CN107133524A - A kind of date storage method and device - Google Patents
A kind of date storage method and device Download PDFInfo
- Publication number
- CN107133524A CN107133524A CN201710289493.9A CN201710289493A CN107133524A CN 107133524 A CN107133524 A CN 107133524A CN 201710289493 A CN201710289493 A CN 201710289493A CN 107133524 A CN107133524 A CN 107133524A
- Authority
- CN
- China
- Prior art keywords
- data
- application program
- encrypted
- encryption
- storage medium
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses a kind of date storage method, the problem of security to solve application program in the prior art is relatively low.This method includes:When application program is run, the data manipulation of the application program is intercepted, the data manipulation is the read-write operation for data in the local file of the application program;When it is determined that the targeted data of the data manipulation are the data for needing to encrypt in storage medium, if the data manipulation is the operation that the data are write into the storage medium, then the data are encrypted, the data after encryption are written in the storage medium.The application also provides a kind of data storage device.
Description
Technical field
The application is related to field of computer technology, more particularly to a kind of date storage method and device.
Background technology
As mobile Internet industry is fast-developing, mobile device has been deep into the every aspect in user's life,
The quantity of mobile applications is greatly increased.
Mobile applications usually require to store some configuration informations, user profile etc. using local file.These letters
Breath is all the data higher to security requirement, but in the prior art, lacks effective protection to those data.With Android
Exemplified by system, in the case of the non-root of Android system, due to the sandbox mechanism of Android system in itself, other programs are to read
These files are taken, but after Android system root, rogue program can directly read these files, and use is stolen so as to reach
The purpose of user data.
I.e. in the prior art, the data in the local file of application program are easily stolen, and security is relatively low.
The content of the invention
The embodiment of the present application provides a kind of date storage method, the security to improve application program in the prior art.
The embodiment of the present application uses following technical proposals:
A kind of date storage method, including:
When application program is run, the data manipulation of the application program is intercepted, the data manipulation is to be answered for described
With the read-write operation of data in program local file;
When it is determined that the targeted data of the data manipulation are the data for needing to encrypt in storage medium, if the number
It is the operation that the data are write into the storage medium according to operation, then the data is encrypted, by the number after encryption
According to being written in the storage medium.
The embodiment of the present application also provides a kind of data storage device, the safety to improve application program in the prior art
Property.
The embodiment of the present application uses following technical proposals:
A kind of data storage device, including:
Interception unit, for when application program is run, intercepting the data manipulation of the application program, the data manipulation
For the read-write operation of data in the local file for the application program;
Operating unit, for it is determined that the targeted data of the data manipulation are the numbers that needs are encrypted in storage medium
According to, and the data manipulation is that when the operation of the data is write into the storage medium, the data are encrypted, will
Data after encryption are written in the storage medium.
At least one above-mentioned technical scheme that the embodiment of the present application is used can reach following beneficial effect:
By when application program is run, intercepting the data manipulation of the application program, for the need in data manipulation
The data if the data manipulation is storage operation, are encrypted by the data encrypted in storage medium, then will encryption
Data afterwards are written in storage medium, and the data of such application program are just not easy arbitrarily to be read by other application program, carry
The high security of application program in the prior art.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, this Shen
Schematic description and description please is used to explain the application, does not constitute the improper restriction to the application.In the accompanying drawings:
A kind of implementation process schematic diagram for date storage method that Fig. 1 provides for the embodiment of the present application;
A kind of implementation process schematic diagram for date storage method that Fig. 2 provides for the embodiment of the present application;
A kind of concrete structure schematic diagram for data storage device that Fig. 3 provides for the embodiment of the present application.
Embodiment
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described corresponding accompanying drawing.Obviously, described embodiment is only the application one
Section Example, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Go out the every other embodiment obtained under the premise of creative work, belong to the scope of the application protection.
Below in conjunction with accompanying drawing, the technical scheme that each embodiment of the application is provided is described in detail.
Embodiment 1
For the security that solves application program in the prior art it is relatively low the problem of, the embodiment of the present application provides a kind of data and deposited
Method for storing.The executive agent for the date storage method that the embodiment of the present application is provided can be with terminal device, such as mobile phone, tablet personal computer
Etc., or, in addition, the executive agent of this method or realize the software of this method, such as ensureing application program
The commonly called reinforcing shell for being used to reinforce application program of the module of safety, i.e. this area.
For ease of description, hereafter executive agent in this way is reinforces exemplified by shell, and the embodiment to this method is carried out
Introduce.It is appreciated that the executive agent of this method is a kind of exemplary explanation to reinforce shell, it is not construed as to the party
The restriction of method.
The implementation process schematic diagram of this method is as shown in figure 1, comprise the steps:
Step 11:When application program is run, intercept the data manipulation of the application program, the data manipulation be for
The read-write operation of data in the local file of the application program;
Application program can write data into the local storage medium of terminal in terminal operating in the form of local file
In, then stored again after can those information be encrypted.Because application program can perform data storage in data storage
Operation, then can be intercepted by the data manipulation to application program, and then the application program data to be stored are intercepted, this
Sample need not change application program and just the data that the application program to be stored can be encrypted.
Data manipulation mentioned here can be operation of the application program to data, such as application program, which writes data into, deposits
Data storage operations, the application program of storage media read data read operation of data etc., data manipulation from storage medium
Input/output (Input/Output, I/O) i.e. to data is operated.In actual applications, Hook Function (Hook can be passed through
Function) intercept I/O operation of the application program to data.
Due to subsequently the data of storage to be encrypted, therefore, when intercepting the data manipulation of application program, it can block
Application program is cut to operate the storages of data, also, encrypted due to subsequent read data when, it is necessary to which the data to encryption are carried out
Decryption, then can also enter intercept to the read operation of data to application program.
Step 12:When it is determined that the targeted data of the data manipulation are the data for needing to encrypt in storage medium,
If the data manipulation is the operation that the data are write into the storage medium, the data are encrypted, will be added
Data after close are written in the storage medium.
When data are encrypted, journey is applied in order to guarantee in time to return to the file needed for application program
Sequence, can be encrypted storage, for example just for some files higher to security requirement:Compiled by extensible markup language
File, file of type of database for writing etc..The file that extensible markup language is write typically is the entitled .XML of suffix text
Part, the file of type of database is such as the entitled .DB of suffix file.
So, whether before step 12 is performed, it is to need in storage that can first judge the targeted data of data manipulation
The data encrypted in medium.In actual applications, specifically can be by judging whether the store path of the data meets default
Regular expression judge that regular expression is a kind of logical formula to string operation, be with one pre-defined
The combination of a little specific characters or these specific characters, constitutes one " regular character string ", and this " regular character string " is used for expressing
To a kind of filter logic of character string.
When whether the store path for judging data meets default regular expression, if the store path of data meets pre-
If regular expression, it is determined that the targeted data of the data manipulation are to need the data encrypted in storage medium, if number
According to store path do not meet default regular expression, it is determined that the targeted data of the data manipulation be need not storage
The data encrypted in medium.
For example, the local file that application program is preserved is all in path A:B C below, now expect to .XML files
Data be encrypted, then, regular expression can be written as A:B C * .XML, that is, represent to all .XML under the path
The file of form is encrypted.When being judged, if the store path of the targeted data of data manipulation meets canonical table
Up to formula A:B C * .XML, it is determined that the targeted data of the data manipulation are to need the data encrypted in storage medium.
, can be with when it is determined that the targeted data of the data manipulation intercepted are the data for needing to encrypt in storage medium
The data manipulation data to be write are obtained, then the data are encrypted again, are then written to after encryption in storage medium.
Specifically when data are encrypted, for different terminal devices, different encryption rules can be used, this
Encryption data in sample, a certain equipment, which can not be taken on miscellaneous equipment, to be used, and prevents cracker from passing through on miscellaneous equipment
Shell is reinforced to decrypt the data encrypted in this equipment.
It is determined that during encryption rule, the unique mark for the terminal device that can be currently run according to application program, it is determined that pair
The encryption rule that data are encrypted.Certainly, can be reversible to the encryptions of data, so as to subsequently can be to the number after encryption
The data are obtained according to being decrypted.Encryption rule can specifically include used algorithm during encryption, such as RC4 encryptions are calculated
Method, data encryption standards (Data Encryption Standard, DES) algorithm, Advanced Encryption Standard (Advanced
Encryption Standard, AES) algorithm, XOR AES etc..
The unique mark of terminal device such as can be terminal device physical network card (Media Access Control,
MAC) International Mobile Equipment Identity code (the International Mobile Equipment of address or terminal device
Identity, IMEI).
When used AES during encryption is determined in the unique mark by terminal device, it can be set according to terminal
Standby type, to select the AES of matching.Specifically, predetermined several digits are for marking in the IMEI of terminal device
Know the type of terminal device, such as preceding 6 digit (TAC) in IMEI is " Type Approval number ", the machine of general proxy equipment
Type, then the type of terminal device can be determined according to IMEI, then according to the type of terminal device, and has been pre-established
Terminal equipment type and AES corresponding relation, determine AES.
In the corresponding relation of terminal equipment type and AES, the poor terminal device of process performance can be corresponded to
The faster AES of calculating speed, such as aes algorithm.And the stronger terminal device of process performance, it can correspond to and encrypt complexity
The higher AES of degree, such as 3DES algorithms.
Encryption rule can also include used key during encryption, determine to add in the unique mark by terminal device
, can be so different using the unique mark of terminal device as used key during encryption when close during used key
Equipment is to have corresponded to different encryption keys.In order to further increase the complexity of key, prevent cracker from guessing key, can be with
Unique mark is calculated by key algorithm, to obtain encryption key.Here AES such as can be that Hash is calculated
Method.
After encryption rule is determined through the above way, just data can be encrypted according to the encryption rule of determination,
Then the data after encryption are written in storage medium.So, application program by data storage operations by data storage
To it is local when, data can be reinforced shell interception, reinforce shell data are encrypted, then again by the data Cun Chudao after encryption
Locally.It so can not only ensure that state of the data in storage medium is encrypted state, and the code of application program in itself
Any modification that it goes without doing, improves the security of data in application program local file.
It should be noted that the data described in the embodiment of the present application can be that end is stored in the form of local file
In end equipment, therefore data described in the application can refer to file, such as data being encrypted can be equal to text
Part is encrypted.
Through the above way determine encryption rule after, in order to ensure application program can from storage medium reading and saving
Data, application program read encryption data when, the data of encryption can also be decrypted, then again by after decryption
Data return to application program, then, it again may be by intercepting the data manipulation of application program, then it is determined that the data are grasped
It is to need data to be decrypted to make targeted data, and the data manipulation is when the operation of the data is read from storage medium,
Data after decryption are returned to application program by the data after decryption encryption.
When it is determined that whether the targeted data of data manipulation are to need data to be decrypted, above-mentioned judgement data can be passed through
Whether it is the method for needing to encrypt the data of storage, if the store path of data meets default regular expression, it is determined that should
The targeted data of data manipulation are to need data to be decrypted, if the store path of data does not meet default regular expression,
Then determine that the targeted data of the data manipulation are to be not required to data to be decrypted.
When it is determined that the targeted data of the data manipulation intercepted are to need data to be decrypted, then read from storage medium
The data after the corresponding encryption of the data are taken, then the data after encryption are decrypted, the data after decryption are returned into institute
State application program.
The method that the embodiment of the present application 1 is provided, is grasped by the data for when application program is run, intercepting the application program
Make, for the data encrypted in storage medium the need in data manipulation, if when the data manipulation is storage operation, it is right
The data are encrypted, and then the data after encryption are written in storage medium, and the data of such application program are just not easy
Arbitrarily read by other application program, improve the security of application program in the prior art.
Embodiment 2
Present invention design is described based on previous embodiment 1 in detail, for the ease of being better understood from the application's
Technical characteristic, means and effect, are described further to the date storage method of the application below, so as to form the application's
Another embodiment.
Data storage procedure is similar to data storage procedure described in embodiment 1 in the embodiment of the present application 2, in embodiment 2
The some other step not made referrals to may refer to the associated description in embodiment 1, and here is omitted.
Before being described in detail to the implementation of the program, first the implement scene to the program is simply introduced.
In the implement scene, it is expected that the file for the predetermined format being stored in application program in local file is encrypted and deposit
Storage.
Based on above-mentioned scene, the process of storage is realized in embodiment 2 as shown in Fig. 2 comprising the steps:
Step 21:When application program is run, the data manipulation of application program is intercepted;
Step 22:It is the operation of the data storage into terminal local storage medium to determine the data manipulation;
Step 23:Judge whether the destination path of the data storage operations data to be stored needs to meet default canonical
Expression formula;
For example, the local file that application program is preserved is all in path A:Under B C, expect now to application program local text
Storage is encrypted in the file of .XML forms in part, is previously determined regular expression A:B C * .XML meet this to filter
The file of regular expression.
Step 24:If meeting, the IMEI code of terminal device is obtained, step 28 is performed if not meeting;
Step 25:Using the unique mark as the input of key algorithm, by key algorithm, encryption key is obtained;
Step 26:By obtained encryption key, and AES corresponding with the terminal equipment type, to be saved
Data be encrypted;
Step 27:By under the data Cun Chudao destination paths after encryption.
Step 28:If not meeting, reinforce shell and the data are not handled, and deposited the data by application program
Storage.
The method that the embodiment of the present application 2 is provided, is grasped by the data for when application program is run, intercepting the application program
Make, for the data encrypted in storage medium the need in data manipulation, if when the data manipulation is storage operation, it is right
The data are encrypted, and then the data after encryption are written in storage medium, and the data of such application program are just not easy
Arbitrarily read by other application program, improve the security of application program in the prior art.
Embodiment 3
For the security that solves application program in the prior art it is relatively low the problem of, based on above-described embodiment 1 and 2, the application
Embodiment 3 provides a kind of data storage device.The structural representation of the data storage device is as shown in figure 3, mainly include following
Functional unit:
Interception unit 31, for when application program is run, intercepting the data manipulation of the application program, the data behaviour
It is used as the read-write operation of data in the local file for the application program;
Operating unit 32, for it is determined that the targeted data of the data manipulation need to encrypt in storage medium
Data, and the data manipulation is that when the operation of the data is write into the storage medium, the data are encrypted,
Data after encryption are written in the storage medium.
In one embodiment, implementation also includes judging unit 33, for intercepting described answer in interception unit 31
Whether after the data manipulation of program, it is the number for needing to encrypt in storage medium to judge the targeted data of the data manipulation
According to.
In one embodiment judging unit 33 specifically for:
Judge whether the store path of the data meets default regular expression;
If the store path of the data meets default regular expression, it is determined that the targeted number of the data manipulation
According to being to need the data encrypted in storage medium;
If the store path of the data does not meet default regular expression, it is determined that the data manipulation is targeted
Data are the data that need not be encrypted in storage medium.
In one embodiment, operating unit 32, set specifically for the terminal currently run according to the application program
Standby unique mark, it is determined that the encryption rule that the data are encrypted;
According to the encryption rule of determination, the data are encrypted.
In one embodiment, the encryption rule includes encryption key;
Operating unit 32, specifically for the unique mark of the terminal device currently run according to the application program, it is determined that
The encryption key that the data are encrypted.
In one embodiment, operating unit 32, specifically for:
Determine the unique mark of the terminal device;
Using the unique mark as the input of key algorithm, by key algorithm, encryption key is obtained.
In one embodiment, the unique mark includes following at least one:
Physical network card address;
International Mobile Equipment Identity code.
In one embodiment, described device also includes:
Reading unit 34, for it is determined that the targeted data of the data manipulation are to need data to be decrypted, and it is described
Data manipulation is that when the operation of the data is read from the storage medium, the institute after encryption is read from the storage medium
State data;
The data after encryption are decrypted by decryption unit 35, and the data after decryption are returned into the application journey
Sequence.
In one embodiment, the file includes following at least one:The text write by extensible markup language
Part;The file of type of database.
The device that the embodiment of the present application 3 is provided, is grasped by the data for when application program is run, intercepting the application program
Make, for the data encrypted in storage medium the need in data manipulation, if when the data manipulation is storage operation, it is right
The data are encrypted, and then the data after encryption are written in storage medium, and the data of such application program are just not easy
Arbitrarily read by other application program, improve the security of application program in the prior art.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap
Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described
Also there is other identical element in process, method, commodity or the equipment of element.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art
For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent
Replace, improve etc., it should be included within the scope of claims hereof.
Claims (11)
1. a kind of date storage method, it is characterised in that including:
When application program is run, the data manipulation of the application program is intercepted, the data manipulation is for the application journey
The read-write operation of data in sequence local file;
When it is determined that the targeted data of the data manipulation are the data for needing to encrypt in storage medium, if the data are grasped
Work is the operation that the data are write into the storage medium, then the data is encrypted, and the data after encryption are write
Enter into the storage medium.
2. method as claimed in claim 1, it is characterised in that after the data manipulation of the application program is intercepted, methods described
Also include:
Whether judge the targeted data of the data manipulation is the data for needing to encrypt in storage medium.
3. method as claimed in claim 2, it is characterised in that whether judge the targeted data of the data manipulation is to need
The data encrypted in storage medium, are specifically included:
Judge whether the store path of the data meets default regular expression;
If the store path of the data meets default regular expression, it is determined that the targeted data of the data manipulation are
Need the data encrypted in storage medium;
If the store path of the data does not meet default regular expression, it is determined that the targeted data of the data manipulation
It is the data that need not be encrypted in storage medium.
4. method as claimed in claim 1, it is characterised in that the data are encrypted, specifically included:
The unique mark of the terminal device currently run according to the application program, it is determined that the encryption that the data are encrypted
Rule;
According to the encryption rule of determination, the data are encrypted.
5. method as claimed in claim 4, it is characterised in that the encryption rule includes encryption key;
The unique mark of the terminal device currently run according to the application program, it is determined that the encryption that the data are encrypted
Rule, is specifically included:
The unique mark of the terminal device currently run according to the application program, it is determined that the encryption that the data are encrypted
Key.
6. method as claimed in claim 5, it is characterised in that the terminal device currently run according to the application program it is unique
Mark, it is determined that the encryption key that the data are encrypted, is specifically included:
Determine the unique mark of the terminal device;
Using the unique mark as the input of key algorithm, by key algorithm, encryption key is obtained.
7. method as claimed in claim 6, it is characterised in that the unique mark includes following at least one:
Physical network card address;
International Mobile Equipment Identity code.
8. method as claimed in claim 1, it is characterised in that shown method also includes:
When it is determined that the targeted data of the data manipulation are to need data to be decrypted, if the data manipulation is deposited from described
The operation of the data is read in storage media, then the data after encryption are read from the storage medium;
The data after encryption are decrypted, the data after decryption are returned into the application program.
9. such as any claim methods describeds of claim 1-8, it is characterised in that the file includes following at least one:
The file write by extensible markup language;
The file of type of database.
10. a kind of data storage device, it is characterised in that including:
Interception unit, for when application program is run, intercepting the data manipulation of the application program, the data manipulation is pin
To the read-write operation of data in the local file of the application program;
Operating unit, for it is determined that the targeted data of the data manipulation are to need the data encrypted in storage medium,
And the data manipulation is that when the operation of the data is write into the storage medium, the data are encrypted, and will be added
Data after close are written in the storage medium.
11. device as claimed in claim 10, it is characterised in that
The operating unit, specifically for the unique mark of the terminal device currently run according to the application program, it is determined that pair
The encryption rule that the data are encrypted;
According to the encryption rule of determination, the data are encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710289493.9A CN107133524A (en) | 2017-04-27 | 2017-04-27 | A kind of date storage method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710289493.9A CN107133524A (en) | 2017-04-27 | 2017-04-27 | A kind of date storage method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107133524A true CN107133524A (en) | 2017-09-05 |
Family
ID=59716451
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710289493.9A Pending CN107133524A (en) | 2017-04-27 | 2017-04-27 | A kind of date storage method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107133524A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107609413A (en) * | 2017-09-20 | 2018-01-19 | 深圳怡化电脑股份有限公司 | A kind of processing method, device and the cash box of cash box data |
CN109784074A (en) * | 2018-12-29 | 2019-05-21 | 播金信息科技(上海)有限公司 | Data storage security guard method, system and computer readable storage medium based on DNA characteristics and/or block chain |
CN110909371A (en) * | 2019-11-21 | 2020-03-24 | 广东美的厨房电器制造有限公司 | Data encryption method, electronic device and medium |
CN111310170A (en) * | 2020-01-16 | 2020-06-19 | 深信服科技股份有限公司 | Anti-leakage method and device for application program and computer readable storage medium |
CN114239028A (en) * | 2021-12-20 | 2022-03-25 | 中国平安财产保险股份有限公司 | Data processing method and device, computer equipment and storage medium |
CN114844646A (en) * | 2022-04-15 | 2022-08-02 | 深圳汇辰软件有限公司 | Authentication method and device between devices and electronic device |
CN117313134A (en) * | 2023-11-29 | 2023-12-29 | 联通(广东)产业互联网有限公司 | File encryption method and device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114256A (en) * | 2006-07-24 | 2008-01-30 | 知网生物识别科技股份有限公司 | Real-time data security method |
CN102781001A (en) * | 2011-05-10 | 2012-11-14 | 中兴通讯股份有限公司 | Method for encrypting built-in file of mobile terminal and mobile terminal |
CN102779048A (en) * | 2011-05-10 | 2012-11-14 | 北京磊友信息科技有限公司 | Method and device for operating hypertext markup language5 (HTML5) application program at mobile terminal |
US8874908B2 (en) * | 2012-11-07 | 2014-10-28 | Wolfgang Raudaschl | Process for storing data on a central server |
CN104881616A (en) * | 2015-06-29 | 2015-09-02 | 北京金山安全软件有限公司 | Privacy information storage method and device based on application program |
CN105825143A (en) * | 2016-03-07 | 2016-08-03 | 乐视移动智能信息技术(北京)有限公司 | Application program data writing and reading method and device |
-
2017
- 2017-04-27 CN CN201710289493.9A patent/CN107133524A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114256A (en) * | 2006-07-24 | 2008-01-30 | 知网生物识别科技股份有限公司 | Real-time data security method |
CN102781001A (en) * | 2011-05-10 | 2012-11-14 | 中兴通讯股份有限公司 | Method for encrypting built-in file of mobile terminal and mobile terminal |
CN102779048A (en) * | 2011-05-10 | 2012-11-14 | 北京磊友信息科技有限公司 | Method and device for operating hypertext markup language5 (HTML5) application program at mobile terminal |
US8874908B2 (en) * | 2012-11-07 | 2014-10-28 | Wolfgang Raudaschl | Process for storing data on a central server |
CN104881616A (en) * | 2015-06-29 | 2015-09-02 | 北京金山安全软件有限公司 | Privacy information storage method and device based on application program |
CN105825143A (en) * | 2016-03-07 | 2016-08-03 | 乐视移动智能信息技术(北京)有限公司 | Application program data writing and reading method and device |
Non-Patent Citations (1)
Title |
---|
牛金海: "《TI C66X多核软件开发(MCSDK)技术》", 31 July 2015 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107609413A (en) * | 2017-09-20 | 2018-01-19 | 深圳怡化电脑股份有限公司 | A kind of processing method, device and the cash box of cash box data |
CN109784074A (en) * | 2018-12-29 | 2019-05-21 | 播金信息科技(上海)有限公司 | Data storage security guard method, system and computer readable storage medium based on DNA characteristics and/or block chain |
CN110909371A (en) * | 2019-11-21 | 2020-03-24 | 广东美的厨房电器制造有限公司 | Data encryption method, electronic device and medium |
CN110909371B (en) * | 2019-11-21 | 2022-04-15 | 广东美的厨房电器制造有限公司 | Data encryption method, electronic device and medium |
CN111310170A (en) * | 2020-01-16 | 2020-06-19 | 深信服科技股份有限公司 | Anti-leakage method and device for application program and computer readable storage medium |
CN114239028A (en) * | 2021-12-20 | 2022-03-25 | 中国平安财产保险股份有限公司 | Data processing method and device, computer equipment and storage medium |
CN114844646A (en) * | 2022-04-15 | 2022-08-02 | 深圳汇辰软件有限公司 | Authentication method and device between devices and electronic device |
CN117313134A (en) * | 2023-11-29 | 2023-12-29 | 联通(广东)产业互联网有限公司 | File encryption method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107133524A (en) | A kind of date storage method and device | |
US10839107B2 (en) | Managing a smart contract on a blockchain | |
CN113553610B (en) | Multi-party privacy protection machine learning method based on homomorphic encryption and trusted hardware | |
US8175268B2 (en) | Generating and securing archive keys | |
CN107609418A (en) | Desensitization method, device, storage device and the computer equipment of text data | |
US9646176B2 (en) | Method for encrypting database | |
CN110289946B (en) | Block chain wallet localized file generation method and block chain node point equipment | |
CN108494546A (en) | A kind of whitepack encryption method, device and storage medium | |
CN107947917A (en) | A kind of method and device for generating whitepack key | |
CN108134673A (en) | A kind of method and device for generating whitepack library file | |
CN107025253A (en) | A kind of method, database operation method and device for creating database interface | |
CN107609410A (en) | Android system data guard method, terminal device and storage medium based on HOOK | |
CN113987557A (en) | File encryption processing method and system, electronic equipment and storage medium | |
CN106209346B (en) | White-box cryptography interleaving lookup table | |
CN108416224B (en) | A kind of data encryption/decryption method and device | |
CN104504309A (en) | Data encryption method and terminal for application program | |
US20180309579A1 (en) | Secure representation via a format preserving hash function | |
CN105119917B (en) | Strengthen the method and system of Information Security | |
US8144876B2 (en) | Validating encrypted archive keys with MAC value | |
CN109558341A (en) | Calculator memory data guard method and computer | |
CN110336669A (en) | A kind of encryption method of information, device and electronic equipment | |
CN105740726B (en) | A kind of extension information ciphering method and system | |
CN107968793A (en) | A kind of method, apparatus and system for downloading whitepack key | |
CN108574566A (en) | A kind of whitepack encipher-decipher method, device and storage medium | |
Olaleye et al. | Secure use of cloud storage of data on smartphones using atomic AES on ARM architectures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100083 Beijing, Haidian District Xueyuan Road 30 days building A 20 floor Applicant after: Beijing Bang Bang Safety Technology Co. Ltd. Address before: 100083 Xueyuan Road, Haidian District, Haidian District, Beijing, Haidian District, Beijing Applicant before: Yangpuweiye Technology Limited |
|
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170905 |
|
RJ01 | Rejection of invention patent application after publication |