CN105095782A - Data protection method and system - Google Patents

Data protection method and system Download PDF

Info

Publication number
CN105095782A
CN105095782A CN201410201513.9A CN201410201513A CN105095782A CN 105095782 A CN105095782 A CN 105095782A CN 201410201513 A CN201410201513 A CN 201410201513A CN 105095782 A CN105095782 A CN 105095782A
Authority
CN
China
Prior art keywords
data
hash value
item number
identity code
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410201513.9A
Other languages
Chinese (zh)
Inventor
段宽军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410201513.9A priority Critical patent/CN105095782A/en
Publication of CN105095782A publication Critical patent/CN105095782A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A data protection method and system are disclosed. The method comprises the steps of: obtaining a unique identity code of a device and data required to be used; performing data mixing on the unique identity code and the data required to be used; converting mixed data to a hash value for checking a character string; and comparing the hash value with a corresponding standard hash value, and if so, directly using the data, or otherwise, judging that the data is illegal. According to the scheme of the invention, the unique identity code of the device and the data required to be protected are combined into the check value, so that the data can be protected more strictly and the reduction of the system speed caused by occupation of system resources is avoided.

Description

The method and system of data protection
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of method of data protection, and a kind of system of data protection.
Background technology
At present, the mode of the protection of computer data is also uncomplicated, distorts cost low, is easy to be distorted by people's malice, causes computer system to occur mess code or paralysis.
Such as, the mode of the data protection of protection registry data mainly contains following two kinds: one uses driver to pin registry writes data manipulation, all forbids the data item write operation that will protect; Another kind uses encryption or coding method the registry entry data encryption that will protect.For first kind of way, driver must be resided in systems in which, not only can occupying system resources, but also can drag slow system speed; System starts in the secure mode, and the driver of protection registry data can not load, and causes registry data can not be protected.For the second way, protected mode is fairly simple, is first obtained the encrypted result of designated character string by original system, and then the information directly in edit the registry is that result after encryption can reach the object of distorting.
Summary of the invention
For the problem that the method for the existing protection registry data in background technology is understood occupying system resources and dragged slow system speed or easily distort; the object of the present invention is to provide a kind of method and system of data protection, protect the data that need protect more closely and can not occupying system resources and cause dragging slow system speed.
For achieving the above object, the technical solution used in the present invention is as follows:
A method for data protection, comprises step:
Unique identity code and the data that need use of acquisition equipment;
This unique identity code and this item number certificate that need use are carried out data mixing;
It is the Hash Value of going here and there of checking character by mixed data transformations;
This Hash Value and corresponding standard Hash Value are contrasted, if identical, then directly uses this item number certificate, if not identical, judge that this item number is according to illegal.
The present invention also provides a kind of system of data protection, comprises acquiring unit, mixed cell, conversion unit and contrast recovery unit;
The unique identity code that described acquiring unit obtains equipment and the data that need use;
This unique identity code and this item number certificate that need use are carried out data mixing by described mixed cell;
Mixed data transformations is the Hash Value of going here and there of checking character by described conversion unit;
This Hash Value and corresponding standard Hash Value contrast by described contrast recovery unit, if identical, then directly use the data of this registration table, if not identical, judge that this item number is according to illegal.
According to technical solution of the present invention, first, the unique identity code obtaining equipment and the data that need use; Secondly, this unique identity code and this item number certificate that need use are carried out data mixing; Again, by mixed data transformations be the Hash Value of going here and there of checking character; Finally, this Hash Value and corresponding standard Hash Value are contrasted, if identical, then directly uses the data of this registration table, if not identical, judge that this item number is according to illegal.By the unique identity code of equipment is combined with the data of required use, be converted into the Hash Value of easily verification again, ensure that has different Hash Values at different equipment, thus prevents Hash Value to be directly copied use, and then protects registry data more closely; And the method that data protection of the present invention uses does not need to reside driver in systems in which, so can not occupying system resources and drag slow system speed.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the method for data protection of the present invention;
Fig. 2 is the process flow diagram of method first embodiment of data protection of the present invention;
Fig. 3 is the process flow diagram of the second embodiment of the method for data protection of the present invention;
Fig. 4 is the structural drawing of the system of data protection of the present invention;
Fig. 5 is the module map of a computer system 1000 that can realize the embodiment of the present invention.
Embodiment
In order to understand object of the present invention, characteristic sum effect fully, be described further below with reference to accompanying drawing and the specific embodiment technique effect to design of the present invention, concrete structure and generation.
Refer to Fig. 1, the process flow diagram for the method for data protection of the present invention:
Step S101: the unique identity code obtaining equipment and the data that need use:
Described equipment refers to the terminal device that user uses, such as PC, mobile phone, flat board etc.;
The unique identity code (i.e. ID) of described equipment comprises hardware identity identification code or operating system Identity Code, other can marking equipment unique identity code also can, be used as the described equipment of difference and the feature of other equipment;
The described data that need use can be the arbitrary datas on equipment; such as; the registry data of the software in described equipment can be mounted in; further; can be the homepage URL (UniformResoureLocator of browser; uniform resource locator) registry data, the content inside the homepage URL of browser can be protected not to be tampered by protecting the registry data of homepage URL of browser.
Step S102: this unique ID and this item number certificate that need use are carried out data mixing:
The mixed method of step S102 can comprise:
The data of described unique ID are arranged on the odd bits of blended data, this item number that need use is according to the even bit being arranged on blended data;
Or the data of described unique ID and the representation of this item number certificate that need use are binary data form, both intersect mixing, and odd bits is the data of unique ID, and even bit is this data; If both length is inconsistent, then both data fillings of dividing compared with long portion are at the end of blended data.
Adopt the data of above-mentioned mixed method mixing can be converted into the Hash Value of string of checking character accordingly more exactly, can guarantee not have identical Hash Value on each equipment.
Those skilled in the art, according to thought of the present invention, can take the additive method except said method to obtain the blended data be made up of the data of registration table and unique ID of equipment; Such as, the data of described unique ID are arranged on the even bit of blended data, the data of this registration table described are arranged on the mixed method of the odd bits of blended data; And for example, by unique ID data and the described simple mixed method be added of this item number certificate.
Step S103: be the Hash Value of going here and there of checking character by mixed data transformations:
The method for transformation of step S103 can comprise:
Be CRC (CyclicalRedundancyCheck, Cyclic Redundancy Code) data by mixed data transformations, obtain the Hash Value of CRC check value as string of checking character.
More preferably, described by mixed data transformations be CRC data refer to do initialization CRC data be 1597842 standard carry out CRC check and obtain CRC check value.This standard can be guaranteed to obtain CRC check value exactly.
It is MD5, SHA1 or SHA256 etc. that the method for transformation of described step S103 can also comprise mixed data transformations.
Step S104: this Hash Value and corresponding standard Hash Value are contrasted, if identical, then directly uses this item number certificate, if not identical, judges that this item number is according to illegal:
Corresponding standard Hash Value obtains in advance by following steps:
Unique ID and the data that need protect of acquisition equipment;
Unique ID of equipment and the data that need protect are carried out data mixing;
It is the standard Hash Value of going here and there of checking character by mixed data transformations;
Preserve this standard Hash Value.
More preferably, can above-mentioned steps be repeated, until all data mixing that need protect are changed into standard Hash Value and preserve, after convenient, directly can use those standard Hash Values;
More preferably, for registry data, this standard Hash Value of described preservation can be under this standard Hash Value is kept at the same paths of the registry data need protected accordingly, the standard Hash Value needed for convenient like this reading.
Described this Hash Value and corresponding standard Hash Value to be contrasted, for the situation converting CRC check value to, refer to that whether the numerical value both being judged by CRC check principle is identical;
More preferably, after illegal, also step is comprised at this item number of described judgement: by this item number according to reverting to default value.Described default value can be the value preset, and also can be the value that the algorithm by presetting draws.
Unique ID of equipment and the data of required protection are creatively combined into proof test value by the present invention, can protected data and can not occupying system resources and cause dragging slow system speed more closely.Meanwhile, even if system starts in the secure mode, the method also can protect the data of required protection not to be tampered.
The method of data protection of the present invention is applied in registry data below, to illustrate that the present invention is how data protection; Refer to Fig. 2, the process flow diagram for method first embodiment of data protection of the present invention:
Step 201: unique ID of acquisition equipment and the data A of a registration table that need use;
Step 202: the odd bits data of described unique ID being arranged on blended data, the data of this registration table described are arranged on the even bit of blended data, obtain blended data B;
Step 203: blended data B is converted into CRC data and obtains CRC check value C;
Step 204: this CRC check value C and corresponding standard C RC proof test value C ' is contrasted, if identical, then directly uses the data A of this registration table;
Step 205: if not identical, judges that this item number is illegal according to A;
Step 206: further, reverts to default value by this item number according to A;
Wherein, corresponding standard C RC proof test value C ' obtains by calculating after unique ID of marking equipment and the data mixing of this registration table that need protect in advance.
In addition, the method for data protection of the present invention can also be applied to the protection of code data, refers to Fig. 3, the process flow diagram for the second embodiment of the method for data protection of the present invention:
Step 301: the unique ID and the code data E that obtain equipment;
Step 302: the odd bits data of described unique ID being arranged on blended data, described code data is arranged on the even bit of blended data, obtains blended data F;
Step 303: blended data F is converted into CRC data and obtains CRC check value G;
Step 304: this CRC check value G and corresponding standard C RC proof test value G ' is contrasted, if identical, then directly access to your password data E;
Step 305: if not identical, judges that code data E is illegal;
Step 306: further, reverts to default value by code data E;
Wherein, corresponding standard C RC proof test value G ' obtains by calculating after unique ID of marking equipment and code data mixing in advance.
According to the method for a kind of data protection of foregoing invention, the present invention also provides a kind of system of data protection; Refer to Fig. 4, the structural drawing for the system of data protection of the present invention: acquiring unit 10, mixed cell 20, conversion unit 30, contrast recovery unit 40;
Unique ID that described acquiring unit 10 obtains equipment and the data that need use;
This unique ID and this item number certificate that need use are carried out data mixing by described mixed cell 20;
Mixed data transformations is the Hash Value of going here and there of checking character by described conversion unit 30;
This Hash Value and corresponding standard Hash Value contrast by described contrast recovery unit 40, if identical, then directly use this item number certificate, if not identical, judge that this item number is according to illegal.
Wherein, described equipment refers to the terminal device that user uses, such as PC, mobile phone, flat board etc.;
Unique ID of described equipment comprises hardware ID or operating system ID, other can marking equipment unique ID also can, be used as the described equipment of difference and the feature of other equipment;
The described data that need use can be the arbitrary datas on equipment; such as; the registry data of the software in described equipment can be mounted in; further; can be the homepage URL (UniformResoureLocator of browser; uniform resource locator) registry data, the content inside the homepage URL of browser can be protected not to be tampered by protecting the registry data of homepage URL of browser.
Wherein, the system of described data protection also comprises acquisition standard Hash Value unit 50;
Described acquisition standard Hash Value unit is used for obtaining and preserving standard Hash Value;
More preferably, for registry data, this standard Hash Value of described preservation can be under this standard Hash Value is kept at the same paths of the registry data need protected accordingly, the standard Hash Value needed for convenient like this reading.
Wherein, unique ID that described acquiring unit 10 obtains equipment comprises: obtain hardware ID or operating system ID, other can marking equipment unique ID also can, be used as the feature of the described equipment of difference and other equipment.
Wherein, unique ID of this equipment and this item number that need use comprise according to carrying out data mixing by described mixed cell 20: the odd bits data of described unique ID being arranged on blended data, and the data of this registration table that need use are arranged on the even bit of blended data;
Or the data of described unique ID and the representation of this item number certificate that need use are binary data form, both intersect mixing, and odd bits is the data of unique ID, and even bit is the data of this registration table; If both length is inconsistent, then both data fillings of dividing compared with long portion are at the end of blended data.
Adopt the data of above-mentioned hybrid mode mixing can be converted into the Hash Value of string of checking character accordingly more exactly, can guarantee not have identical Hash Value on each equipment.
Those skilled in the art, according to thought of the present invention, can take other modes except aforesaid way to obtain the blended data be made up of unique ID of the data that need protect and equipment; Such as, the data of described unique ID are arranged on the even bit of blended data, the data of this registration table described are arranged on the hybrid mode of the odd bits of blended data; And for example, by unique ID data and the described simple hybrid mode be added of this item number certificate.
Wherein, mixed data transformations is that the check character Hash Value of string comprises by described conversion unit 30: be CRC data by mixed data transformations, obtain the Hash Value of CRC check value as string of checking character;
More preferably, described to be CRC data by mixed data transformations be do initialization CRC data be 1597842 standard C RC verification obtain CRC check value.Can more conveniently verify with standard C RC proof test value like this;
Mixed data transformations can be also MD5, SHA1 or SHA256 etc. by described conversion unit 30.
Whether wherein, this Hash Value and corresponding standard Hash Value contrast by described contrast recovery unit 40, for the situation converting CRC check value to, refer to by the numerical value of both CRC check principle judgements identical.
Wherein, described contrast recovery unit 40 this item number of described judgement according to after illegal also for: this item number certificate is reverted to default value; Described default value can be the value preset, and also can be the value that the algorithm by presetting draws.
By data protection system of the present invention, by unique ID of equipment with need data protection to be combined into proof test value, the data that need protect can be protected more closely and can not occupying system resources and cause dragging slow system speed.Meanwhile, even if system starts in the secure mode, the method also can protect the data that need protect not to be tampered.
Unless context separately has the description of specific distinct, the element in the present invention and assembly, the form that quantity both can be single exists, and form that also can be multiple exists, and the present invention does not limit this.Although the step in the present invention arranges with label, and be not used in and limit the precedence of step, the order of step or the execution of certain step need based on other steps unless expressly stated, otherwise the relative rank of step is adjustable.Be appreciated that term "and/or" used herein relates to and contains the one or more any and all possible combination in the Listed Items be associated.
Fig. 5 is the module map of a computer system 1000 that can realize the embodiment of the present invention.This computer system 1000 is an example being applicable to computer environment of the present invention, can not think to propose any restriction to usable range of the present invention.Computer system 1000 can not be interpreted as the combination needing the one or more parts depending on or have in illustrated exemplary computer system 1000.
Computer system 1000 shown in Fig. 5 is the examples being suitable for computer system of the present invention.Other framework with different sub-systems configuration also can use.The similar devices such as the desktop computer known by masses, notebook, personal digital assistant, smart phone, panel computer, portable electronic device, Set Top Box are such as had to go for some embodiments of the present invention.But be not limited to above cited equipment.
As shown in Figure 5, computer system 1000 comprises processor 1010, storer 1020 and system bus 1022.The various system components comprising storer 1020 and processor 1010 are connected on system bus 1022.Processor 1010 is the hardware being used for being performed by arithmetic sum logical operation basic in computer system computer program instructions.Storer 1020 be one for storing the physical equipment of calculation procedure or data (such as, program state information) temporarily or permanently.System bus 1020 can be any one in the bus structure of following several types, comprises memory bus or memory controller, peripheral bus and local bus.Processor 1010 and storer 1020 can carry out data communication by system bus 1022.Wherein storer 1020 comprises ROM (read-only memory) (ROM) or flash memory (all not shown in figure), and random access memory (RAM), and RAM typically refers to the primary memory being loaded with operating system and application program.
Computer system 1000 also comprises display interface 1030 (such as, Graphics Processing Unit), display device 1040 (such as, liquid crystal display), audio interface 1050 (such as, sound card) and audio frequency apparatus 1060 (such as, loudspeaker).Display device 1040 and audio frequency apparatus 1060 are the media devices for experiencing content of multimedia.
Computer system 1000 generally comprises a memory device 1070.Memory device 1070 can be selected from multiple computer-readable medium, and computer-readable medium refers to any available medium can accessed by computer system 1000, that comprise movement and fixing two media.Such as, computer-readable medium includes but not limited to, flash memory (miniature SD card), CD-ROM, digital versatile disc (DVD) or other optical disc storage, tape cassete, tape, disk storage or other magnetic storage apparatus, or can be used for storing information needed and other medium any can accessed by computer system 1000.
Computer system 1000 also comprises input media 1080 and input interface 1090 (such as, I/O controller).User can pass through input media 1080, and as the touch panel equipment in keyboard, mouse, display device 1040, input instruction and information are in computer system 1000.Input media 1080 is normally connected on system bus 1022 by input interface 1090, but also can be connected by other interface or bus structure, as USB (universal serial bus) (USB).
Computer system 1000 can be carried out logic with one or more network equipment in a network environment and is connected.The network equipment can be PC, server, router, smart phone, panel computer or other common network node.Computer system 1000 is connected with the network equipment by LAN (Local Area Network) (LAN) interface 1100 or mobile comm unit 1110.LAN (Local Area Network) (LAN) refers in limited area, such as family, school, computer laboratory or use the office building of the network media, the computer network of interconnected composition.WiFi and twisted-pair feeder wiring Ethernet are two kinds of technology of the most frequently used structure LAN (Local Area Network).WiFi is a kind of technology that can make computer system 1000 swapping data or be connected to wireless network by radiowave.Mobile comm unit 1110 can be answered by radio communication diagram while movement and call in a wide geographic area.Except call, mobile comm unit 1110 is also supported in the 2G providing mobile data service, carries out internet access in 3G or 4G cellular communication system.
It should be pointed out that the computer system that other comprises the subsystem more more or less than computer system 1000 also can be applicable to the present invention.Such as, computer system 1000 can comprise the bluetooth unit that can exchange data in short distance, for the imageing sensor of taking a picture, and for the accelerometer of acceleration measurement.
As described in detail, be applicable to the assigned operation that computer system 1000 of the present invention can perform data guard method above.The form of the software instruction that computer system 1000 is operated in computer-readable medium by processor 1010 performs these operations.These software instructions can be read into storer 1020 from memory device 1070 or by lan interfaces 1100 from another equipment.The software instruction be stored in storer 1020 makes processor 1010 perform above-mentioned data guard method.In addition, also the present invention can be realized equally by hardware circuit or hardware circuit in conjunction with software instruction.Therefore, the combination that the present invention is not limited to any specific hardware circuit and software is realized.
The above embodiment only have expressed several embodiment of the present invention, and it describes comparatively concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (12)

1. a method for data protection, is characterized in that, comprises step:
Unique identity code and the data that need use of acquisition equipment;
This unique identity code and this item number certificate that need use are carried out data mixing;
It is the Hash Value of going here and there of checking character by mixed data transformations;
This Hash Value and corresponding standard Hash Value are contrasted, if identical, then directly uses this item number certificate, if not identical, judge that this item number is according to illegal.
2. the method for data protection according to claim 1, is characterized in that, before the unique identity code and the data that need use of the equipment of acquisition, also comprise step:
The unique identity code of acquisition equipment and the data that need protect;
The unique identity code of equipment and this item number certificate that need protect are carried out data mixing;
It is the standard Hash Value of going here and there of checking character by mixed data transformations;
Preserve this standard Hash Value.
3. the method for the data protection according to claims 1 or 2, is characterized in that, the unique identity code of described equipment comprises:
The hardware identity identification code of described equipment or the operating system Identity Code of described equipment.
4. the method for the data protection according to claims 1 or 2, is characterized in that, describedly this unique identity code and this item number that need use is comprised according to the method for carrying out data mixing:
The data of described unique identity code are arranged on the odd bits of blended data, this item number that need use is according to the even bit being arranged on blended data.
5. the method for the data protection according to claims 1 or 2, is characterized in that, described is that the check character method of Hash Value of string comprises by mixed data transformations:
Be cyclic redundancy code data by mixed data transformations, obtain the Hash Value of CRC value as string of checking character.
6. the method for the data protection according to claims 1 or 2, is characterized in that, this item number of described judgement also comprises step after illegal:
By this item number according to reverting to default value.
7. a system for data protection, is characterized in that, comprises acquiring unit, mixed cell, conversion unit and contrast recovery unit;
The unique identity code that described acquiring unit obtains equipment and the data that need use;
This unique identity code and this item number certificate that need use are carried out data mixing by described mixed cell;
Mixed data transformations is the Hash Value of going here and there of checking character by described conversion unit;
This Hash Value and corresponding standard Hash Value contrast by described contrast recovery unit, if identical, then directly use the data of this registration table, if not identical, judge that this item number is according to illegal.
8. the system of data protection according to claim 7, is characterized in that, also comprises acquisition standard Hash Value unit:
Described acquisition standard Hash Value unit is used for obtaining and preserving standard Hash Value.
9. the system of the data protection according to claim 7 or 8, is characterized in that, the unique identity code that described acquiring unit obtains equipment comprises:
The hardware identity identification code of described equipment or the operating system Identity Code of described equipment.
10. the system of the data protection according to claim 7 or 8; it is characterized in that; the data of described unique identity code are arranged on the odd bits of blended data by described mixed cell, and the data of this registration table that need use are arranged on the even bit of blended data.
The system of 11. data protections according to claim 7 or 8, it is characterized in that, mixed data transformations is cyclic redundancy code data by described conversion unit, obtains the Hash Value of CRC value as string of checking character.
The system of 12. data protections according to claim 7 or 8, is characterized in that, described contrast recovery unit is also included in and judges that this item number is according to after illegal, by this item number according to reverting to default value.
CN201410201513.9A 2014-05-13 2014-05-13 Data protection method and system Pending CN105095782A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410201513.9A CN105095782A (en) 2014-05-13 2014-05-13 Data protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410201513.9A CN105095782A (en) 2014-05-13 2014-05-13 Data protection method and system

Publications (1)

Publication Number Publication Date
CN105095782A true CN105095782A (en) 2015-11-25

Family

ID=54576185

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410201513.9A Pending CN105095782A (en) 2014-05-13 2014-05-13 Data protection method and system

Country Status (1)

Country Link
CN (1) CN105095782A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409045A (en) * 2018-09-21 2019-03-01 天津海泰方圆科技有限公司 Browser automated log on account number safety guard method and device
CN113227925A (en) * 2018-12-27 2021-08-06 三菱电机株式会社 Data collection device, method, and program

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155382A (en) * 2006-09-25 2008-04-02 北京三星通信技术研究有限公司 Device and method for sending user's set identification and user information
EP2105836A1 (en) * 2008-03-25 2009-09-30 FilterWorks B.V. Archive system storing archive data from a computer-based information system and method of operating such a system
CN103136459A (en) * 2013-01-09 2013-06-05 上海威客网络科技有限公司 Copyright identification method and system for encrypted digital contents
CN103475664A (en) * 2013-09-18 2013-12-25 北京工业大学 Credible extraction method for digital evidence of Android

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155382A (en) * 2006-09-25 2008-04-02 北京三星通信技术研究有限公司 Device and method for sending user's set identification and user information
EP2105836A1 (en) * 2008-03-25 2009-09-30 FilterWorks B.V. Archive system storing archive data from a computer-based information system and method of operating such a system
CN103136459A (en) * 2013-01-09 2013-06-05 上海威客网络科技有限公司 Copyright identification method and system for encrypted digital contents
CN103475664A (en) * 2013-09-18 2013-12-25 北京工业大学 Credible extraction method for digital evidence of Android

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409045A (en) * 2018-09-21 2019-03-01 天津海泰方圆科技有限公司 Browser automated log on account number safety guard method and device
CN113227925A (en) * 2018-12-27 2021-08-06 三菱电机株式会社 Data collection device, method, and program
CN113227925B (en) * 2018-12-27 2022-07-29 三菱电机株式会社 Data collection device, method, and computer-readable recording medium containing program

Similar Documents

Publication Publication Date Title
US11704384B2 (en) Secure document sharing
CN105282088A (en) Method and system for controlling verification server and method and system for controlling verification
MX2014007792A (en) File system access for one or more sandboxed applications.
CN104852883A (en) Method and system for protecting safety of account information
US20150161390A1 (en) Fast and accurate identification of message-based api calls in application binaries
US10754717B2 (en) Fast and accurate identification of message-based API calls in application binaries
CN114625481B (en) Data processing method and device, readable medium and electronic equipment
CN106815518B (en) Application installation method and electronic equipment
CN104268472B (en) Reduction is by the method and apparatus of third party's dynamic base Modification growth function address
CN104753677A (en) Password hierarchical control method and system
CN104866770A (en) Sensitive data scanning method and sensitive data scanning system
CN106778342A (en) Credible performing environment safety certifying method and device and equipment
CN104767761A (en) Cloud storage platform access control method and device
US9510182B2 (en) User onboarding for newly enrolled devices
CN104573486B (en) leak detection method and device
US8589657B2 (en) Operating system management of address-translation-related data structures and hardware lookasides
CN111181771A (en) Security changing abnormity positioning method and device based on fort machine and electronic equipment
CN105095782A (en) Data protection method and system
WO2015100545A1 (en) Method and device for rights management
CN114329644A (en) Method, device and storage medium for carrying out encryption simulation on logic system design
CN110851795B (en) File management method, device, equipment and readable storage medium
US20170169211A1 (en) One kind of website passwords generating method and apparatus
CN107038388B (en) Multi-user operating system running method and device and computer equipment
CN103577731B (en) A kind of software processing method and device
US10552626B2 (en) System and method for selecting a data entry mechanism for an application based on security requirements

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151125