising after recording the block information:
when the stored data needs to be verified, extracting the stored data from the data cloud, and calculating the stored data by using a preset method to obtain a second hash value;
comparing the first hash value to the second hash value:
when the first hash value is the same as the second hash value, the stored information is authentic;
when the first hash value is different from the second hash value, the stored information is not authentic;
the preset method is a Hash algorithm.
3. The method according to claim 1, wherein the block information comprises a block height and a block chain timestamp.
4. The method for safely managing information according to claim 1, further comprising, after storing the first hash value on the blockchain and recording block information:
and encrypting the first hash value by using a preset secret key.
5. The block chain-based information security management method according to claim 1, further comprising, before when the stored data needs to be verified:
and decrypting the first hash value by using a preset secret key.
6. An information security management system based on a block chain, comprising:
the device comprises a determining module, a storage module and a storage module, wherein the determining module is used for determining information to be stored, and the information to be stored is any one of image data, video stream data, computer data and confidential data;
the storage module is used for storing the information to be stored on a data cloud to obtain stored data; wherein, the data cloud is any one of Baidu cloud, Google cloud and Microsoft network disk;
and the block chain module is used for registering the information to be stored at any node of a block chain, the block chain calculates the information to be stored according to a preset method to obtain a first hash value, the block chain registers the first hash value, stores the first hash value on the block chain, and records the block information.
7. The system according to claim 6, further comprising:
the verification module is used for extracting the stored data from the data cloud when the stored data needs to be verified, and calculating the stored data by using a preset method to obtain a second hash value;
a comparison module to compare the first hash value to the second hash value:
when the first hash value is the same as the second hash value, the stored information is authentic;
when the first hash value is different from the second hash value, the stored information is not authentic.
8. The system according to claim 6, further comprising an encryption module configured to encrypt the first hash value with a preset key.
9. The system according to claim 6, further comprising a decryption module configured to decrypt the first hash value with a preset key.
10. A server is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing the communication between the processor and the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any one of claims 1 to 5 when executing a program stored in the memory.
CN201911330924.7A 2019-12-20 2019-12-20 Block chain-based information security management method, system and server Pending CN111125020A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911330924.7A CN111125020A (en) 2019-12-20 2019-12-20 Block chain-based information security management method, system and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911330924.7A CN111125020A (en) 2019-12-20 2019-12-20 Block chain-based information security management method, system and server

Publications (1)

Publication Number Publication Date
CN111125020A true CN111125020A (en) 2020-05-08

Family

ID=70501347

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911330924.7A Pending CN111125020A (en) 2019-12-20 2019-12-20 Block chain-based information security management method, system and server

Country Status (1)

Country Link
CN (1) CN111125020A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231754A (en) * 2020-10-21 2021-01-15 南方电网科学研究院有限责任公司 Method, system and storage medium for monitoring configuration information of power edge computing node
CN115048401A (en) * 2022-08-15 2022-09-13 珠海翔翼航空技术有限公司 Multi-block chain data processing method, system and equipment of analog machine management system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018119930A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Transaction verification processing method, apparatus and node device
CN109409122A (en) * 2018-09-13 2019-03-01 远光软件股份有限公司 File memory method and its electronic equipment, storage medium
CN110020544A (en) * 2018-12-26 2019-07-16 阿里巴巴集团控股有限公司 The Hash information processing method and system of record are stored in the block of block chain
CN110113167A (en) * 2019-04-01 2019-08-09 广州杰赛科技股份有限公司 A kind of information protecting method of intelligent terminal, system and readable storage medium storing program for executing
CN110335125A (en) * 2019-07-12 2019-10-15 政采云有限公司 A kind of information reporting method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018119930A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Transaction verification processing method, apparatus and node device
CN109409122A (en) * 2018-09-13 2019-03-01 远光软件股份有限公司 File memory method and its electronic equipment, storage medium
CN110020544A (en) * 2018-12-26 2019-07-16 阿里巴巴集团控股有限公司 The Hash information processing method and system of record are stored in the block of block chain
CN110113167A (en) * 2019-04-01 2019-08-09 广州杰赛科技股份有限公司 A kind of information protecting method of intelligent terminal, system and readable storage medium storing program for executing
CN110335125A (en) * 2019-07-12 2019-10-15 政采云有限公司 A kind of information reporting method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李佩丽等: "可更改区块链技术研究", 《密码学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231754A (en) * 2020-10-21 2021-01-15 南方电网科学研究院有限责任公司 Method, system and storage medium for monitoring configuration information of power edge computing node
CN115048401A (en) * 2022-08-15 2022-09-13 珠海翔翼航空技术有限公司 Multi-block chain data processing method, system and equipment of analog machine management system

Similar Documents

Publication Publication Date Title
US10735428B2 (en) Data access and ownership management
US9990507B2 (en) Adapting decoy data present in a network
KR101594230B1 (en) Secure and efficient content screening in a networked environment
US8918901B2 (en) System and method for restricting access to requested data based on user location
US8938625B2 (en) Systems and methods for securing cryptographic data using timestamps
US20170293766A1 (en) Distributed data storage by means of authorisation token
KR101948721B1 (en) Method and apparatus for examining forgery of file by using file hash value
CN108429638B (en) Server operation and maintenance method, device and system and electronic equipment
US20130004142A1 (en) Systems and methods for device authentication including timestamp validation
WO2017143879A1 (en) File permission management method and device
CN109308421B (en) Information tamper-proofing method and device, server and computer storage medium
CN104361267A (en) Software authorization and protection device and method based on asymmetric cryptographic algorithm
WO2019205366A1 (en) Picture management method and apparatus, computer device, and storage medium
CN108108633B (en) Data file and access method, device and equipment thereof
US10404689B2 (en) Password security
CN108431819B (en) Method and system for protecting client access to service of DRM agent of video player
CN110851843A (en) Data management method and device based on block chain
CN111400745A (en) Picture management method and device and electronic equipment
US11658996B2 (en) Historic data breach detection
CN111125020A (en) Block chain-based information security management method, system and server
US9665723B2 (en) Watermarking detection and management
CN113761498A (en) Third party login information hosting method, system, equipment and storage medium
US7987513B2 (en) Data-use restricting method and computer product
JP2015225385A (en) Information processing system, information processing method and program
CN109033882A (en) A kind of safe dissemination method of retrospective big data and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination