Zhu et al., 2019 - Google Patents
Research on Modify Protection of Metrology Electronic Certificate Based on Blockchain TechnologyZhu et al., 2019
- Document ID
- 15228913133933283994
- Author
- Zhu Y
- He J
- Yuan K
- Yang Y
- Publication year
- Publication venue
- 2019 14th International Conference on Computer Science & Education (ICCSE)
External Links
Snippet
The metrological verification certificate is an important basis for the metrology instrument to be verified by the statutory verification agency. The verification result affects whether the measuring instrument can be used normally again. With the development of computer …
- 238000005516 engineering process 0 title abstract description 48
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109067801B (en) | Identity authentication method, identity authentication device and computer readable medium | |
CN109522698B (en) | User authentication method based on block chain and terminal equipment | |
TWI709314B (en) | Data processing method and device | |
KR101974060B1 (en) | Method and system for validating ownership of digital assets using distributed hash tables and peer-to-peer distributed decoys | |
CN109905360B (en) | Data verification method and terminal equipment | |
CN109547206B (en) | Digital certificate processing method and related device | |
CN109450843B (en) | SSL certificate management method and system based on block chain | |
JP2007282295A (en) | Cryptographic system and method with key escrow feature | |
CN105635070B (en) | Anti-counterfeiting method and system for digital file | |
JP7114078B2 (en) | Electronic authentication method and program | |
CN110188551B (en) | Policy encryption transmission method and system | |
CN111798209A (en) | Engineering project management method based on block chain, electronic equipment and storage medium | |
CN112257085B (en) | Bid bidding processing method, system, equipment and medium based on blockchain | |
JP2023520632A (en) | Noise transactions for data protection | |
CN107277000A (en) | A kind of electronic certificate method for managing security and system | |
CN111160909A (en) | Block chain supply chain transaction hiding static supervision system and method | |
CN113094725B (en) | Encryption and decryption method and system for bidding documents opened remotely and intensively | |
CN113014394B (en) | Electronic data certification method and system based on alliance chain | |
CN111160908A (en) | Supply chain transaction privacy protection system and method based on block chain and related equipment | |
TW201902179A (en) | Know your customer (kyc) data sharing system with privacy and method thereof | |
Rattan et al. | E-Commerce Security using PKI approach | |
CN111079190A (en) | Block chain supply chain transaction hiding dynamic supervision system and method | |
CN111160997A (en) | Advertisement supervision method and device based on block chain and advertisement delivery system | |
CN110992034A (en) | Supply chain transaction privacy protection system and method based on block chain and related equipment | |
Zhu et al. | Research on Modify Protection of Metrology Electronic Certificate Based on Blockchain Technology |