CN107133524A - A kind of date storage method and device - Google Patents

A kind of date storage method and device Download PDF

Info

Publication number
CN107133524A
CN107133524A CN201710289493.9A CN201710289493A CN107133524A CN 107133524 A CN107133524 A CN 107133524A CN 201710289493 A CN201710289493 A CN 201710289493A CN 107133524 A CN107133524 A CN 107133524A
Authority
CN
China
Prior art keywords
data
application program
encrypted
encryption
storage medium
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710289493.9A
Other languages
Chinese (zh)
Inventor
阚志刚
陈彪
程显龙
卢佐华
方宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
YANGPUWEIYE TECHNOLOGY Ltd
Original Assignee
YANGPUWEIYE TECHNOLOGY Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YANGPUWEIYE TECHNOLOGY Ltd filed Critical YANGPUWEIYE TECHNOLOGY Ltd
Priority to CN201710289493.9A priority Critical patent/CN107133524A/en
Publication of CN107133524A publication Critical patent/CN107133524A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of date storage method, the problem of security to solve application program in the prior art is relatively low.This method includes:When application program is run, the data manipulation of the application program is intercepted, the data manipulation is the read-write operation for data in the local file of the application program;When it is determined that the targeted data of the data manipulation are the data for needing to encrypt in storage medium, if the data manipulation is the operation that the data are write into the storage medium, then the data are encrypted, the data after encryption are written in the storage medium.The application also provides a kind of data storage device.

Description

A kind of date storage method and device
Technical field
The application is related to field of computer technology, more particularly to a kind of date storage method and device.
Background technology
As mobile Internet industry is fast-developing, mobile device has been deep into the every aspect in user's life, The quantity of mobile applications is greatly increased.
Mobile applications usually require to store some configuration informations, user profile etc. using local file.These letters Breath is all the data higher to security requirement, but in the prior art, lacks effective protection to those data.With Android Exemplified by system, in the case of the non-root of Android system, due to the sandbox mechanism of Android system in itself, other programs are to read These files are taken, but after Android system root, rogue program can directly read these files, and use is stolen so as to reach The purpose of user data.
I.e. in the prior art, the data in the local file of application program are easily stolen, and security is relatively low.
The content of the invention
The embodiment of the present application provides a kind of date storage method, the security to improve application program in the prior art.
The embodiment of the present application uses following technical proposals:
A kind of date storage method, including:
When application program is run, the data manipulation of the application program is intercepted, the data manipulation is to be answered for described With the read-write operation of data in program local file;
When it is determined that the targeted data of the data manipulation are the data for needing to encrypt in storage medium, if the number It is the operation that the data are write into the storage medium according to operation, then the data is encrypted, by the number after encryption According to being written in the storage medium.
The embodiment of the present application also provides a kind of data storage device, the safety to improve application program in the prior art Property.
The embodiment of the present application uses following technical proposals:
A kind of data storage device, including:
Interception unit, for when application program is run, intercepting the data manipulation of the application program, the data manipulation For the read-write operation of data in the local file for the application program;
Operating unit, for it is determined that the targeted data of the data manipulation are the numbers that needs are encrypted in storage medium According to, and the data manipulation is that when the operation of the data is write into the storage medium, the data are encrypted, will Data after encryption are written in the storage medium.
At least one above-mentioned technical scheme that the embodiment of the present application is used can reach following beneficial effect:
By when application program is run, intercepting the data manipulation of the application program, for the need in data manipulation The data if the data manipulation is storage operation, are encrypted by the data encrypted in storage medium, then will encryption Data afterwards are written in storage medium, and the data of such application program are just not easy arbitrarily to be read by other application program, carry The high security of application program in the prior art.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, this Shen Schematic description and description please is used to explain the application, does not constitute the improper restriction to the application.In the accompanying drawings:
A kind of implementation process schematic diagram for date storage method that Fig. 1 provides for the embodiment of the present application;
A kind of implementation process schematic diagram for date storage method that Fig. 2 provides for the embodiment of the present application;
A kind of concrete structure schematic diagram for data storage device that Fig. 3 provides for the embodiment of the present application.
Embodiment
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described corresponding accompanying drawing.Obviously, described embodiment is only the application one Section Example, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Go out the every other embodiment obtained under the premise of creative work, belong to the scope of the application protection.
Below in conjunction with accompanying drawing, the technical scheme that each embodiment of the application is provided is described in detail.
Embodiment 1
For the security that solves application program in the prior art it is relatively low the problem of, the embodiment of the present application provides a kind of data and deposited Method for storing.The executive agent for the date storage method that the embodiment of the present application is provided can be with terminal device, such as mobile phone, tablet personal computer Etc., or, in addition, the executive agent of this method or realize the software of this method, such as ensureing application program The commonly called reinforcing shell for being used to reinforce application program of the module of safety, i.e. this area.
For ease of description, hereafter executive agent in this way is reinforces exemplified by shell, and the embodiment to this method is carried out Introduce.It is appreciated that the executive agent of this method is a kind of exemplary explanation to reinforce shell, it is not construed as to the party The restriction of method.
The implementation process schematic diagram of this method is as shown in figure 1, comprise the steps:
Step 11:When application program is run, intercept the data manipulation of the application program, the data manipulation be for The read-write operation of data in the local file of the application program;
Application program can write data into the local storage medium of terminal in terminal operating in the form of local file In, then stored again after can those information be encrypted.Because application program can perform data storage in data storage Operation, then can be intercepted by the data manipulation to application program, and then the application program data to be stored are intercepted, this Sample need not change application program and just the data that the application program to be stored can be encrypted.
Data manipulation mentioned here can be operation of the application program to data, such as application program, which writes data into, deposits Data storage operations, the application program of storage media read data read operation of data etc., data manipulation from storage medium Input/output (Input/Output, I/O) i.e. to data is operated.In actual applications, Hook Function (Hook can be passed through Function) intercept I/O operation of the application program to data.
Due to subsequently the data of storage to be encrypted, therefore, when intercepting the data manipulation of application program, it can block Application program is cut to operate the storages of data, also, encrypted due to subsequent read data when, it is necessary to which the data to encryption are carried out Decryption, then can also enter intercept to the read operation of data to application program.
Step 12:When it is determined that the targeted data of the data manipulation are the data for needing to encrypt in storage medium, If the data manipulation is the operation that the data are write into the storage medium, the data are encrypted, will be added Data after close are written in the storage medium.
When data are encrypted, journey is applied in order to guarantee in time to return to the file needed for application program Sequence, can be encrypted storage, for example just for some files higher to security requirement:Compiled by extensible markup language File, file of type of database for writing etc..The file that extensible markup language is write typically is the entitled .XML of suffix text Part, the file of type of database is such as the entitled .DB of suffix file.
So, whether before step 12 is performed, it is to need in storage that can first judge the targeted data of data manipulation The data encrypted in medium.In actual applications, specifically can be by judging whether the store path of the data meets default Regular expression judge that regular expression is a kind of logical formula to string operation, be with one pre-defined The combination of a little specific characters or these specific characters, constitutes one " regular character string ", and this " regular character string " is used for expressing To a kind of filter logic of character string.
When whether the store path for judging data meets default regular expression, if the store path of data meets pre- If regular expression, it is determined that the targeted data of the data manipulation are to need the data encrypted in storage medium, if number According to store path do not meet default regular expression, it is determined that the targeted data of the data manipulation be need not storage The data encrypted in medium.
For example, the local file that application program is preserved is all in path A:B C below, now expect to .XML files Data be encrypted, then, regular expression can be written as A:B C * .XML, that is, represent to all .XML under the path The file of form is encrypted.When being judged, if the store path of the targeted data of data manipulation meets canonical table Up to formula A:B C * .XML, it is determined that the targeted data of the data manipulation are to need the data encrypted in storage medium.
, can be with when it is determined that the targeted data of the data manipulation intercepted are the data for needing to encrypt in storage medium The data manipulation data to be write are obtained, then the data are encrypted again, are then written to after encryption in storage medium.
Specifically when data are encrypted, for different terminal devices, different encryption rules can be used, this Encryption data in sample, a certain equipment, which can not be taken on miscellaneous equipment, to be used, and prevents cracker from passing through on miscellaneous equipment Shell is reinforced to decrypt the data encrypted in this equipment.
It is determined that during encryption rule, the unique mark for the terminal device that can be currently run according to application program, it is determined that pair The encryption rule that data are encrypted.Certainly, can be reversible to the encryptions of data, so as to subsequently can be to the number after encryption The data are obtained according to being decrypted.Encryption rule can specifically include used algorithm during encryption, such as RC4 encryptions are calculated Method, data encryption standards (Data Encryption Standard, DES) algorithm, Advanced Encryption Standard (Advanced Encryption Standard, AES) algorithm, XOR AES etc..
The unique mark of terminal device such as can be terminal device physical network card (Media Access Control, MAC) International Mobile Equipment Identity code (the International Mobile Equipment of address or terminal device Identity, IMEI).
When used AES during encryption is determined in the unique mark by terminal device, it can be set according to terminal Standby type, to select the AES of matching.Specifically, predetermined several digits are for marking in the IMEI of terminal device Know the type of terminal device, such as preceding 6 digit (TAC) in IMEI is " Type Approval number ", the machine of general proxy equipment Type, then the type of terminal device can be determined according to IMEI, then according to the type of terminal device, and has been pre-established Terminal equipment type and AES corresponding relation, determine AES.
In the corresponding relation of terminal equipment type and AES, the poor terminal device of process performance can be corresponded to The faster AES of calculating speed, such as aes algorithm.And the stronger terminal device of process performance, it can correspond to and encrypt complexity The higher AES of degree, such as 3DES algorithms.
Encryption rule can also include used key during encryption, determine to add in the unique mark by terminal device , can be so different using the unique mark of terminal device as used key during encryption when close during used key Equipment is to have corresponded to different encryption keys.In order to further increase the complexity of key, prevent cracker from guessing key, can be with Unique mark is calculated by key algorithm, to obtain encryption key.Here AES such as can be that Hash is calculated Method.
After encryption rule is determined through the above way, just data can be encrypted according to the encryption rule of determination, Then the data after encryption are written in storage medium.So, application program by data storage operations by data storage To it is local when, data can be reinforced shell interception, reinforce shell data are encrypted, then again by the data Cun Chudao after encryption Locally.It so can not only ensure that state of the data in storage medium is encrypted state, and the code of application program in itself Any modification that it goes without doing, improves the security of data in application program local file.
It should be noted that the data described in the embodiment of the present application can be that end is stored in the form of local file In end equipment, therefore data described in the application can refer to file, such as data being encrypted can be equal to text Part is encrypted.
Through the above way determine encryption rule after, in order to ensure application program can from storage medium reading and saving Data, application program read encryption data when, the data of encryption can also be decrypted, then again by after decryption Data return to application program, then, it again may be by intercepting the data manipulation of application program, then it is determined that the data are grasped It is to need data to be decrypted to make targeted data, and the data manipulation is when the operation of the data is read from storage medium, Data after decryption are returned to application program by the data after decryption encryption.
When it is determined that whether the targeted data of data manipulation are to need data to be decrypted, above-mentioned judgement data can be passed through Whether it is the method for needing to encrypt the data of storage, if the store path of data meets default regular expression, it is determined that should The targeted data of data manipulation are to need data to be decrypted, if the store path of data does not meet default regular expression, Then determine that the targeted data of the data manipulation are to be not required to data to be decrypted.
When it is determined that the targeted data of the data manipulation intercepted are to need data to be decrypted, then read from storage medium The data after the corresponding encryption of the data are taken, then the data after encryption are decrypted, the data after decryption are returned into institute State application program.
The method that the embodiment of the present application 1 is provided, is grasped by the data for when application program is run, intercepting the application program Make, for the data encrypted in storage medium the need in data manipulation, if when the data manipulation is storage operation, it is right The data are encrypted, and then the data after encryption are written in storage medium, and the data of such application program are just not easy Arbitrarily read by other application program, improve the security of application program in the prior art.
Embodiment 2
Present invention design is described based on previous embodiment 1 in detail, for the ease of being better understood from the application's Technical characteristic, means and effect, are described further to the date storage method of the application below, so as to form the application's Another embodiment.
Data storage procedure is similar to data storage procedure described in embodiment 1 in the embodiment of the present application 2, in embodiment 2 The some other step not made referrals to may refer to the associated description in embodiment 1, and here is omitted.
Before being described in detail to the implementation of the program, first the implement scene to the program is simply introduced.
In the implement scene, it is expected that the file for the predetermined format being stored in application program in local file is encrypted and deposit Storage.
Based on above-mentioned scene, the process of storage is realized in embodiment 2 as shown in Fig. 2 comprising the steps:
Step 21:When application program is run, the data manipulation of application program is intercepted;
Step 22:It is the operation of the data storage into terminal local storage medium to determine the data manipulation;
Step 23:Judge whether the destination path of the data storage operations data to be stored needs to meet default canonical Expression formula;
For example, the local file that application program is preserved is all in path A:Under B C, expect now to application program local text Storage is encrypted in the file of .XML forms in part, is previously determined regular expression A:B C * .XML meet this to filter The file of regular expression.
Step 24:If meeting, the IMEI code of terminal device is obtained, step 28 is performed if not meeting;
Step 25:Using the unique mark as the input of key algorithm, by key algorithm, encryption key is obtained;
Step 26:By obtained encryption key, and AES corresponding with the terminal equipment type, to be saved Data be encrypted;
Step 27:By under the data Cun Chudao destination paths after encryption.
Step 28:If not meeting, reinforce shell and the data are not handled, and deposited the data by application program Storage.
The method that the embodiment of the present application 2 is provided, is grasped by the data for when application program is run, intercepting the application program Make, for the data encrypted in storage medium the need in data manipulation, if when the data manipulation is storage operation, it is right The data are encrypted, and then the data after encryption are written in storage medium, and the data of such application program are just not easy Arbitrarily read by other application program, improve the security of application program in the prior art.
Embodiment 3
For the security that solves application program in the prior art it is relatively low the problem of, based on above-described embodiment 1 and 2, the application Embodiment 3 provides a kind of data storage device.The structural representation of the data storage device is as shown in figure 3, mainly include following Functional unit:
Interception unit 31, for when application program is run, intercepting the data manipulation of the application program, the data behaviour It is used as the read-write operation of data in the local file for the application program;
Operating unit 32, for it is determined that the targeted data of the data manipulation need to encrypt in storage medium Data, and the data manipulation is that when the operation of the data is write into the storage medium, the data are encrypted, Data after encryption are written in the storage medium.
In one embodiment, implementation also includes judging unit 33, for intercepting described answer in interception unit 31 Whether after the data manipulation of program, it is the number for needing to encrypt in storage medium to judge the targeted data of the data manipulation According to.
In one embodiment judging unit 33 specifically for:
Judge whether the store path of the data meets default regular expression;
If the store path of the data meets default regular expression, it is determined that the targeted number of the data manipulation According to being to need the data encrypted in storage medium;
If the store path of the data does not meet default regular expression, it is determined that the data manipulation is targeted Data are the data that need not be encrypted in storage medium.
In one embodiment, operating unit 32, set specifically for the terminal currently run according to the application program Standby unique mark, it is determined that the encryption rule that the data are encrypted;
According to the encryption rule of determination, the data are encrypted.
In one embodiment, the encryption rule includes encryption key;
Operating unit 32, specifically for the unique mark of the terminal device currently run according to the application program, it is determined that The encryption key that the data are encrypted.
In one embodiment, operating unit 32, specifically for:
Determine the unique mark of the terminal device;
Using the unique mark as the input of key algorithm, by key algorithm, encryption key is obtained.
In one embodiment, the unique mark includes following at least one:
Physical network card address;
International Mobile Equipment Identity code.
In one embodiment, described device also includes:
Reading unit 34, for it is determined that the targeted data of the data manipulation are to need data to be decrypted, and it is described Data manipulation is that when the operation of the data is read from the storage medium, the institute after encryption is read from the storage medium State data;
The data after encryption are decrypted by decryption unit 35, and the data after decryption are returned into the application journey Sequence.
In one embodiment, the file includes following at least one:The text write by extensible markup language Part;The file of type of database.
The device that the embodiment of the present application 3 is provided, is grasped by the data for when application program is run, intercepting the application program Make, for the data encrypted in storage medium the need in data manipulation, if when the data manipulation is storage operation, it is right The data are encrypted, and then the data after encryption are written in storage medium, and the data of such application program are just not easy Arbitrarily read by other application program, improve the security of application program in the prior art.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Also there is other identical element in process, method, commodity or the equipment of element.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent Replace, improve etc., it should be included within the scope of claims hereof.

Claims (11)

1. a kind of date storage method, it is characterised in that including:
When application program is run, the data manipulation of the application program is intercepted, the data manipulation is for the application journey The read-write operation of data in sequence local file;
When it is determined that the targeted data of the data manipulation are the data for needing to encrypt in storage medium, if the data are grasped Work is the operation that the data are write into the storage medium, then the data is encrypted, and the data after encryption are write Enter into the storage medium.
2. method as claimed in claim 1, it is characterised in that after the data manipulation of the application program is intercepted, methods described Also include:
Whether judge the targeted data of the data manipulation is the data for needing to encrypt in storage medium.
3. method as claimed in claim 2, it is characterised in that whether judge the targeted data of the data manipulation is to need The data encrypted in storage medium, are specifically included:
Judge whether the store path of the data meets default regular expression;
If the store path of the data meets default regular expression, it is determined that the targeted data of the data manipulation are Need the data encrypted in storage medium;
If the store path of the data does not meet default regular expression, it is determined that the targeted data of the data manipulation It is the data that need not be encrypted in storage medium.
4. method as claimed in claim 1, it is characterised in that the data are encrypted, specifically included:
The unique mark of the terminal device currently run according to the application program, it is determined that the encryption that the data are encrypted Rule;
According to the encryption rule of determination, the data are encrypted.
5. method as claimed in claim 4, it is characterised in that the encryption rule includes encryption key;
The unique mark of the terminal device currently run according to the application program, it is determined that the encryption that the data are encrypted Rule, is specifically included:
The unique mark of the terminal device currently run according to the application program, it is determined that the encryption that the data are encrypted Key.
6. method as claimed in claim 5, it is characterised in that the terminal device currently run according to the application program it is unique Mark, it is determined that the encryption key that the data are encrypted, is specifically included:
Determine the unique mark of the terminal device;
Using the unique mark as the input of key algorithm, by key algorithm, encryption key is obtained.
7. method as claimed in claim 6, it is characterised in that the unique mark includes following at least one:
Physical network card address;
International Mobile Equipment Identity code.
8. method as claimed in claim 1, it is characterised in that shown method also includes:
When it is determined that the targeted data of the data manipulation are to need data to be decrypted, if the data manipulation is deposited from described The operation of the data is read in storage media, then the data after encryption are read from the storage medium;
The data after encryption are decrypted, the data after decryption are returned into the application program.
9. such as any claim methods describeds of claim 1-8, it is characterised in that the file includes following at least one:
The file write by extensible markup language;
The file of type of database.
10. a kind of data storage device, it is characterised in that including:
Interception unit, for when application program is run, intercepting the data manipulation of the application program, the data manipulation is pin To the read-write operation of data in the local file of the application program;
Operating unit, for it is determined that the targeted data of the data manipulation are to need the data encrypted in storage medium, And the data manipulation is that when the operation of the data is write into the storage medium, the data are encrypted, and will be added Data after close are written in the storage medium.
11. device as claimed in claim 10, it is characterised in that
The operating unit, specifically for the unique mark of the terminal device currently run according to the application program, it is determined that pair The encryption rule that the data are encrypted;
According to the encryption rule of determination, the data are encrypted.
CN201710289493.9A 2017-04-27 2017-04-27 A kind of date storage method and device Pending CN107133524A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710289493.9A CN107133524A (en) 2017-04-27 2017-04-27 A kind of date storage method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710289493.9A CN107133524A (en) 2017-04-27 2017-04-27 A kind of date storage method and device

Publications (1)

Publication Number Publication Date
CN107133524A true CN107133524A (en) 2017-09-05

Family

ID=59716451

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710289493.9A Pending CN107133524A (en) 2017-04-27 2017-04-27 A kind of date storage method and device

Country Status (1)

Country Link
CN (1) CN107133524A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609413A (en) * 2017-09-20 2018-01-19 深圳怡化电脑股份有限公司 A kind of processing method, device and the cash box of cash box data
CN109784074A (en) * 2018-12-29 2019-05-21 播金信息科技(上海)有限公司 Data storage security guard method, system and computer readable storage medium based on DNA characteristics and/or block chain
CN110909371A (en) * 2019-11-21 2020-03-24 广东美的厨房电器制造有限公司 Data encryption method, electronic device and medium
CN111310170A (en) * 2020-01-16 2020-06-19 深信服科技股份有限公司 Anti-leakage method and device for application program and computer readable storage medium
CN114239028A (en) * 2021-12-20 2022-03-25 中国平安财产保险股份有限公司 Data processing method and device, computer equipment and storage medium
CN114844646A (en) * 2022-04-15 2022-08-02 深圳汇辰软件有限公司 Authentication method and device between devices and electronic device
CN117313134A (en) * 2023-11-29 2023-12-29 联通(广东)产业互联网有限公司 File encryption method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114256A (en) * 2006-07-24 2008-01-30 知网生物识别科技股份有限公司 Real-time data security method
CN102781001A (en) * 2011-05-10 2012-11-14 中兴通讯股份有限公司 Method for encrypting built-in file of mobile terminal and mobile terminal
CN102779048A (en) * 2011-05-10 2012-11-14 北京磊友信息科技有限公司 Method and device for operating hypertext markup language5 (HTML5) application program at mobile terminal
US8874908B2 (en) * 2012-11-07 2014-10-28 Wolfgang Raudaschl Process for storing data on a central server
CN104881616A (en) * 2015-06-29 2015-09-02 北京金山安全软件有限公司 Privacy information storage method and device based on application program
CN105825143A (en) * 2016-03-07 2016-08-03 乐视移动智能信息技术(北京)有限公司 Application program data writing and reading method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114256A (en) * 2006-07-24 2008-01-30 知网生物识别科技股份有限公司 Real-time data security method
CN102781001A (en) * 2011-05-10 2012-11-14 中兴通讯股份有限公司 Method for encrypting built-in file of mobile terminal and mobile terminal
CN102779048A (en) * 2011-05-10 2012-11-14 北京磊友信息科技有限公司 Method and device for operating hypertext markup language5 (HTML5) application program at mobile terminal
US8874908B2 (en) * 2012-11-07 2014-10-28 Wolfgang Raudaschl Process for storing data on a central server
CN104881616A (en) * 2015-06-29 2015-09-02 北京金山安全软件有限公司 Privacy information storage method and device based on application program
CN105825143A (en) * 2016-03-07 2016-08-03 乐视移动智能信息技术(北京)有限公司 Application program data writing and reading method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
牛金海: "《TI C66X多核软件开发(MCSDK)技术》", 31 July 2015 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609413A (en) * 2017-09-20 2018-01-19 深圳怡化电脑股份有限公司 A kind of processing method, device and the cash box of cash box data
CN109784074A (en) * 2018-12-29 2019-05-21 播金信息科技(上海)有限公司 Data storage security guard method, system and computer readable storage medium based on DNA characteristics and/or block chain
CN110909371A (en) * 2019-11-21 2020-03-24 广东美的厨房电器制造有限公司 Data encryption method, electronic device and medium
CN110909371B (en) * 2019-11-21 2022-04-15 广东美的厨房电器制造有限公司 Data encryption method, electronic device and medium
CN111310170A (en) * 2020-01-16 2020-06-19 深信服科技股份有限公司 Anti-leakage method and device for application program and computer readable storage medium
CN114239028A (en) * 2021-12-20 2022-03-25 中国平安财产保险股份有限公司 Data processing method and device, computer equipment and storage medium
CN114844646A (en) * 2022-04-15 2022-08-02 深圳汇辰软件有限公司 Authentication method and device between devices and electronic device
CN117313134A (en) * 2023-11-29 2023-12-29 联通(广东)产业互联网有限公司 File encryption method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107133524A (en) A kind of date storage method and device
US10839107B2 (en) Managing a smart contract on a blockchain
CN113553610B (en) Multi-party privacy protection machine learning method based on homomorphic encryption and trusted hardware
US8175268B2 (en) Generating and securing archive keys
CN107609418A (en) Desensitization method, device, storage device and the computer equipment of text data
US9646176B2 (en) Method for encrypting database
CN110289946B (en) Block chain wallet localized file generation method and block chain node point equipment
CN108494546A (en) A kind of whitepack encryption method, device and storage medium
CN107947917A (en) A kind of method and device for generating whitepack key
CN108134673A (en) A kind of method and device for generating whitepack library file
CN107025253A (en) A kind of method, database operation method and device for creating database interface
CN107609410A (en) Android system data guard method, terminal device and storage medium based on HOOK
CN113987557A (en) File encryption processing method and system, electronic equipment and storage medium
CN106209346B (en) White-box cryptography interleaving lookup table
CN108416224B (en) A kind of data encryption/decryption method and device
CN104504309A (en) Data encryption method and terminal for application program
US20180309579A1 (en) Secure representation via a format preserving hash function
CN105119917B (en) Strengthen the method and system of Information Security
US8144876B2 (en) Validating encrypted archive keys with MAC value
CN109558341A (en) Calculator memory data guard method and computer
CN110336669A (en) A kind of encryption method of information, device and electronic equipment
CN105740726B (en) A kind of extension information ciphering method and system
CN107968793A (en) A kind of method, apparatus and system for downloading whitepack key
CN108574566A (en) A kind of whitepack encipher-decipher method, device and storage medium
Olaleye et al. Secure use of cloud storage of data on smartphones using atomic AES on ARM architectures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100083 Beijing, Haidian District Xueyuan Road 30 days building A 20 floor

Applicant after: Beijing Bang Bang Safety Technology Co. Ltd.

Address before: 100083 Xueyuan Road, Haidian District, Haidian District, Beijing, Haidian District, Beijing

Applicant before: Yangpuweiye Technology Limited

RJ01 Rejection of invention patent application after publication

Application publication date: 20170905

RJ01 Rejection of invention patent application after publication