CN105183584A - Application cloud backup method and system thereof - Google Patents

Application cloud backup method and system thereof Download PDF

Info

Publication number
CN105183584A
CN105183584A CN201510506374.5A CN201510506374A CN105183584A CN 105183584 A CN105183584 A CN 105183584A CN 201510506374 A CN201510506374 A CN 201510506374A CN 105183584 A CN105183584 A CN 105183584A
Authority
CN
China
Prior art keywords
application
backup
data
cloud server
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510506374.5A
Other languages
Chinese (zh)
Inventor
李川川
陈恒生
郑君
韩医徽
姜波
方琍
赵晨曦
张海洋
王巨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Snowball Technology Co Ltd
Original Assignee
Shenzhen Snowball Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Snowball Technology Co Ltd filed Critical Shenzhen Snowball Technology Co Ltd
Priority to CN201510506374.5A priority Critical patent/CN105183584A/en
Publication of CN105183584A publication Critical patent/CN105183584A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention relates to an application cloud backup method. The method is a method of backing up data in an application to a cloud server by means of a proxy application. The method is characterized by comprising the following steps: a presetting step: respectively presetting an authentication key and an encryption key in the application and the cloud server; a legitimate authentication step: the application authenticating a legitimate identity of the cloud server by means of a switchover of the proxy application; a backup step: under the condition of authenticating the legitimate identity of the cloud server, after backing up data of the application into the proxy application, backing up the data backed up in the proxy application into the cloud server; and a restoring step: restoring the data backed up in the cloud server into the application. By using the cloud backup method and a system thereof provided by the present invention, that only can a legitimate entity initiate cloud backup can be ensured, and security and completeness of the data subjected to backup can be ensured, and consistency, uniqueness and atomicity of the data can be ensured.

Description

A kind of cloud backup method of application and system thereof
Technical field
The present invention relates to data processing field, relate to the method and the system thereof that realize the cloud backup of JavaCard application based on JavaCard platform particularly.
Background technology
Along with constantly universal, the development of mobile Internet, the demand of user to the storage of personal data, migration and management is more and more stronger, and user to need the data in the application on mobile terminal to backup in Cloud Server and from Cloud Server, to carry out the recovery of data afterwards again.
On the other hand, along with mobile payment is advanced by leaps and bounds, occupy very important role in daily life.Such as, mass transit card, bank card, Stored Value member card, reward voucher etc. can be installed to SE chip by the aerial mode downloaded and support in the mobile device of NFC technique.Make mobile device can be used as all kinds of conventional cards to use, improve the facility of Consumer's Experience and life greatly.
In routine use process, there are the following special circumstances: such as, the mobile phone that consumer more renews, need by the application data that using such as: mass transit card, the information back-ups such as member card, to high in the clouds, then return on new mobile phone; Or the card that a mobile phone is opened, to move on another mobile phone etc.Although these are not normality service conditions, also there is certain use scenes, also conveniently experience for user brings simultaneously.But these data all relate to the data of user's fund, if only carry out common backup and recovery, the problem of security may be there is.The problem of these securities comprises:
(1) entity authentication problem: need to ensure to only have legal entity could initiate cloud backup;
(2) problem of data safety: need to ensure the security of data in transmitting procedure and integrality;
(3) data synchronization problems: need the consistance of guarantee data, uniqueness and atomicity.
Summary of the invention
In view of the above problems, the present invention aim to provide a kind of can the cloud backup method of application of assuring data security, integrality and uniqueness and system thereof.
The cloud backup method of application of the present invention is the method data in application being backuped to Cloud Server by agent application, it is characterized in that, comprises the steps:
Initialization step, the preset authenticate key of difference and encryption key in application and Cloud Server;
Legitimate authentication step, applies the legal identity of the switching certification Cloud Server by agent application;
The data of backup in agent application when have authenticated Cloud Server legal identity, by the data backup of application after agent application, then are backuped to Cloud Server by backup-step; And
Backup data in Cloud Server are returned in application by agent application by recovering step.
Preferably, described application realizes sharing interface, and the data interaction between described application and described agent application is by described shared Interface realization.
Preferably, described legitimate authentication step comprises:
(1) user initiates cloud backup request by client end interface and is dealt into Cloud Server, and Cloud Server is initiated generating random number request and is forwarded to application by agent application;
(2) application produces random number according to described generating random number request and this random number is sent to Cloud Server by agent application;
(3) Cloud Server adopts described authenticate key be encrypted random number and generate random number ciphertext, and this random number ciphertext is returned to application by agent application;
(4) authenticate key that applications exploiting is preset verifies this random number ciphertext, when by verifying, be judged as that Cloud Server is legal.
Preferably, described backup-step comprises:
First backup-step, when have authenticated Cloud Server and being legal, encryption key described in the data separate of application is encrypted and by enciphered data by described shared interface backup to agent application; And
Second backup-step, turns the enciphered data of backup in agent application data and backups to Cloud Server from agent application.
Preferably, also possess between described first backup-step and described second backup-step:
Make the step that the application after the first backup-step was lost efficacy.
Preferably, in described first backup-step, 3DES encryption method is adopted to be encrypted for data.
Preferably, after described second backup-step, initiate order by Cloud Server and delete the data cached of described agent application.
Preferably, described recovering step comprises:
(1) complete the deletion of old application in application end, download and install new application;
(2) application to be restored was lost efficacy;
(3) legal identity of random number authentication Cloud Server is utilized;
(4) after certification legal identity, by the date restoring that backs up in Cloud Server in application;
(5) data are recovered after data decryption in the application;
(6) be successfully recovered rear Cloud Server and delete the data recovered, make application recovery normal operating condition to be restored simultaneously.
System of application being carried out to cloud backup of the present invention, is characterized in that possessing:
One or more application, presets authenticate key and encryption key in the application, and realizes the shared interface of backup;
Cloud Server, presets described authenticate key and described encryption key in described Cloud Server, described Cloud Server is for backing up the data of described application;
Agent application, for carrying out the switching of data between described application and Cloud Server, and for the data of buffer memory from described application and Cloud Server,
Wherein, described application is used for the legal identity being carried out Cloud Server described in certification by the switching of described agent application, when have authenticated described Cloud Server legal identity, data applied described in described agent application buffer memory and the data of buffer memory are backuped to described Cloud Server further.
Preferably, described agent application makes described application lose efficacy after the data applied described in buffer memory.
Utilize the method and the system thereof that realize the cloud backup of application of the present invention, owing to carrying out entity authentication by random number, therefore, can ensure to only have legal entity can initiate cloud backup, and all utilize encryption key to be encrypted data in the transmission, backup of data, and calculate HASH value, therefore, it is possible to ensure security and the integrality of carrying out the data backed up.And, when backing up or when recovering data, stopping the called of former application or new opplication, therefore also can ensure the consistance of data, uniqueness and atomicity.Especially, for the data backup of application relating to finance data, the present invention can ensure the security of finance data, synchronism and integrality effectively.
Accompanying drawing explanation
Fig. 1 represents the structure block diagram for realizing the cloud standby system applied of the present invention.
Fig. 2 is the process flow diagram of the key step representing the method for realizing the cloud backup of applying of the present invention.
The JAVA program of an example for realizing shared interface section definition in cloud backup method, backup-step S103, recovering step S104 is represented respectively in Fig. 3 a, Fig. 3 b, Fig. 3 c.
Embodiment
What introduce below is some in Multi-instance of the present invention, aims to provide basic understanding of the present invention.Be not intended to confirm key of the present invention or conclusive key element or limit claimed scope.
JAVACARD is a subset of JAVA technology, is specifically designed in the embedded equipment of smart card, can say that JAVACARD is a kind of smart card running JAVA program.Application in JAVACARD is called " application " hereinafter applet().There is fire wall between each application in JAVACARD, can not mutually access, such as, under normal circumstances, application A can not access application B.Therefore, in JAVACARD, the direct access of the data between different application is strictly forbidden, realizes such logic isolation by the fire wall of JAVACARD platform.
On the other hand, at " JavaCard3PlatformRuntimeEnvironmentSpecification, ClassicEdition " 6.2.4 joint describes ShareableInterface(here in Version3.0.4, we are called " sharing interface ") this feature.Particularly mainly: shared interface is a feature of JavaCardAPI, for realizing the mutual of application.Shared interface defines a set of shared interface method.This interface method can call from context, even when realize this interface method to as if belong to another contextual application.In this standard, as the object instance of class realizing this shared interface, be referred to as shared interface object (SIO).For context itself, SIO is the common object that its member variable (field) and method can be accessed.And for another context, SIO is the example of shared interface and the method be only defined in shared interface could be accessed.The every other member variable of SIO and method are by firewall protection.
In the present invention, inventor just mainly make use of above-mentioned shared interface in JAVACARD to make can carry out data interaction between two methods, such as, make to apply the application that A(is equivalent to hereinafter) and apply the application that B(is equivalent to hereinafter) between shared interface can be utilized to stride across fire wall carry out data interaction, realize cloud backup method and the system thereof of application of the present invention thus.
Below, first the cloud standby system for realizing applying of the present invention is described.
Fig. 1 represents the structure block diagram for realizing the cloud standby system applied of the present invention.
As shown in Figure 1, the cloud standby system for realizing applying of the present invention comprises: multiple application 100, agent application 200 and Cloud Server 300.
In the present invention, application 100 can be one, also can be multiple, as the example of application, such as, can be the various application of public transport application, bank card application, reward voucher application etc.Authenticate key and encryption key is previously provided with in application 100.Application 100 can realize above-mentioned shared interface in design, and the realization sharing interface is realized by program design usually.
Cloud Server 300, for the data of back-up application 100, in Cloud Server 300, with at the preset authenticate key of application 100 and encryption key accordingly, also presets authenticate key and encryption key.
Between application 100 and Cloud Server 300, be provided with agent application 200, utilize agent application 200 can carry out the switching of data between application 100 and Cloud Server 300.Particularly, the data in application 100 can stride across the first buffer memory of fire wall by its shared interface and backup to agent application 200, and then agent application 200 backups to the data of buffer memory in Cloud Server 300 again.That is, here agent application 200 is equivalent to an intermediate transit part, and data (data in the application 100) switching in card is backuped to card outer (i.e. Cloud Server 300).Agent application 200 can correspond to multiple application 100 concerning in card, concerning card outward, agent application 200 is the external uniform outlets of multiple application 100.
Under regard to the application utilizing said system to realize cloud backup method be described.
Fig. 2 is the process flow diagram of the key step representing the method for realizing the cloud backup of applying of the present invention.
As shown in Figure 2, the method comprises the steps:
Initialization step S101: the preset authenticate key of difference and encryption key in application 100 and Cloud Server 300;
Legitimate authentication step S102: application 100 is by the legal identity of it shared interface possessed by the switching certification Cloud Server 300 of agent application 200;
Backup-step S103: when have authenticated Cloud Server 300 legal identity, the data of backup in agent application 200 after agent application 200, then are backuped to Cloud Server 300 by it shared interface backup possessed by the data of application 100; And
Recovering step S104: the data backuped in Cloud Server 300 are returned in application 100 by agent application 200.
Then, initialization step S101, legitimate authentication step S102, backup-step S103 and recovering step S104 are specifically described respectively.
In above-mentioned initialization step S101, the preset authenticate key of difference and encryption key in application 100 and Cloud Server 300.For application 100, authenticate key and encryption key just pre-set when it downloads and installs, the mobile terminal of this application 100 is installed it is seen that through GP encryption not readable information.
Above-mentioned legitimate authentication step S102 specifically comprises:
(1) user initiates cloud backup request to Cloud Server 300 by client end interface;
(2) Cloud Server 300 is initiated generating random number request according to this cloud backup request and is forwarded to application 100 by agent application 200;
(3) application 100 produces random number according to this generating random number request and this random number is sent to Cloud Server 300 by agent application 200;
(4) Cloud Server 300 adopts the authenticate key pre-set wherein be encrypted random number and generate random number ciphertext, and this random number ciphertext is returned to application 100 by agent application 200;
(5) applying 100 utilizes the authenticate key be preset in advance wherein to verify this random number ciphertext, is judged as that Cloud Server 300 is for legal when by verifying.
By utilizing above-mentioned legitimate authentication step S102 to carry out certification, can ensure to only have legal entity can initiate cloud backup, the security of data in application 100 can be ensured thus.
Then, the particular content for above-mentioned backup-step S103 is described.Above-mentioned backup-step S103 comprises the steps:
(1) when have authenticated Cloud Server 300 and being legal, encryption key described in the data separate of application 100 is encrypted and enciphered data is backuped to agent application 200 by sharing interface buffer memory;
(2) after completing the data buffer storage of encryption backuped to agent application 200, in order to avoid backup, recover after data inconsistent, agent application 200 calls the application inefficacy that disableAppSelect function makes to have backed up, and can guarantee that the application after backing up is not being used like this;
(3) enciphered data of backup in agent application 200 to be forwarded to from agent application 200 by client application (so-called client application refers to the operation interface of user here) to backup to Cloud Server 300;
(4) initiate by Cloud Server 300 data that buffer memory in agent application 200 is deleted in order.
In above-mentioned backup-step S103, the encryption of data such as can adopt 3DES.By being encrypted data, and calculate HASH value (using HASH to be to verify the integrality of data) here, security and the integrality of data can be kept, especially, under the data of application relate to the data cases of user's fund, the security of user's fund can effectively be ensured.
In above-mentioned backup-step S103, after buffer memory has backuped to agent application 200 to data, application is just made to be selected, perform the operation different under non-backup instances, such as: the state do not backed up can perform transactional operation, query manipulation etc., and under the state backed up, application just cannot be selected, and this makes it possible to the integrality ensureing data, synchronization data only exist portion.
And in above-mentioned backup-step S103, in Cloud Server 300, the intended application for cloud backup is specified by AID (applicationidentifier).
Then, the particular content for above-mentioned recovering step S104 is described.Above-mentioned recovering step S104 specifically comprises following content:
(1) complete the deletion work of old application, download and install new application;
(2) calling disableAppSelect function makes application to be restored lose efficacy;
(3) random number authentication legal identity (concrete verification process omits, can with reference to above-mentioned authenticating step S102) is utilized here in the same manner as above-mentioned authenticating step S102;
(4) after certification legal identity, the data of backup in Cloud Server 300 are returned in application by agent application;
(5) data are recovered after data decryption in the application;
(6) be successfully recovered rear Cloud Server 300 and delete the data recovered, call enableAppSelect function simultaneously and make application recovery normal operating condition to be restored.
Here, as enforcement an example of the present invention, the JAVA program sample for realizing shared interface section definition in cloud backup method, backup-step S103, recovering step S104 is represented respectively in Fig. 3 a, Fig. 3 b, Fig. 3 c, wherein, program in accompanying drawing is only usability of program fragments, is not complete, and interface definition neither be complete, be only a part, only exemplarily enumerate here.Therefore, illustrated program is only an embodiment here, for protection scope of the present invention not any restriction.
As cloud backup method of the present invention and systematic difference example thereof, can be such as smart machine possessor more renew smart machine when, possessor is by the application in former smart machine, such as, data separate cloud backup method of the present invention in mass transit card application, Bank application or the application of various member card and system cloud thereof backup in Cloud Server, then on the new smart machine more finished changing, recover the data of backup in Cloud Server.
Again, as cloud backup method of the present invention and another example of systematic difference thereof, can be such as that smart machine possessor is when to need certain application migration of using on this smart machine to another smart machine, possessor is by the application in former smart machine, such as, data separate cloud backup method of the present invention in mass transit card application, Bank application or the application of various member card and system cloud thereof backup in Cloud Server, then on the smart machine that another is new, recover the data of backup in Cloud Server.
In the present invention, owing to all have employed random number in cloud backup and recovery, certification is carried out to entity, and, in the transmission, backup procedure of data, also encrypt/decrypt has been carried out to data, further, during carrying out cloud backup, former application is made to lose efficacy, on the other hand, while recovery data, new opplication is also made to lose efficacy.Therefore, utilize cloud backup method and the system thereof of application of the present invention, effectively can ensure the security of data, uniqueness and synchronous consistance.
Above example mainly describes cloud backup method and the system thereof of application of the present invention.Although be only described some of them the specific embodiment of the present invention, those of ordinary skill in the art should understand, and the present invention can implement with other forms many not departing from its purport and scope.Therefore, the example shown and embodiment are regarded as illustrative and not restrictive, when do not depart from as appended each claim define the present invention spirit and scope, the present invention may contain various amendments and replacement.

Claims (10)

1. a cloud backup method for application, the method is the method data in application being backuped to Cloud Server by agent application, it is characterized in that, comprises the steps:
Initialization step, the preset authenticate key of difference and encryption key in application and Cloud Server;
Legitimate authentication step, applies the legal identity of the switching certification Cloud Server by agent application;
The data of backup in agent application when have authenticated Cloud Server legal identity, by the data backup of application after agent application, then are backuped to Cloud Server by backup-step; And
Backup data in Cloud Server are returned in application by agent application by recovering step.
2. the cloud backup method of application as claimed in claim 1, is characterized in that,
Described application realizes sharing interface,
Data interaction between described application and described agent application is by described shared Interface realization.
3. the cloud backup method of application as claimed in claim 2, is characterized in that,
Described legitimate authentication step comprises:
User initiates cloud backup request by client end interface and is dealt into Cloud Server, and Cloud Server is initiated generating random number request and is forwarded to application by agent application;
Apply according to described generating random number request generation random number and this random number is sent to Cloud Server by agent application;
Cloud Server adopts described authenticate key be encrypted random number and generate random number ciphertext, and this random number ciphertext is returned to application by agent application;
The preset authenticate key of applications exploiting verifies this random number ciphertext, when being judged as that Cloud Server is legal by when checking.
4. the cloud backup method of application as claimed in claim 3, is characterized in that,
Described backup-step comprises:
First backup-step, when have authenticated Cloud Server and being legal, encryption key described in the data separate of application is encrypted and by enciphered data by described shared interface backup to agent application; And
Second backup-step, turns the enciphered data of backup in agent application data and backups to Cloud Server from agent application.
5. the cloud backup method of application as claimed in claim 4, is characterized in that,
Also possess between described first backup-step and described second backup-step:
Make the step that the application after the first backup-step was lost efficacy.
6. the cloud backup method of application as claimed in claim 5, is characterized in that,
In described first backup-step, 3DES encryption method is adopted to be encrypted for data.
7. the cloud backup method of application as claimed in claim 1, is characterized in that,
After described second backup-step, initiate order by cloud server end and delete the data cached of described agent application.
8. the cloud backup method of application as claimed in claim 7, is characterized in that,
Described recovering step comprises:
(1) complete the deletion of old application in application end, download and install new application;
(2) application to be restored was lost efficacy;
(3) legal identity of random number authentication Cloud Server is utilized;
(4) after certification legal identity, the data backed up in Cloud Server are returned in application by agent application;
(5) data are recovered after data decryption in the application;
(6) be successfully recovered rear Cloud Server and delete the data recovered, make application recovery normal operating condition to be restored simultaneously.
9. application is carried out to a system for cloud backup, it is characterized in that possessing:
One or more application, presets authenticate key and encryption key in the application, and realizes sharing interface;
Cloud Server, presets described authenticate key and described encryption key in described Cloud Server, described Cloud Server is for backing up the data of described application;
Agent application, for carrying out the switching of data between described application and Cloud Server, and for the data of buffer memory from described application,
Wherein, described application is used for the legal identity being carried out Cloud Server described in certification by the switching of described agent application, when have authenticated described Cloud Server legal identity, data applied described in described agent application buffer memory and the data of buffer memory are backuped to described Cloud Server further.
10. as claimed in claim 9 application is carried out to the system of cloud backup, it is characterized in that,
Described agent application makes described application lose efficacy after the data applied described in buffer memory.
CN201510506374.5A 2015-08-18 2015-08-18 Application cloud backup method and system thereof Pending CN105183584A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510506374.5A CN105183584A (en) 2015-08-18 2015-08-18 Application cloud backup method and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510506374.5A CN105183584A (en) 2015-08-18 2015-08-18 Application cloud backup method and system thereof

Publications (1)

Publication Number Publication Date
CN105183584A true CN105183584A (en) 2015-12-23

Family

ID=54905678

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510506374.5A Pending CN105183584A (en) 2015-08-18 2015-08-18 Application cloud backup method and system thereof

Country Status (1)

Country Link
CN (1) CN105183584A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789220A (en) * 2016-12-13 2017-05-31 北京珠穆朗玛移动通信有限公司 The method and mobile terminal of configuration data
CN107864109A (en) * 2016-09-22 2018-03-30 上海复旦微电子集团股份有限公司 A kind of NFC applications of IC cards data migration method
CN109005234A (en) * 2018-08-13 2018-12-14 广州大学 A kind of safe probability cache policy and its generation method
CN109842594A (en) * 2017-11-28 2019-06-04 中国移动通信集团浙江有限公司 A kind of number verification method, ability open platform and verification platform
CN116204357A (en) * 2023-04-27 2023-06-02 深圳市优博生活科技有限公司 Mobile phone terminal data backup method and system based on hong Monte-go system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101887388A (en) * 2010-06-18 2010-11-17 中兴通讯股份有限公司 Data backup system and method based on memory database
CN102638565A (en) * 2012-02-27 2012-08-15 无锡华赛信息技术有限公司 Mobile phone cloud encryption backup and recovery method based on cloud architecture
CN103607600A (en) * 2013-11-19 2014-02-26 乐视致新电子科技(天津)有限公司 Method and device for cloud backup
CN103763631A (en) * 2014-01-07 2014-04-30 青岛海信信芯科技有限公司 Authentication method, server and television

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101887388A (en) * 2010-06-18 2010-11-17 中兴通讯股份有限公司 Data backup system and method based on memory database
CN102638565A (en) * 2012-02-27 2012-08-15 无锡华赛信息技术有限公司 Mobile phone cloud encryption backup and recovery method based on cloud architecture
CN103607600A (en) * 2013-11-19 2014-02-26 乐视致新电子科技(天津)有限公司 Method and device for cloud backup
CN103763631A (en) * 2014-01-07 2014-04-30 青岛海信信芯科技有限公司 Authentication method, server and television

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107864109A (en) * 2016-09-22 2018-03-30 上海复旦微电子集团股份有限公司 A kind of NFC applications of IC cards data migration method
CN106789220A (en) * 2016-12-13 2017-05-31 北京珠穆朗玛移动通信有限公司 The method and mobile terminal of configuration data
CN109842594A (en) * 2017-11-28 2019-06-04 中国移动通信集团浙江有限公司 A kind of number verification method, ability open platform and verification platform
CN109842594B (en) * 2017-11-28 2021-08-10 中国移动通信集团浙江有限公司 Telephone number verification method, capability open platform and verification platform
CN109005234A (en) * 2018-08-13 2018-12-14 广州大学 A kind of safe probability cache policy and its generation method
CN116204357A (en) * 2023-04-27 2023-06-02 深圳市优博生活科技有限公司 Mobile phone terminal data backup method and system based on hong Monte-go system

Similar Documents

Publication Publication Date Title
EP3800909B1 (en) Remote management method, and device
JP5443659B2 (en) Local trusted service manager for contactless smart cards
CN102882923B (en) Secure storage system and method for mobile terminal
KR101716743B1 (en) Mobile apparatus supporting a plurality of access control clients, and corresponding methods
US7596812B2 (en) System and method for protected data transfer
CN105183584A (en) Application cloud backup method and system thereof
CN106227503A (en) Safety chip COS firmware update, service end, terminal and system
US9633214B2 (en) Self-removal of enterprise app data
KR20140093716A (en) Method of securing a computing device
CN107993073B (en) Face recognition system and working method thereof
CN111310213A (en) Service data protection method, device, equipment and readable storage medium
CN116601912A (en) Post-secret provisioning service providing encryption security
CN105187410A (en) Application self-upgrading method and system
CN113329041B (en) Method, apparatus, electronic device and storage medium for controlling a secure element
JP2007249507A (en) Information leakage prevention method, information leakage prevention system and information terminal
US20190007383A1 (en) Method of receiving data within an electronic entity and associated electronic entity
CN112669104A (en) Data processing method of rental equipment
CN104079539A (en) Data privacy storage method and client
US10396989B2 (en) Method and server for providing transaction keys
CN113312576A (en) Page jump method, system and device
CN109871698B (en) Data processing method, data processing device, computer equipment and storage medium
CN106161366B (en) Method and system for reducing SSL (secure socket layer) occupied space
US11516215B2 (en) Secure access to encrypted data of a user terminal
CN108076021B (en) Service processing method and device
CN109933994B (en) Data hierarchical storage method and device and computing equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151223

RJ01 Rejection of invention patent application after publication