data security

The contract lock system adopts multi-dimensional encryption protection measures, ensuring user data security from multiple perspectives such as data link, key management, user data permissions, account management, data auditing, and operation and maintenance.

avatar

1. All file data transmission processes on the data link contract lock are encrypted using SSL security protocol for the entire link (including the source link) to ensure that files are not stolen during transmission.

2. Structured data and file encryption

Structured data is encrypted using AES256 symmetric encryption. The encryption key is randomly generated in memory and is not directly stored on any storage medium. Instead, it is encapsulated in the user's digital envelope using RSA asymmetric encryption algorithm. Opening this digital envelope requires two parts of the key, one obtained through the user's password and the other stored in a third-party system to ensure that the key is not leaked. Encrypt the file data and store it in chunks using a segmentation algorithm.

3. Key Management

User data encryption key, encapsulated in a digital envelope using RSA algorithm. The key to opening the digital envelope is obtained through a combination of user password and an independent key subsystem. User data, encryption keys, and digital envelope opening keys are stored in different subsystems and ultimately extracted and used through user login authorization actions.

4. User data permissions

Contract data within the enterprise requires administrators to set and allocate corresponding access permissions, and only internal employee accounts have corresponding data access permissions.

5. Account management

Strict personal account real name and information modification rules, enterprise administrator authority decentralization constraints, auditable.

6. Data Audit

All user behavior and administrator management behavior can be audited, and system management and data management roles are subject to decentralized constraints.

7. Operation and maintenance management

Contract lock internal subsystem, adopting decentralized operation and maintenance strategy. A single operation and maintenance personnel cannot obtain the complete encrypted data of any contract, let alone bypass user decryption.

8. Independent Audit Service

The contract lock adopts a three member separation design and has independent audit function. The system automatically records various types of seal making, downloading, and signing data, forms operation logs, and adds digital signatures to prevent tampering throughout the process.

9. Security certificate

The contract lock platform has passed ISO270001 information security management system certification and the Ministry of Public Security's information system security level protection (Level 3).