Data full-link tracing monitoring method

The invention discloses a data full-link tracing monitoring method, and belongs to the field of data processing. The method comprises the following steps that: a data source end uploads a data file encryption record, a credible authentication encryption record, a secret key encryption record, and as...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ZHENG SHAOFEI, SUN NINGNING, ZHANG ZHENQING, YAN XI, WANG JIANING, XIE HUIMIN, GUO YANMING, LI XIAOHUA, LIU YAJUN, CHENG YUWEI, HU CHENYI, FU PENGXIA, SHENG WEIPING, LEI PING, SUN JING, GU MING, WANG ZHIMIN, ZHENG HONGQUAN, MENG HAO, HOU WENCHUAN, CHEN CHAO, XIE JUN, HAN JINGJING, HUANG WANLIN, YANG SHOUDONG, ZHENG TENGXIAO, LIU BOYU, HE XI, YUAN HONGLIANG, YIN HAO, WANG FENG, LI JINGHONG
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The invention discloses a data full-link tracing monitoring method, and belongs to the field of data processing. The method comprises the following steps that: a data source end uploads a data file encryption record, a credible authentication encryption record, a secret key encryption record, and associated data file pointers, credible pointers and credible data to a record block chain; and a data black box uploads a data collection record and a credible authentication record, a data operation end uploads a data operation record, a block chain establishment block is recorded, and the block content comprises a data file encryption record, a credible authentication encryption record, a secret key encryption record, the data collection record, the credible authentication record and the data operation record, and associated data file pointers, credible pointers and trusted data. By uploading the operation record, the purposes of operation backtracking and data monitoring can be achieved, so that the safety of dat