1. All file data transmission processes on the data link contract lock are encrypted using SSL security protocol for the entire link (including the source link) to ensure that files are not stolen during transmission.
2. Structured data and file encryption
Structured data is encrypted using AES256 symmetric encryption. The encryption key is randomly generated in memory and is not directly stored on any storage medium. Instead, it is encapsulated in the user's digital envelope using RSA asymmetric encryption algorithm. Opening this digital envelope requires two parts of the key, one obtained through the user's password and the other stored in a third-party system to ensure that the key is not leaked. Encrypt the file data and store it in chunks using a segmentation algorithm.
3. Key Management
User data encryption key, encapsulated in a digital envelope using RSA algorithm. The key to opening the digital envelope is obtained through a combination of user password and an independent key subsystem. User data, encryption keys, and digital envelope opening keys are stored in different subsystems and ultimately extracted and used through user login authorization actions.
4. User data permissions
Contract data within the enterprise requires administrators to set and allocate corresponding access permissions, and only internal employee accounts have corresponding data access permissions.
5. Account management
Strict personal account real name and information modification rules, enterprise administrator authority decentralization constraints, auditable.
6. Data Audit
All user behavior and administrator management behavior can be audited, and system management and data management roles are subject to decentralized constraints.
7. Operation and maintenance management
Contract lock internal subsystem, adopting decentralized operation and maintenance strategy. A single operation and maintenance personnel cannot obtain the complete encrypted data of any contract, let alone bypass user decryption.
8. Independent Audit Service
The contract lock adopts a three member separation design and has independent audit function. The system automatically records various types of seal making, downloading, and signing data, forms operation logs, and adds digital signatures to prevent tampering throughout the process.
9. Security certificate
沪公网安备 31011202012092号