CN105046174A - Disk data protection method and system - Google Patents

Disk data protection method and system Download PDF

Info

Publication number
CN105046174A
CN105046174A CN201510425509.5A CN201510425509A CN105046174A CN 105046174 A CN105046174 A CN 105046174A CN 201510425509 A CN201510425509 A CN 201510425509A CN 105046174 A CN105046174 A CN 105046174A
Authority
CN
China
Prior art keywords
encryption
module
address
service module
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510425509.5A
Other languages
Chinese (zh)
Inventor
朱大立
范哲铭
庞娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201510425509.5A priority Critical patent/CN105046174A/en
Publication of CN105046174A publication Critical patent/CN105046174A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a disk data protection method and system. The method comprises: when an encryption guard service module receiving a decryption request message sent by a terminal through an interaction program module, acquiring a to-be-decrypted physical partition address corresponding to the request message by querying a preset encryption partition list; the encryption guard service module receiving decryption information sent by the terminal through the interaction program module, decrypting the physical partition address after the decryption information is verified to be correct, and mapping the content of the physical partition address to a newly created folder; and while the terminal performing operation on the content in the newly created folder, the encryption guard service module mapping the operated content in the newly created folder to the physical partition address, deleting the newly created folder after the operation is completed, and performing encryption on the physical partition address. The security of specific partitions is ensured and effective protection of partition data is realized.

Description

The guard method of data in magnetic disk and system
Technical field
The present invention relates to the communications field, be specifically related to a kind of guard method and system of data in magnetic disk.
Background technology
At present, smart mobile phone becomes the carrier of the various information of user, stores a large amount of important information, therefore also becomes the preferred object of malicious attack.The security threat of smart mobile phone very most of from individual privacy divulge a secret and various malice is deducted fees software.First when lost mobile phone or stolen after be easy to the sensitive data therefrom recovering user, although Android platform provides the scheme of full disk encryption, the security breaches wherein still existed.After Android phone starts, full disk encryption after system start-up, will be deciphered completely.Rogue program can easily therefrom the Android platform of run mode steal individual privacy, confidential data.
Upon user initiation, can require to input password, be decrypted if the verification passes by the data subregion of disk, then android system starts, and now the enciphered data of user is all decrypted into expressly.Under the state of system cloud gray model, cannot control its ciphering process, the data namely under run mode in data subregion are uncontrollable, will be in expressly state always, and rogue program can steal privacy of user and secret easily.The method has carried out encipherment protection to the data of disk to a certain extent.But this method is after user enters android system, disk be necessarily in decrypted after plaintext state, but also not by the control of user.User cannot control its ciphering process.Display cannot meet the requirement of secret protection so under many circumstances, and this method is attacked the rogue program of run mode and had no prevention ability simultaneously.For a simple example, if implanted rogue program on mobile phone, when after user's start, disk will be decrypted.Rogue program can copy individual privacy wherein and classified papers easily, and sends it to assailant, steals privacy of user.
Summary of the invention
For defect of the prior art, the invention provides a kind of guard method and system of data in magnetic disk, ensure that the safety of particular zones, achieve the available protecting to partition data.
First aspect, the invention provides a kind of guard method of data in magnetic disk, comprising:
Encryption guards service module when receiving the request message of the deciphering that terminal is sent by interactive program module, obtains address, Physical Extents to be decrypted corresponding to described request message by inquiring about default encrypted partition list;
Described encryption is guarded service module and is received the decryption information that described terminal sent by described interactive program module, after the described decryption information of checking is correct, decipher address, described Physical Extents, and by the content map of address, described Physical Extents in newly-built file, to make described terminal, the content in described newly-built file is operated;
Described encryption guards service module while described terminal operates the content in described newly-built file, by the content map in the newly-built file of operation to address, described Physical Extents, and after described operation completes, delete described newly-built file, address, described Physical Extents is encrypted.
Optionally, guard before service module receives the decryption information that described terminal sent by described interactive program module in described encryption, described method also comprises:
Described encryption is guarded service module and is sent request the decryption information obtaining described address, Physical Extents to be decrypted by described interactive program module to described terminal.
Optionally, described method also comprises:
Described encryption is guarded service module and is received the decryption information that described terminal sent by described interactive program module, when verifying described decryption information mistake, is sent the information of code error by terminal described in described interactive program module cage.
Optionally, described method also comprises:
Described encryption guards service module at the described newly-built file of deletion, after being encrypted, upgrades described default encrypted partition list to address, described Physical Extents.
Second aspect, present invention also offers a kind of protection system of data in magnetic disk, comprising:
Service module is guarded in encryption, for when receiving the request message of the deciphering that terminal is sent by interactive program module, obtains address, Physical Extents to be decrypted corresponding to described request message by inquiring about default encrypted partition list;
Terminal, sends decryption information for guarding service module by described interactive program module to described encryption;
Service module is guarded in described encryption, also for receiving described decryption information, after the described decryption information of checking is correct, deciphers address, described Physical Extents, and by the content map of address, described Physical Extents in newly-built file;
Described terminal, for operating the content in described newly-built file;
Service module is guarded in described encryption, also for while operating the content in described newly-built file in described terminal, by the content map in the newly-built file of operation to address, described Physical Extents, and after described operation completes, delete described newly-built file, address, described Physical Extents is encrypted.
Optionally, service module is guarded in described encryption, also for guarding before service module receives the decryption information that described terminal sent by described interactive program module in described encryption, sent request the decryption information obtaining described address, Physical Extents to be decrypted to described terminal by described interactive program module.
Optionally, service module is guarded in described encryption, also for receiving the decryption information that described terminal is sent by described interactive program module, when verifying described decryption information mistake, sent the information of code error by terminal described in described interactive program module cage.
Optionally, service module is guarded in described encryption, also at the described newly-built file of deletion, after being encrypted, upgrades described default encrypted partition list to address, described Physical Extents.
Optionally, described system also comprises: communication adapter module, and described communication adapter module and described encryption are guarded service module and be connected with described interactive program module;
Described communication adapter module, guards communication between service module and described interactive program module for carrying out described encryption.
Optionally, described system also comprises: subregion encryption/decryption module, and described subregion encryption/decryption module is guarded service module with described encryption and is connected;
Described subregion encryption/decryption module, for encrypting and decrypting operation to address, described Physical Extents.
As shown from the above technical solution; the present invention proposes a kind of guard method and system of data in magnetic disk; the method can be real-time Android particular zones is encrypted; it is decrypted by rear in password authentification; and the visible state of this subregion can be controlled in real time; dynamically ensure that the security of particular zones, real-time protects the data of this subregion, reduces the threat of the privacy leakage of this system platform from system level.Make the original security of android system promotes, add the mechanism of the real-time encrypted management and control in a kind of run mode particular zones, compensate for original disk encryption method not in the defect of the protection of run mode, reduce the security threat of this platform from system level.
Accompanying drawing explanation
The schematic flow sheet of the guard method of a kind of data in magnetic disk that Fig. 1 provides for one embodiment of the invention;
The structural representation of the protection system of a kind of data in magnetic disk that Fig. 2 provides for one embodiment of the invention.
Embodiment
Below in conjunction with accompanying drawing, the embodiment of invention is further described.Following examples only for technical scheme of the present invention is clearly described, and can not limit the scope of the invention with this.
Fig. 1 shows the schematic flow sheet of the guard method of a kind of data in magnetic disk that one embodiment of the invention provides, and as shown in Figure 1, the method comprises the following steps:
101, encryption guards service module when receiving the request message of the deciphering that terminal is sent by interactive program module, obtains address, Physical Extents to be decrypted corresponding to described request message by inquiring about default encrypted partition list;
102, described encryption is guarded service module and is received the decryption information that described terminal sent by described interactive program module, after the described decryption information of checking is correct, decipher address, described Physical Extents, and by the content map of address, described Physical Extents in newly-built file, to make described terminal, the content in described newly-built file is operated;
103, described encryption guards service module while described terminal operates the content in described newly-built file, by the content map in the newly-built file of operation to address, described Physical Extents, and after described operation completes, delete described newly-built file, address, described Physical Extents is encrypted.
Said method can be real-time Android particular zones is encrypted; it is decrypted by rear in password authentification; and the visible state of this subregion can be controlled in real time; dynamically ensure that the security of particular zones; real-time protects the data of this subregion, reduces the threat of the privacy leakage of this system platform from system level.Make the original security of android system promotes, add the mechanism of the real-time encrypted management and control in a kind of run mode particular zones, compensate for original disk encryption method not in the defect of the protection of run mode, reduce the security threat of this platform from system level.
Guard before service module receives the decryption information that described terminal sent by described interactive program module in described encryption in above-mentioned steps 102, described method also comprises not shown step:
Described encryption is guarded service module and is sent request the decryption information obtaining described address, Physical Extents to be decrypted by described interactive program module to described terminal.
In another attainable mode, encryption described in above-mentioned steps 102 is guarded service module and is received the decryption information that described terminal sent by described interactive program module, when verifying described decryption information mistake, sent the information of code error by terminal described in described interactive program module cage.
After above-mentioned steps 103, described method also comprises not shown step:
Described encryption guards service module at the described newly-built file of deletion, after being encrypted, upgrades described default encrypted partition list to address, described Physical Extents.
Said method is optimized for android system in the past increases a kind of method based on the platform partitioned real-time dynamic encryption of android system, it is supported in when android system is run and carries out real-time encryption and decryption to the specified partition of system.Ensureing under the prerequisite that android system is normally run, to the application layer of existing android system, ccf layer, the amendment of kernel service layer and expansion, a bottom layer driving and system service is used to carry out encryption and decryption control to the particular zones of system in real time, the method for the real-time encrypted control of the Android particular zones utilizing management end application builds new.Use a finger daemon service to plan as a whole the operation of whole system, use encryption to guard the service of the service module CryptServer system core as finger daemon, and interactive program module CryptHelper is system application.Effectively ensure that integrality and the security of whole particular zones encrypting and deciphering system, and the state of the real-time effective monitoring encrypted partition of energy.In this operational process, for preserving the key information of user on disk, but directly utilizing the decrypt data in internal memory, ensureing the security of user key, and assailant cannot utilize the method for deleting key to steal the data in encrypted partition.
What utilize that the method can be real-time is encrypted Android particular zones; it is decrypted by rear in password authentification; and the visible state of this subregion can be controlled in real time; dynamically ensure that the security of particular zones; real-time protects the data of this subregion, reduces the threat of the privacy leakage of this system platform from system level.Because the use of this monitoring mechanism of dynamic encryption during implementation-specific, only have when logical password authentification is by using the resource of this subregion effectively to prevent privacy leakage, and the generation of the leakage of a state or party secret.
Below by concrete steps, said method is described in detail.
Step 1: start init process first after system start-up, it will read corresponding configuration file, then CryptServer kernel service is started according to having arranged start-up parameter, CryptServer and the setting of user in pre-read apparatus, and subregion and zone name correspondence table.
Step 2:CryptServer builds a current crypto status list (comprise the encryption state of each subregion current, and encryption and decryption time), and enters waiting status, the instruction of waiting system level application CryptHelper.
Step 3: all subregions being now arranged in CryptServer encrypted list are all in encrypted state, for cannot carry with system subregion now, because the file system of subregion be ciphertext, and without mount point.
Step 4: when user wants to be decrypted certain subregion, user needs air exercise open system level application CryptHelper, and selects the target partition name of deciphering, and now target partition name can be sent to CryptServer by CryptHelper.
Step 5: when CryptServer receives the request of deciphering, first verify the information of the transmit leg of request, and judge whether it is system application CryptHelper.If authentication failed, will directly disconnect, and misregistration.If the verification passes, the information that CryptServer will read in the list of encrypted partition, finds address, corresponding Physical Extents according to object decryption zone name, and corresponding equipment fd, can be understood as the equipment of pointed.
Step 6: when after CryptServer completing steps 5, can return the information that subregion found, and to CryptHelper request partition clear crytpographic key, CryptServer enters waiting status to CryptHelper, waits for that CryptHelper imports clear crytpographic key into.After CryptHelper receives information, refresh interface request user at once and input clear crytpographic key, and authentication password form whether correct (as whether being empty, whether be less than 6 etc.).After user inputs password, CryptHelper at once by this password transmission to CryptServer.
Step 7: after CryptServer receives password, this password attempt is directly utilized to be decrypted this subregion, if password authentification is passed through, then this subregion is deciphered totally, and utilize nuclear tool device-mapper in linux to remap, be mapped to a new block device/dev/mapper/name.
This step is by password attempt, and do not arrange separately a file and have the password form preset corresponding to subregion, password is all sightless for user, therefore, there is not the risk that password is stolen.
Step 8:CryptServer creates a new file SecPart at root directory, and revises its bundle of permissions.Then CryptServer can remove the sub-domains display reading self, according to the file system type of respective partition wherein by after deciphering /dev/mapper/name, be mounted to SecPart, can return to system program CryptHelper after carry completes and complete carry code.
Step 9: if password authentification failure, then CryptServer skips step 8 and returns corresponding error code directly to CryptHelper.CryptHelper points out user's successful decryption according to corresponding code after receiving code, or code error.After this be verified rear user and just normally can use encrypted partition.
Step 10: after user clicks the closedown Mi Qu of system program, in the subregion deciphered, select corresponding zone name, and sent to CryptServer, by the program of closeall this subregion of use of CryptServer, and then separate carry from SecPart, and again encrypt, the then mapping relations of closedown/dev/mapper/name.Then Delete Folder SecPart, now returns to CryptHelper and closes successful code, and CryptHelper refreshes its close district list, and points out user to close corresponding Mi Qu success.
Present invention also offers a kind of structural representation of protection system of data in magnetic disk, as shown in Figure 2, this system comprises: terminal 1, encryption are guarded service module 2, communication adapter module 3, encrypted and guard service module 4 and subregion encryption/decryption module 5.
Service module is guarded in encryption, for when receiving the request message of the deciphering that terminal is sent by interactive program module, obtains address, Physical Extents to be decrypted corresponding to described request message by inquiring about default encrypted partition list;
Terminal, sends decryption information for guarding service module by described interactive program module to described encryption;
Service module is guarded in described encryption, also for receiving described decryption information, after the described decryption information of checking is correct, deciphers address, described Physical Extents, and by the content map of address, described Physical Extents in newly-built file;
Described terminal, for operating the content in described newly-built file;
Service module is guarded in described encryption, also for while operating the content in described newly-built file in described terminal, by the content map in the newly-built file of operation to address, described Physical Extents, and after described operation completes, delete described newly-built file, address, described Physical Extents is encrypted.
In one preferred embodiment, service module is guarded in described encryption, also for guarding before service module receives the decryption information that described terminal sent by described interactive program module in described encryption, sent request the decryption information obtaining described address, Physical Extents to be decrypted to described terminal by described interactive program module.
In one preferred embodiment, service module is guarded in described encryption, also for receiving the decryption information that described terminal is sent by described interactive program module, when verifying described decryption information mistake, sent the information of code error by terminal described in described interactive program module cage.
In one preferred embodiment, service module is guarded in described encryption, also at the described newly-built file of deletion, after being encrypted, upgrades described default encrypted partition list to address, described Physical Extents.
In one preferred embodiment, described system also comprises: communication adapter module, and described communication adapter module and described encryption are guarded service module and be connected with described interactive program module;
Described communication adapter module, guards communication between service module and described interactive program module for carrying out described encryption.
In one preferred embodiment, described system also comprises: subregion encryption/decryption module, and described subregion encryption/decryption module is guarded service module with described encryption and is connected;
Described subregion encryption/decryption module, for encrypting and decrypting operation to address, described Physical Extents.
Will be understood that, each module in said system:
Interactive program module 2, alternately, reminding subscriber terminal inputs corresponding information for primary responsibility and user terminal, display encrypted partition state, and whether the password of preliminary identification user meets rule, and reduce the maloperation of user terminal as far as possible, reduce the processing pressure of underlying services.
Communication adapter module 3, primary responsibility fits in interactive program module and guards between service module with encryption and communicate, because user interactions program module is a system-level application program, encryption finger daemon belongs to bottom kernel service, they are positioned at different framework levels, and programming language is different.
Service module 4 is guarded in encryption; the running status of primary responsibility to the real-time dynamic encryption of a whole set of subregion is protected; receive the information from upper strata; data selection encrypted partition is imported into according to user; identify subregion true path, and be responsible for calling subregion encryption/decryption module and carry out encryption and decryption and file system mounted.
Policy validation module 5, CryptModule, primary responsibility is directly to the direct control of subregion, as identified the physical address of subregion, Encrypt and Decrypt is carried out to the physical address of subregion, and the result of encryption and decryption is returned to encryption in a corresponding manner guards module, be also responsible for final password verification process.
Said system and said method are relations one to one, and the present embodiment is not described in detail to said system.
The above each embodiment, only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to foregoing embodiments to invention has been detailed description, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein some or all of technical characteristic; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.

Claims (10)

1. a guard method for data in magnetic disk, is characterized in that, comprising:
Encryption guards service module when receiving the request message of the deciphering that terminal is sent by interactive program module, obtains address, Physical Extents to be decrypted corresponding to described request message by inquiring about default encrypted partition list;
Described encryption is guarded service module and is received the decryption information that described terminal sent by described interactive program module, after the described decryption information of checking is correct, decipher address, described Physical Extents, and by the content map of address, described Physical Extents in newly-built file, to make described terminal, the content in described newly-built file is operated;
Described encryption guards service module while described terminal operates the content in described newly-built file, by the content map in the newly-built file of operation to address, described Physical Extents, and after described operation completes, delete described newly-built file, address, described Physical Extents is encrypted.
2. method according to claim 1, is characterized in that, guard before service module receives the decryption information that described terminal sent by described interactive program module in described encryption, described method also comprises:
Described encryption is guarded service module and is sent request the decryption information obtaining described address, Physical Extents to be decrypted by described interactive program module to described terminal.
3. method according to claim 1, is characterized in that, described method also comprises:
Described encryption is guarded service module and is received the decryption information that described terminal sent by described interactive program module, when verifying described decryption information mistake, is sent the information of code error by terminal described in described interactive program module cage.
4. method according to claim 1, is characterized in that, described method also comprises:
Described encryption guards service module at the described newly-built file of deletion, after being encrypted, upgrades described default encrypted partition list to address, described Physical Extents.
5. a protection system for data in magnetic disk, is characterized in that, comprising:
Service module is guarded in encryption, for when receiving the request message of the deciphering that terminal is sent by interactive program module, obtains address, Physical Extents to be decrypted corresponding to described request message by inquiring about default encrypted partition list;
Terminal, sends decryption information for guarding service module by described interactive program module to described encryption;
Service module is guarded in described encryption, also for receiving described decryption information, after the described decryption information of checking is correct, deciphers address, described Physical Extents, and by the content map of address, described Physical Extents in newly-built file;
Described terminal, for operating the content in described newly-built file;
Service module is guarded in described encryption, also for while operating the content in described newly-built file in described terminal, by the content map in the newly-built file of operation to address, described Physical Extents, and after described operation completes, delete described newly-built file, address, described Physical Extents is encrypted.
6. system according to claim 5, it is characterized in that, service module is guarded in described encryption, also for guarding before service module receives the decryption information that described terminal sent by described interactive program module in described encryption, sent request the decryption information obtaining described address, Physical Extents to be decrypted to described terminal by described interactive program module.
7. system according to claim 5, it is characterized in that, service module is guarded in described encryption, also for receiving the decryption information that described terminal is sent by described interactive program module, when verifying described decryption information mistake, sent the information of code error by terminal described in described interactive program module cage.
8. system according to claim 5, is characterized in that, service module is guarded in described encryption, also at the described newly-built file of deletion, after being encrypted, upgrades described default encrypted partition list to address, described Physical Extents.
9. the system according to any one of claim 5-8, is characterized in that, described system also comprises: communication adapter module, and described communication adapter module and described encryption are guarded service module and be connected with described interactive program module;
Described communication adapter module, guards communication between service module and described interactive program module for carrying out described encryption.
10. the system according to any one of claim 5-8, is characterized in that, described system also comprises: subregion encryption/decryption module, and described subregion encryption/decryption module is guarded service module with described encryption and is connected;
Described subregion encryption/decryption module, for encrypting and decrypting operation to address, described Physical Extents.
CN201510425509.5A 2015-07-17 2015-07-17 Disk data protection method and system Pending CN105046174A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510425509.5A CN105046174A (en) 2015-07-17 2015-07-17 Disk data protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510425509.5A CN105046174A (en) 2015-07-17 2015-07-17 Disk data protection method and system

Publications (1)

Publication Number Publication Date
CN105046174A true CN105046174A (en) 2015-11-11

Family

ID=54452707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510425509.5A Pending CN105046174A (en) 2015-07-17 2015-07-17 Disk data protection method and system

Country Status (1)

Country Link
CN (1) CN105046174A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110221990A (en) * 2019-04-26 2019-09-10 北京奇安信科技有限公司 Storage method and device, storage medium, the computer equipment of data
CN110837480A (en) * 2019-11-07 2020-02-25 北京沃东天骏信息技术有限公司 Processing method and device of cache data, computer storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101271497A (en) * 2008-04-30 2008-09-24 李硕 Electric document anti-disclosure system and its implementing method
CN101408916A (en) * 2008-08-27 2009-04-15 上海第二工业大学 Internet software internet privacy protection method
CN102567688A (en) * 2011-11-30 2012-07-11 中标软件有限公司 File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN103106372A (en) * 2013-01-17 2013-05-15 上海交通大学 Lightweight class privacy data encryption method and system for Android system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101271497A (en) * 2008-04-30 2008-09-24 李硕 Electric document anti-disclosure system and its implementing method
CN101408916A (en) * 2008-08-27 2009-04-15 上海第二工业大学 Internet software internet privacy protection method
CN102567688A (en) * 2011-11-30 2012-07-11 中标软件有限公司 File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN103106372A (en) * 2013-01-17 2013-05-15 上海交通大学 Lightweight class privacy data encryption method and system for Android system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110221990A (en) * 2019-04-26 2019-09-10 北京奇安信科技有限公司 Storage method and device, storage medium, the computer equipment of data
CN110221990B (en) * 2019-04-26 2021-10-08 奇安信科技集团股份有限公司 Data storage method and device, storage medium and computer equipment
CN110837480A (en) * 2019-11-07 2020-02-25 北京沃东天骏信息技术有限公司 Processing method and device of cache data, computer storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
EP3314808B1 (en) Binding a trusted input session to a trusted output session
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
CN104756127A (en) Secure data handling by a virtual machine
CN105812332A (en) Data protection method
CN111107066A (en) Sensitive data transmission method and system, electronic equipment and storage medium
CN109039652B (en) Digital certificate generation and application method
CN204360381U (en) mobile device
CN106982186A (en) A kind of online safe key guard method and system
CN109598104B (en) Software authorization protection system and method based on timestamp and secret authentication file
CN102333072B (en) Network banking trusted transaction system and method based on intelligent terminal
CN104322003A (en) Cryptographic authentication and identification method using real-time encryption
CN105653986A (en) Micro SD card-based data protection method and device
CN104123506A (en) Data access method and device and data encryption storage and access method and device
CN101414913A (en) Computer network authentication system and method based on virtual technology
CN106789024A (en) A kind of remote de-locking method, device and system
CN103378971A (en) Data encryption system and method
CN103544453A (en) USB (universal serial bus) KEY based virtual desktop file protection method and device
CN105337722A (en) Data encryption method and apparatus
CN107729760B (en) CSP implementation method based on Android system and intelligent terminal
CN112507296A (en) User login verification method and system based on block chain
CN107026730B (en) Data processing method, device and system
KR20160065261A (en) System for preventing forgery of application and method therefor
CN108234125B (en) System and method for identity authentication
CN104955043A (en) Intelligent terminal safety protection system
CN113014393A (en) Password safe box system based on hardware encryption and application method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151111

RJ01 Rejection of invention patent application after publication