Nothing Special   »   [go: up one dir, main page]

Zhu et al., 2019 - Google Patents

Research on Modify Protection of Metrology Electronic Certificate Based on Blockchain Technology

Zhu et al., 2019

Document ID
15228913133933283994
Author
Zhu Y
He J
Yuan K
Yang Y
Publication year
Publication venue
2019 14th International Conference on Computer Science & Education (ICCSE)

External Links

Snippet

The metrological verification certificate is an important basis for the metrology instrument to be verified by the statutory verification agency. The verification result affects whether the measuring instrument can be used normally again. With the development of computer …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0722Content
    • G06F2221/0737Traceability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions

Similar Documents

Publication Publication Date Title
CN109067801B (en) Identity authentication method, identity authentication device and computer readable medium
CN109522698B (en) User authentication method based on block chain and terminal equipment
TWI709314B (en) Data processing method and device
KR101974060B1 (en) Method and system for validating ownership of digital assets using distributed hash tables and peer-to-peer distributed decoys
CN109905360B (en) Data verification method and terminal equipment
CN109547206B (en) Digital certificate processing method and related device
CN109450843B (en) SSL certificate management method and system based on block chain
JP2007282295A (en) Cryptographic system and method with key escrow feature
CN105635070B (en) Anti-counterfeiting method and system for digital file
JP7114078B2 (en) Electronic authentication method and program
CN110188551B (en) Policy encryption transmission method and system
CN111798209A (en) Engineering project management method based on block chain, electronic equipment and storage medium
CN112257085B (en) Bid bidding processing method, system, equipment and medium based on blockchain
JP2023520632A (en) Noise transactions for data protection
CN107277000A (en) A kind of electronic certificate method for managing security and system
CN111160909A (en) Block chain supply chain transaction hiding static supervision system and method
CN113094725B (en) Encryption and decryption method and system for bidding documents opened remotely and intensively
CN113014394B (en) Electronic data certification method and system based on alliance chain
CN111160908A (en) Supply chain transaction privacy protection system and method based on block chain and related equipment
TW201902179A (en) Know your customer (kyc) data sharing system with privacy and method thereof
Rattan et al. E-Commerce Security using PKI approach
CN111079190A (en) Block chain supply chain transaction hiding dynamic supervision system and method
CN111160997A (en) Advertisement supervision method and device based on block chain and advertisement delivery system
CN110992034A (en) Supply chain transaction privacy protection system and method based on block chain and related equipment
Zhu et al. Research on Modify Protection of Metrology Electronic Certificate Based on Blockchain Technology