CN117150535A - File management system and method based on homomorphic calculation - Google Patents

File management system and method based on homomorphic calculation Download PDF

Info

Publication number
CN117150535A
CN117150535A CN202311422190.1A CN202311422190A CN117150535A CN 117150535 A CN117150535 A CN 117150535A CN 202311422190 A CN202311422190 A CN 202311422190A CN 117150535 A CN117150535 A CN 117150535A
Authority
CN
China
Prior art keywords
file
module
homomorphic
user
electronic tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311422190.1A
Other languages
Chinese (zh)
Other versions
CN117150535B (en
Inventor
岳浩
李晓东
刘义川
金鑫
王学良
赵熊
李海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hidden Computing Technology Co ltd
Original Assignee
Beijing Hidden Computing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hidden Computing Technology Co ltd filed Critical Beijing Hidden Computing Technology Co ltd
Priority to CN202311422190.1A priority Critical patent/CN117150535B/en
Publication of CN117150535A publication Critical patent/CN117150535A/en
Application granted granted Critical
Publication of CN117150535B publication Critical patent/CN117150535B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a file management system and method based on homomorphic calculation, relating to the field of paper file management, wherein the system comprises: the system comprises a user registration module, a file input module, a user verification module, a file encryption module, a file tracking module, a file cabinet, a reader-writer and an electronic tag. The method combines SM3 and homomorphic encryption technology to encrypt and update the data in the electronic tag, so that the same file is fetched each time but the corresponding electronic tag information is inconsistent, the real number of the files is hidden, and higher privacy and security are provided for the files; meanwhile, the time cost and the management cost of file access are reduced by registering information of users and files and combining an RFID technology; according to the application, the file and the personnel importance level are introduced, so that the problem of error fetching of the file is avoided; and access information of the file is recorded, so that the file is convenient to track and manage.

Description

File management system and method based on homomorphic calculation
Technical Field
The application relates to the technical field of paper file management, in particular to a file management system and method based on homomorphic calculation.
Background
The traditional paper file management system mainly uses a magnetic stripe and a bar code system as the identification mode, but the file management system has lower automation degree, and manual assistance is needed during borrowing and returning, classifying and checking of the confidential files. In particular, encoding a file will undoubtedly expose the number of files. Improvements have been made after the introduction of RFID technology, but this simply reduces the manual effort in operation and complicates the encoding of the files and does not address the divulgence that would result from an attacker guessing the number of files. If the traditional encryption is used, the encrypted ciphertext is stored in the RFID corresponding to the file, and an attacker can still use a method of taking the file for many times and recording the ciphertext recorded by the RFID on the file to be taken out, so that the number of the files in the file cabinet is approximately guessed.
Therefore, how to provide higher privacy and security for the files, hide the real number of the files, avoid the problem of disclosure caused by the number of the files, and is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
In view of this, the present application provides a file management system and method based on homomorphic calculation, which at least solves some of the above technical problems, by combining cryptography, and the present application helps to provide higher privacy and security for files, and implements a function of hiding the real number of files, so as to avoid the problem of disclosure caused by the number of files.
In order to achieve the above purpose, the technical scheme adopted by the application is as follows:
in a first aspect, the present application provides a file management system based on homomorphic computing, the system comprising: the system comprises a user registration module, a file input module, a user verification module and a file encryption module, wherein:
the user registration module is used for registering accounts for users, distributing authority for viewing files according to an organization architecture and user levels, and storing user information into a database;
the file input module is used for primarily inputting the file, and an identification code is generated for the file through an SM3 hash digest algorithm in the input process;
the user verification module is used for verifying the file grade applied by the user and authority authentication during borrowing;
the file encrypting module is used for encrypting the file identification code generated by the file input module by using a homomorphic encrypting algorithm and refreshing original ciphertext data in the electronic tag by using a ciphertext of 0 when the file is delivered.
Further, the system further comprises: and the file tracking module is used for recording the current and historical borrowing conditions of the file.
Further, the system further comprises: electronic tags and install the filing cabinet of read write line, wherein: the electronic tag is used for storing ciphertext data, the file cabinet is used for storing files, and the reader-writer is used for carrying out information interaction with the electronic tag through electromagnetic signals.
Further, the file input module is used for initial input of files, and the input process specifically comprises the following steps:
creating a number for each fileWherein->Representing the reference level of the file->Representing a file code;
each file is allocated with an electronic tag, and each electronic tag is recorded with its own inherent numberReading the own inherent number of the electronic tag by a reader/writer +.>
Generating a unique identity identification code in a system for a current file through an SM3 hash digest algorithm, wherein the formula is as follows:
wherein,the identity code of the i-th file is represented, H is a hash algorithm, and +.>Representing concatenation of character strings.
Further, the file encryption module encrypts the identity identification code by using a homomorphic encryption algorithm, and the formula is as follows:
wherein,representation->The corresponding ciphertext, E, represents the homomorphic encryption algorithm.
Further, the file encryption module uses ciphertext of 0 to perform homomorphic addition under ciphertext to refresh original ciphertext data according to homomorphism, and the formula is as follows:
wherein,representing a new ciphertext,/->Representation->The corresponding ciphertext, E, represents the homomorphic encryption algorithm.
Further, the user verification module is further configured to apply for rights when verifying that the file level of the user application and the rights identification during borrowing are not passed.
In a second aspect, the present application further provides a file management method based on homomorphic calculation, which is applied to the file management system based on homomorphic calculation, and performs paper file management, where the method includes:
data entry stage:
registering an account for a user through a user registration module, distributing authority for viewing files according to an organization architecture and a user level, and storing user information into a database;
the method comprises the steps that a file is firstly input through a file input module, and an identification code is generated for the file through an SM3 hash digest algorithm in the input process;
a file access stage:
verifying the file grade applied by the user and authority authentication during borrowing through a user verification module;
encrypting the file identification code generated by the file input module by using a homomorphic encryption algorithm through a file encryption module, and refreshing original ciphertext data in the electronic tag by using a ciphertext of 0 when the file is out of stock.
Further, the method further comprises:
and recording current and historical borrowing conditions of the file through a file tracking module.
Compared with the prior art, the application has at least the following beneficial technical effects:
1. the application discloses a file management system and method based on homomorphic calculation, which encrypts and refreshes data in an electronic tag by using SM3, homomorphic encryption algorithm and 0 ciphertext, even if the same file is taken out, the information in the electronic tag is different each time, thereby realizing the function of hiding the number of the file, being convenient for avoiding the problem of disclosure caused by the number of the file and being beneficial to providing higher privacy and security for the file.
2. According to the application, the time cost and the management cost of file access are reduced by registering information of users and files and combining an RFID technology; the application records the access information of the file, and is convenient for file tracking and management.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and drawings.
The technical scheme of the application is further described in detail through the drawings and the embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
The accompanying drawings are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate the application and together with the embodiments of the application, serve to explain the application.
Fig. 1 is a schematic structural diagram of a file management system based on homomorphic computing according to an embodiment of the present application.
Fig. 2 is a schematic diagram of a file management workflow based on homomorphic calculation according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Referring to fig. 1, an embodiment of the present application provides a file management system based on homomorphic computing, the system including: the system comprises a user registration module, a file entry module, a user verification module, a file encryption module and a file tracking module; wherein:
the user registration module is used for registering accounts for users, distributing authority for viewing files according to an organization architecture and user levels, and storing user information into a database; the file input module is used for first inputting the file, and in the input process, an identification code is generated for the file through an SM3 hash digest algorithm; the user verification module is used for verifying the file grade applied by the user and authority authentication during borrowing; the file encrypting module is used for encrypting the file identification code generated by the file inputting module by using a homomorphic encrypting algorithm and refreshing original ciphertext data in the electronic tag by using 0 ciphertext when the file is out of stock; the file tracking module is used for recording current and historical borrowing conditions of the file. The modules exchange information through the electric signal data.
Preferably, in this embodiment, the system further includes a file cabinet with a reader, and an RFID electronic tag attached to the file; the electronic tag is used for storing ciphertext data, the file cabinet is used for storing and placing paper files, and the reader-writer is used for reading data in the electronic tag on the files when the files are accessed; the electronic tag interacts information with the reader-writer through electromagnetic excitation signals.
Referring to fig. 2, the following describes in detail a specific working principle of the file management system based on homomorphic computing in use:
in one embodiment, a system administrator registers users within an organization into a file management system via a user registration module and stores user information in a databaseHere->Representing the ith user, which can be generally represented by a physical identification code of the user in an organization, such as a job number, a name, etc.; />The user authority corresponding to the user is indicated, and in this embodiment, the default is divided into three levels, which are respectively: general, important, core.
In a specific embodiment, a system administrator performs primary file entry through a file entry module, and the entry process is divided into the following three steps; first create a number for each fileHere->Representing the reference level of the file, may be set to: secret, confidential, and secret-proof; />Files are encoded and may be ordered by number. The system administrator then assigns an electronic tag to each file, eachThe electronic tags are all recorded with a number inherent to themselves +.>Reading the number inherent to the RFID electronic tag itself by a reader/writer>To the system. Finally, using SM3 hash digest algorithm to generate unique identification code in system for current file>Where H denotes a hash algorithm, +.>Representing concatenation of character strings.
The initialization of the system is completed, and the process of the system during file access is described below, specifically;
in one embodiment, the user initiates a borrowing request through the file cabinet and inputs his own account number, and the system verifies the file grade applied by the user and the authority authentication during borrowing. Referring to the rights and personnel level relationship table, reference may be made to the following table 1:
if the borrowing requirement is met and the applied file is in the library, preparing the file for pre-delivery; if the borrowing requirement is not met, a temporary authority application function can be provided to an upper level, and if the application is successful, the file is ready for pre-delivery; if the file is not in the library, displaying the current borrower of the file, and ending the service.
In one embodiment, the file encryption module is invoked to encrypt and refresh ciphertext, and the implementation process is as follows: homomorphic encryption algorithm based on ECCEncryption of->Here, E represents a homomorphic encryption algorithm,for each +.>Corresponding ciphertext, will->And writing the identification information into the RFID electronic tag through a reader-writer to serve as identification information of the file in the system. In addition, in order to protect the number of files from leakage, ciphertext refreshing is needed to be carried out once before each file is taken out of the cabinet so as to update the information in the electronic tag of the file; the file is in a pre-ex-warehouse state, and the system is ciphertext of the current fileThe refreshing operation is carried out by reading ciphertext stored in an electronic tag on a current pre-ex-warehouse file by a reader-writer by the system to obtain the ciphertext +.>According to homomorphism, homomorphism addition is carried out on ciphertext with 0 to refresh original ciphertext data ++>Is->The method comprises the steps of carrying out a first treatment on the surface of the Since 0 is encrypted using homomorphic encryption algorithm, each 0 ciphertext is different and for the same +.>The refreshed ciphertext is necessarily different, but the corresponding plaintext after decryption is still unchanged; after obtaining new ciphertext->Afterwards, will->Covering the current by a reader/writerThe data in the electronic tag on the files which are pre-exported can achieve the aim of refreshing the ciphertext.
In a specific embodiment, after the ciphertext is successfully refreshed, the system goes out of the library, records the name of which user the file belongs to currently through the file tracking module, and updates the file state into the state of going out of the library; when a new user borrows the file again, displaying the borrowing condition of the file; after the file is put in storage, the system keeps the record in a file.
In a specific embodiment, when a user makes a request for returning a file through a file cabinet, the system automatically acquires the data stored in the electronic tag on the current file through a reader-writerAnd pass->And data in the database->Doing homomorphic calculation ++>Decrypting the result, if the current file belongs to the file in the system, allowing the file to be put in storage and updating the file state if one value of the decrypted result is 0; otherwise, the current file is considered not to belong to the system, and the file is refused to be put in storage.
From the description of the above embodiments, those skilled in the art can appreciate that the present application provides a file management system based on homomorphic calculation, and updates data in an electronic tag by combining SM3 and homomorphic encryption technology, so as to achieve that the same file is fetched each time but the corresponding electronic tag information is inconsistent, and hide the real number of files; which helps to provide higher privacy and security for the file. According to the application, the time cost and the management cost of file access are reduced by registering information on users and files and combining an RFID technology; the file and personnel importance level are introduced, so that the problem of error fetching of the file is avoided; the application records the access information of the file, and is convenient for file tracking and management.
Further, an embodiment of the present application further provides a homomorphic encryption method supporting integer operation, where the general flow of work is as shown in fig. 2, and the method includes:
data entry stage:
registering an account for a user through a user registration module, distributing authority for viewing files according to an organization architecture and a user level, and storing user information into a database;
the method comprises the steps that a file is firstly input through a file input module, and an identification code is generated for the file through an SM3 hash digest algorithm in the input process;
a file access stage:
verifying the file grade applied by the user and authority authentication during borrowing through a user verification module;
encrypting the file identification code generated by the file input module by using a homomorphic encryption algorithm through a file encryption module, and refreshing original ciphertext data in the electronic tag by using a ciphertext of 0 when the file is out of stock.
And recording current and historical borrowing conditions of the file through the file tracking module.
The implementation principle and the generated technical effects of the file management method based on homomorphic calculation provided by the embodiment of the present application are the same as those of the foregoing system embodiment, and for brevity description, the corresponding content in the foregoing system embodiment may be referred to for the part where this embodiment is not mentioned, and will not be described herein again.
In addition, embodiments of the present application also provide a storage medium having stored thereon one or more programs readable by a computing device, the one or more programs including instructions, which when executed by the computing device, cause the computing device to perform a homomorphic computing-based file management method of the above embodiments.
Examples of the computer readable storage medium herein include: read-only memory (ROM), random-access programmable read-only memory (PROM), electrically erasable programmable read-only memory (EEPROM), random-access memory (RAM), dynamic random-access memory (DRAM), static random-access memory (SRAM), flash memory, nonvolatile memory, CD-ROM, DVD-ROM, blu-ray or optical disk memory, hard Disk Drive (HDD), solid State Drive (SSD), card memory (such as a multimedia card, secure Digital (SD) card or a digital versatile (XD) card), magnetic tape, floppy disk, magneto-optical data storage, hard disk, solid state disk, and any other device configured to store a computer program and any associated data, data files, and data structures in a non-transitory manner and to provide the computer program and any associated data, data files, and data structures to a processor or computer so that the processor or computer can execute the computer program. The computer programs in the computer readable storage media described above can be run in an environment deployed in a computer device, such as a client, host, proxy device, server, etc., and further, in one example, the computer programs and any associated data, data files, and data structures are distributed across networked computer systems such that the computer programs and any associated data, data files, and data structures are stored, accessed, and executed in a distributed fashion by one or more processors or computers.
It will be appreciated by those skilled in the art that embodiments of the application may be provided as a system, method, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It is to be noticed that the term 'comprising', does not exclude the presence of elements or steps other than those listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The application may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer.
In the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, and identical and similar parts between the embodiments are all enough to refer to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. A homomorphic computing-based file management system, the system comprising: the system comprises a user registration module, a file input module, a user verification module and a file encryption module, wherein:
the user registration module is used for registering accounts for users, distributing authority for viewing files according to an organization architecture and user levels, and storing user information into a database;
the file input module is used for primarily inputting the file, and an identification code is generated for the file through an SM3 hash digest algorithm in the input process;
the user verification module is used for verifying the file grade applied by the user and authority authentication during borrowing;
the file encrypting module is used for encrypting the file identification code generated by the file input module by using a homomorphic encrypting algorithm and refreshing original ciphertext data in the electronic tag by using a ciphertext of 0 when the file is delivered.
2. The homomorphic calculation based file management system of claim 1, further comprising: and the file tracking module is used for recording the current and historical borrowing conditions of the file.
3. The homomorphic calculation based file management system of claim 2, further comprising: electronic tags and install the filing cabinet of read write line, wherein: the electronic tag is used for storing ciphertext data, the file cabinet is used for storing files, and the reader-writer is used for carrying out information interaction with the electronic tag through electromagnetic signals.
4. A file management system based on homomorphic calculation according to claim 3, wherein the file entry module is used for initial entry of a file, and the entry process specifically comprises:
creating a number for each fileWherein->Representing the reference level of the file->Representing a file code;
each file is allocated with an electronic tag, and each electronic tag is recorded with its own inherent numberReading the own inherent number of the electronic tag by a reader/writer +.>
Generating a unique identity identification code in a system for a current file through an SM3 hash digest algorithm, wherein the formula is as follows:
wherein,representation ofThe identification code of the i-th file, H represents the hash algorithm, < >>Representing concatenation of character strings.
5. The homomorphic calculation based file management system of claim 4, wherein the file encryption module encrypts the identification code using a homomorphic encryption algorithm, with the formula:
wherein,representation->The corresponding ciphertext, E, represents the homomorphic encryption algorithm.
6. The homomorphic calculation based file management system of claim 5, wherein the file encryption module uses ciphertext 0 to homomorphically add and refresh original ciphertext data under ciphertext according to homomorphism, and the formula is:
wherein,representing a new ciphertext,/->Representation->Corresponding ciphertext, E represents homomorphic encryptionAn algorithm.
7. The homomorphic calculation based file management system of claim 1, wherein the user authentication module is further configured to apply for rights when the user's applied file level is verified and the rights in borrowing are not authenticated.
8. A file management method based on homomorphic calculation, applied to a file management system based on homomorphic calculation as claimed in any one of claims 1-7, for paper file management, the method comprising:
data entry stage:
registering an account for a user through a user registration module, distributing authority for viewing files according to an organization architecture and a user level, and storing user information into a database;
the method comprises the steps that a file is firstly input through a file input module, and an identification code is generated for the file through an SM3 hash digest algorithm in the input process;
a file access stage:
verifying the file grade applied by the user and authority authentication during borrowing through a user verification module;
encrypting the file identification code generated by the file input module by using a homomorphic encryption algorithm through a file encryption module, and refreshing original ciphertext data in the electronic tag by using a ciphertext of 0 when the file is out of stock.
9. The homomorphic calculation based file management method of claim 8, further comprising:
and recording current and historical borrowing conditions of the file through a file tracking module.
CN202311422190.1A 2023-10-31 2023-10-31 File management system and method based on homomorphic calculation Active CN117150535B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311422190.1A CN117150535B (en) 2023-10-31 2023-10-31 File management system and method based on homomorphic calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311422190.1A CN117150535B (en) 2023-10-31 2023-10-31 File management system and method based on homomorphic calculation

Publications (2)

Publication Number Publication Date
CN117150535A true CN117150535A (en) 2023-12-01
CN117150535B CN117150535B (en) 2024-02-02

Family

ID=88908555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311422190.1A Active CN117150535B (en) 2023-10-31 2023-10-31 File management system and method based on homomorphic calculation

Country Status (1)

Country Link
CN (1) CN117150535B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117971134A (en) * 2024-03-28 2024-05-03 深圳市铨兴科技有限公司 Control method, system and medium of storage and calculation integrated solid state disk

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070039219A (en) * 2005-10-07 2007-04-11 삼성에스디에스 주식회사 Management system and method for document in server which deposits and manages electronic document
CN109886369A (en) * 2019-01-21 2019-06-14 湖南海川数易信息科技有限公司 Paper complete period management system, application method based on RFID and block chain
CN111353387A (en) * 2020-02-07 2020-06-30 重庆华谷科技有限公司 Legal document safety making management system and intelligent legal auxiliary service system
CN111984590A (en) * 2020-09-01 2020-11-24 冠群信息技术(南京)有限公司 System and method for identifying, filing and storing paper documents
CN113190814A (en) * 2021-04-27 2021-07-30 天津光电久远科技有限公司 Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition
CN215182077U (en) * 2021-06-11 2021-12-14 江西交通职业技术学院 Intelligent processing module for project file subsection itemizing
CN114461768A (en) * 2021-12-30 2022-05-10 济南超级计算技术研究院 Homomorphic encryption-based multi-keyword file encryption retrieval method and system
CN116030557A (en) * 2023-02-22 2023-04-28 宁波天骄智能科技有限公司 Intelligent file cabinet verification system of dynamic RFID

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070039219A (en) * 2005-10-07 2007-04-11 삼성에스디에스 주식회사 Management system and method for document in server which deposits and manages electronic document
CN109886369A (en) * 2019-01-21 2019-06-14 湖南海川数易信息科技有限公司 Paper complete period management system, application method based on RFID and block chain
CN111353387A (en) * 2020-02-07 2020-06-30 重庆华谷科技有限公司 Legal document safety making management system and intelligent legal auxiliary service system
CN111984590A (en) * 2020-09-01 2020-11-24 冠群信息技术(南京)有限公司 System and method for identifying, filing and storing paper documents
CN113190814A (en) * 2021-04-27 2021-07-30 天津光电久远科技有限公司 Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition
CN215182077U (en) * 2021-06-11 2021-12-14 江西交通职业技术学院 Intelligent processing module for project file subsection itemizing
CN114461768A (en) * 2021-12-30 2022-05-10 济南超级计算技术研究院 Homomorphic encryption-based multi-keyword file encryption retrieval method and system
CN116030557A (en) * 2023-02-22 2023-04-28 宁波天骄智能科技有限公司 Intelligent file cabinet verification system of dynamic RFID

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117971134A (en) * 2024-03-28 2024-05-03 深圳市铨兴科技有限公司 Control method, system and medium of storage and calculation integrated solid state disk
CN117971134B (en) * 2024-03-28 2024-05-31 深圳市铨兴科技有限公司 Control method, system and medium of storage and calculation integrated solid state disk

Also Published As

Publication number Publication date
CN117150535B (en) 2024-02-02

Similar Documents

Publication Publication Date Title
KR100961737B1 (en) Method for accessing information on object having tag, local server, ons proxy, program, tag creation method, device having tag writer, tag, and program for controlling device having tag writer
TW514844B (en) Data processing system, storage device, data processing method and program providing media
US9646176B2 (en) Method for encrypting database
CN117150535B (en) File management system and method based on homomorphic calculation
US20150026462A1 (en) Method and system for access-controlled decryption in big data stores
CN111768523B (en) CTID-based NFC intelligent door lock unlocking method, system, equipment and medium
CN111008390A (en) Root key generation protection method and device, solid state disk and storage medium
CN101840471A (en) Document right control method and device
CN106713334B (en) Encryption method, decryption method, access method and device for virtual storage volume
CN113610528A (en) Block chain-based management system, method, device and storage medium
US20230138102A1 (en) Method and system for managing decentralized data using attribute-based encryption
CN111586065A (en) Data authorization method based on block chain
CN107609428A (en) Date safety storing system and method
CN111460420A (en) Method, device and medium for using electronic seal based on block chain
US8433911B2 (en) Management server, management method, management system for downloading of contents, and mobile devices
US20100138916A1 (en) Apparatus and Method for Secure Administrator Access to Networked Machines
KR20090065736A (en) Method and system for processing securities using rfid system
CN108574578A (en) A kind of black box data protection system and method
CN110914826A (en) System and method for distributed data mapping
CN111723390A (en) Commercial data protection method and system based on supply chain management
CN109964445A (en) For protection (anti-clone) method and system of unwarranted duplication
CN108881106B (en) System and method for network electronic identity verification
US20210176053A1 (en) Symmetrically encrypt a master passphrase key
Drusinsky Cryptographic–biometric self-sovereign personal identities
JP4256100B2 (en) Legitimate media management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant