CN110012004A - A kind of data leakage prevention method for keeping in technology based on data - Google Patents
A kind of data leakage prevention method for keeping in technology based on data Download PDFInfo
- Publication number
- CN110012004A CN110012004A CN201910253632.1A CN201910253632A CN110012004A CN 110012004 A CN110012004 A CN 110012004A CN 201910253632 A CN201910253632 A CN 201910253632A CN 110012004 A CN110012004 A CN 110012004A
- Authority
- CN
- China
- Prior art keywords
- data
- temporary
- cipher text
- encrypted cipher
- pointer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention relates to a kind of data leakage prevention methods that technology is kept in based on data, it is provided with and connects the local area network formed by several terminals, the local area network is configured with a central server, the central server connects each terminal in the local area network, each terminal is configured with memory module for storing data, the memory module is made of several storage sections, specifically includes the following steps: data processing step;Data configuration step;Refresh temporary step, using the terminal where first encrypted cipher text as link terminal, including the first temporary step, pointer encrypting step, the second temporary step and address encryption step.It is arranged in this way, the concept of data sharing storage is established in local area network, by the storage mode of time-varying and bounce, and ensure that the safety of data.
Description
Technical field
The present invention relates to date storage methods, let out more specifically to a kind of data for keeping in technology based on data are anti-
Leakage method.
Background technique
Data (Data) are a kind of expression-forms to true, concept or instruction, can set progress by manual or automatic makeup
Processing.Data become after explaining and assigning certain meaning as information.Data processing (data processing) is
To the acquisition of data, storage, retrieval, processing, transformation and transmission.
The basic object of data processing be from it is a large amount of, may be to be extracted simultaneously in rambling, elusive data
Derive for certain specific people it is valuable, significant data.
Data processing is the basic link of system engineering and automatic control.Data processing is raw through social production and society
Every field living.The breadth and depth of development and its application of data processing technique, greatly affects human social development
Process.
And during actually using, due to the terminal that is stored in of data, and data theft is carried out for terminal
Mode is more, as long as then being very easy to cause the leakage of data, and realizing data in data link layer so terminal is invaded
The example stolen is more, once data are stolen, huge loss can be caused to user.
Summary of the invention
In view of this, it is an object of the present invention to provide a kind of data leakage prevention method for keeping in technology based on data, to solve
The above problem.
In order to solve the above-mentioned technical problem, the technical scheme is that a kind of data for keeping in technology based on data are anti-
Leakage method, is provided with and connects the local area network formed by several terminals, and the local area network is configured with a central server, institute
It states central server and connects each terminal in the local area network, each terminal is configured with memory module for storing number
According to, the memory module is made of several storage sections, specifically includes the following steps:
Data processing step encrypts tape handling by the first Encryption Algorithm using the terminal where pending data as initial terminal
Data are to generate the first encrypted cipher text and the corresponding first key of the first encrypted cipher text, into data configuration step;
Data configuration step configures the first refresh time and the second refresh time for first encrypted cipher text, into refreshing
Temporary step;
Refresh temporary step, using the terminal where first encrypted cipher text as link terminal, including the first temporary step, pointer
Encrypting step, the second temporary step and address encryption step;
First temporary step was configured with for the first cumulative time, whole in relaying when the first cumulative time reaching the first refresh time
The storage section that the memory module at end has generated at random obtains the storage section to store first encrypted cipher text
Storage pointer information, the storage pointer information is directed toward the memory space, first cumulative time reset, into pointer
Encrypting step;
Pointer encrypting step encrypts the storage pointer information by the second Encryption Algorithm to generate pointer cipher-text information and right
The pointer key answered saves the pointer key, and the pointer cipher-text information is sent to central server;
Second temporary step configured for the second cumulative time, when the second cumulative time reaching the second refresh time, eventually according to relaying
The routing table at the place at end generates a destination address at random, the end first encrypted cipher text being sent to where the destination address
End, and second cumulative time is reset, into address encryption step;
Address encryption step encrypts the destination address by third Encryption Algorithm to generate address cipher-text information and corresponding
The address cipher-text information is sent to corresponding link terminal by address key, by address key be sent to it is corresponding just always
End.
Further: in the pointer encrypting step, when the central server receives one newly from same link terminal
Pointer cipher-text information when, delete the original pointer cipher-text information of the link terminal.
Further: in the pointer encrypting step, when the link terminal generates a new pointer key, deleting should
The original pointer key of link terminal.
Further: second refresh time when 5-20 times of duration of a length of first refresh time.
Further: the address encryption step is also configured with benchmark migration number, corresponding one first encrypted cipher text setting
There is actual migration number, increases a unit whenever executing actual migration number described in the primary address encryption step, work as institute
When stating actual migration number more than benchmark migration number, the address cipher-text information is sent to corresponding initial
Terminal.
Further: the benchmark migration number is set as 10 times.
Further: the first temporary step further includes, when first encrypted cipher text is stored into the storage section
Before, first encrypted cipher text is encrypted to obtain the first temporary encrypted cipher text by the first temporary Encryption Algorithm;When described first
Before temporary encrypted cipher text is removed from the storage section, it is close that the described first temporary encryption is decrypted by the first temporary decipherment algorithm
Text is to obtain the first encrypted cipher text.
Further: the data lattice of the first corresponding encrypted cipher text of the data format of the first temporary encrypted cipher text
Formula is identical.
Further: the second temporary step further includes, when a link terminal receives first encrypted cipher text, leading to
It crosses the second temporary Encryption Algorithm and encrypts first encrypted cipher text to obtain the second temporary encrypted cipher text;When a link terminal is sent
When the second temporary encrypted cipher text, the second temporary encrypted cipher text is decrypted to obtain first by the second temporary decipherment algorithm
Encrypted cipher text.
Further: the temporary encrypted cipher text of described second is identical as the data format of first encrypted cipher text.
The technology of the present invention effect major embodiment is in the following areas: being arranged in this way, data sharing is established in local area network
The concept of storage by the storage mode of time-varying and bounce, and ensure that the safety of data.
Detailed description of the invention
Fig. 1: the step logic chart of the data leakage prevention method of the invention that technology is kept in based on data;
Fig. 2: the system architecture schematic diagram of the data leakage prevention method of the invention that technology is kept in based on data;
Fig. 3: step logic chart is kept in the refreshing of the data leakage prevention method of the invention that technology is kept in based on data;
Appended drawing reference: 1, initial terminal;2, link terminal;3, central server;10, memory module;110, section is stored;a1,
Data processing step;A2, data configuration step;A3, refresh temporary step;A31, the first temporary step;A32, pointer encryption step
Suddenly;A33, the second temporary step;A34, address encryption step.
Specific embodiment
Below in conjunction with attached drawing, a specific embodiment of the invention is described in further detail, so that technical solution of the present invention is more
It should be readily appreciated that and grasp.
Shown in referring to Fig.1, a kind of data leakage prevention method for being kept in technology based on data is provided with and is connected by several terminals
The local area network of composition, the local area network are configured with a central server 3, and the central server 3 connects the local area network
Each terminal in network, for storing data configured with memory module 10, the memory module 10 is by several for each terminal
Section 110 is stored to form, the present invention first is for the data storage in local area network, and data storage includes two positions, and one
The position for the terminal that data are located at, the other is data be located at which storage section 110 position, and it should be noted that
Firstly the need of marking off an independent memory module 10 from terminal, and memory module 10 is divided into several storage sections
110, storage 110 size of section is identical, and similarly needs to guarantee the size of each be-encrypted data and be less than the appearance of memory space
Amount.Specifically includes the following steps:
Data processing step a1, using the terminal where pending data as initial terminal 1, at the first Encryption Algorithm encryption band
Data are managed to generate the first encrypted cipher text and the corresponding first key of the first encrypted cipher text, into data configuration step a2;
It is that data are handled first, so that it may encrypted data are obtained, and the first encrypted cipher text can only pass through initial terminal 1
Could decrypt, that is to say, that no matter the first encrypted cipher text be sent to where, the right to use still falls within initial terminal 1,
In this way it is prevented that leaking data.
Data configuration step a2 configures the first refresh time and the second refresh time for first encrypted cipher text, into
Enter and refreshes temporary step a3;It then corresponds to each first encrypted cipher text and configures the first refresh time and the second refresh time, institute
State the second refresh time when 5-20 times of duration of a length of first refresh time.
Refresh temporary step a3, using the terminal where first encrypted cipher text as link terminal 2, including the first temporary step
Rapid a31, pointer encrypting step a32, the second temporary step a33 and address encryption step a34;It is walked as core of the invention
Suddenly, it is described in detail, for a corresponding encrypted cipher text, the terminal where defining it is link terminal 2, such as link terminal at this time
2B receives the encrypted cipher text.It should be noted that being continuous for refreshing corresponding first encrypted cipher text of temporary step a3
Repeat to execute, is triggered according to the time actual time, rather than triggered according to sequence of steps.
First temporary step a31 was configured with for the first cumulative time, when the first cumulative time reaching the first refresh time,
In the storage section 110 that the memory module 10 of link terminal 2 has generated at random to store first encrypted cipher text, and
The storage pointer information in the storage section 110 is obtained, the storage pointer information is directed toward the memory space, resetting described first
Cumulative time, into pointer encrypting step a32;Cumulative time obtains according to the real time, and can be received with link terminal 2
One encrypted cipher text is initial time, and such as the first refresh time is set as 60 seconds, that is to say, that was then added every 60 seconds for first
Ciphertext changes a memory space, in another embodiment, when first encrypted cipher text is stored into the storage section 110
Before, first encrypted cipher text is encrypted to obtain the first temporary encrypted cipher text by the first temporary Encryption Algorithm;When described first
Before temporary encrypted cipher text is removed from the storage section 110, add by the way that the first temporary decipherment algorithm decryption described first is temporary
Ciphertext is to obtain the first encrypted cipher text.Namely deposit and taking-up carry out primary encryption and decryption step respectively every time, improve
Information Security, and the information that pointer information is unique available position to storage section 110 is stored, as long as so initial
Terminal 1 get the address of link terminal 2 and get storage pointer information position be obtained with the first encrypted cipher text,
To carry out using.The data format phase of the first corresponding encrypted cipher text of the data format of the first temporary encrypted cipher text
Together.
Pointer encrypting step a32 encrypts the storage pointer information by the second Encryption Algorithm to generate pointer ciphertext letter
Breath and corresponding pointer key, save the pointer key, the pointer cipher-text information are sent to central server 3;And
Pointer encrypting step a32 is to be encrypted by the second Encryption Algorithm to storage pointer information, so, this location information
It needs just to can be carried out acquisition by pointer key.And so if initial terminal 1 needs to obtain storage pointer information, it is necessary to
To pointer cipher-text information and corresponding pointer key, and pointer cipher-text information is managed collectively in central server 3, each
Link terminal 2 does not retain pointer cipher-text information, and pointer key is then saved in corresponding link terminal 2, so, always just
End 1 needs to transmit a request to central server 3, and central server 3 finds corresponding link terminal 2, acquisition pair after receiving request
The pointer key answered, obtains storage pointer information, and such initial terminal 1 could complete the acquisition of the first encrypted cipher text, more pacify
It is complete reliable.In the pointer encrypting step a32, when the central server 3 receives a new pointer from same link terminal 2
When cipher-text information, the original pointer cipher-text information of link terminal 2 is deleted.In the pointer encrypting step a32, when the relaying
When terminal 2 generates a new pointer key, the original pointer key of link terminal 2 is deleted.
Second temporary step a33 configures the second cumulative time, when the second cumulative time reaching the second refresh time, root
A destination address is generated at random according to the routing table at the place of link terminal 2, and first encrypted cipher text is sent to the destination
Terminal where location, and second cumulative time is reset, into address encryption step a34;And the step is to count
According to sending, so the second cumulative time is accumulative according to the real time, such as is set as 5 minutes by configuring for the second cumulative time,
When the time reaching 5 minutes, so that it may it is sent to next terminal, and destination address is random according to 2 routing table of link terminal
It generates, has not regulation, can not track.The second temporary step a33 further includes, when a link terminal 2 receives described
When one encrypted cipher text, first encrypted cipher text is encrypted to obtain the second temporary encrypted cipher text by the second temporary Encryption Algorithm;
When a link terminal 2 sends the second temporary encrypted cipher text, it is temporary that described second is decrypted by the second temporary decipherment algorithm
Encrypted cipher text is to obtain the first encrypted cipher text.The data format of the temporary encrypted cipher text of described second and first encrypted cipher text
It is identical.So, reliability and safety are improved.
Address encryption step a34, the destination address is encrypted by third Encryption Algorithm with generate address cipher-text information with
And corresponding address key, the address cipher-text information is sent to corresponding link terminal 2, address key is sent to correspondence
Initial terminal 1.The setting of address encryption step a34, in order to encryption address, and address key is sent to just always
End 1, address cipher-text information is sent to corresponding link terminal 2, that is to say, that a corresponding data X, by A-B-C-D-E
Terminal, initial terminal 1A only has the address cipher-text information of B, but initial terminal 1 has all address keys, so can
To obtain the address of B, and B has the address cipher-text information of C, and is fed back to obtain the address of C according to B, thus successively until obtaining
The position of first encryption data sends to central server 3 and requests and obtain corresponding pointer storage information, to obtain correspondence
The first encryption data.In another embodiment, the address encryption step a34 is also configured with benchmark migration number, corresponding
One first encrypted cipher text is provided with actual migration number, whenever executing actual migration described in the primary address encryption step a34
Number increases a unit, when the actual migration number is more than benchmark migration number, by the address cipher-text information
It is sent to corresponding initial terminal 1.And it should be noted that is for a long time if constantly repeating data transmission
The data transmission range of formation increases, and data efficiency is called to reduce, so one numerical value of configuration, such as benchmark migration
Number is set as 10 times.And after being sent when 10 times, initial terminal 1 can be obtained by current position, that is to say, that pervious
It is invalid for address key and address cipher-text information, reduces data volume.
Certainly, above is representative instance of the invention, and in addition to this, the present invention can also have other a variety of specific implementations
Mode, all technical solutions formed using equivalent substitution or equivalent transformation, is all fallen within the scope of protection of present invention.
Claims (10)
1. a kind of data leakage prevention method for keeping in technology based on data, it is characterised in that: be provided with by several terminal connection groups
At local area network, the local area network is configured with a central server, and the central server connects in the local area network
Each terminal, each terminal configured with memory module for storing data, the memory module is by several storage sections
Composition, specifically includes the following steps:
Data processing step encrypts tape handling by the first Encryption Algorithm using the terminal where pending data as initial terminal
Data are to generate the first encrypted cipher text and the corresponding first key of the first encrypted cipher text, into data configuration step;
Data configuration step configures the first refresh time and the second refresh time for first encrypted cipher text, into refreshing
Temporary step;
Refresh temporary step, using the terminal where first encrypted cipher text as link terminal, including the first temporary step, pointer
Encrypting step, the second temporary step and address encryption step;
First temporary step was configured with for the first cumulative time, whole in relaying when the first cumulative time reaching the first refresh time
The storage section that the memory module at end has generated at random obtains the storage section to store first encrypted cipher text
Storage pointer information, the storage pointer information is directed toward the memory space, first cumulative time reset, into pointer
Encrypting step;
Pointer encrypting step encrypts the storage pointer information by the second Encryption Algorithm to generate pointer cipher-text information and right
The pointer key answered saves the pointer key, and the pointer cipher-text information is sent to central server;
Second temporary step configured for the second cumulative time, when the second cumulative time reaching the second refresh time, eventually according to relaying
The routing table at the place at end generates a destination address at random, the end first encrypted cipher text being sent to where the destination address
End, and second cumulative time is reset, into address encryption step;
Address encryption step encrypts the destination address by third Encryption Algorithm to generate address cipher-text information and corresponding
The address cipher-text information is sent to corresponding link terminal by address key, by address key be sent to it is corresponding just always
End.
2. a kind of data leakage prevention method for keeping in technology based on data as described in claim 1, it is characterised in that: the finger
In needle encrypting step, when the central server receives a new pointer cipher-text information from same link terminal, deleting should
The original pointer cipher-text information of link terminal.
3. a kind of data leakage prevention method for keeping in technology based on data as claimed in claim 2, it is characterised in that: the finger
In needle encrypting step, when the link terminal generates a new pointer key, the original pointer key of the link terminal is deleted.
4. a kind of data leakage prevention method for keeping in technology based on data as described in claim 1, it is characterised in that: described the
Two refresh times when 5-20 times of duration of a length of first refresh time.
5. a kind of data leakage prevention method for keeping in technology based on data as described in claim 1, it is characterised in that: describedly
Location encrypting step is also configured with benchmark migration number, and corresponding one first encrypted cipher text is provided with actual migration number, whenever execution
Actual migration number described in the primary address encryption step increases a unit, when the actual migration number is more than the base
When quasi- migration number, the address cipher-text information is sent to corresponding initial terminal.
6. a kind of data leakage prevention method for keeping in technology based on data as claimed in claim 5, it is characterised in that: the base
Quasi- migration number is set as 10 times.
7. a kind of data leakage prevention method for keeping in technology based on data as described in claim 1, it is characterised in that: described the
One temporary step further includes before first encrypted cipher text is stored into the storage section, passing through the first temporary Encryption Algorithm
First encrypted cipher text is encrypted to obtain the first temporary encrypted cipher text;When the described first temporary encrypted cipher text is from the memory block
Between be removed before, the first temporary encrypted cipher text is decrypted to obtain the first encrypted cipher text by the first temporary decipherment algorithm.
8. a kind of data leakage prevention method for keeping in technology based on data as claimed in claim 7, it is characterised in that: described the
The data format of the first corresponding encrypted cipher text of the data format of one temporary encrypted cipher text is identical.
9. a kind of data leakage prevention method for keeping in technology based on data as described in claim 1, it is characterised in that: described the
Two temporary steps further include, and when a link terminal receives first encrypted cipher text, are encrypted by the second temporary Encryption Algorithm
First encrypted cipher text is to obtain the second temporary encrypted cipher text;When a link terminal sends the second temporary encrypted cipher text
When, the second temporary encrypted cipher text is decrypted to obtain the first encrypted cipher text by the second temporary decipherment algorithm.
10. a kind of data leakage prevention method for keeping in technology based on data as claimed in claim 9, it is characterised in that: described
The second temporary encrypted cipher text it is identical as the data format of first encrypted cipher text.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811191841X | 2018-10-12 | ||
CN201811191841 | 2018-10-12 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110012004A true CN110012004A (en) | 2019-07-12 |
CN110012004B CN110012004B (en) | 2020-08-18 |
Family
ID=67169105
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910253632.1A Active CN110012004B (en) | 2018-10-12 | 2019-03-30 | Data anti-leakage method based on data temporary storage technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110012004B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103152362A (en) * | 2013-03-28 | 2013-06-12 | 胡祥义 | Cloud-computing-based encrypted transmission method for large data files |
CN103544217A (en) * | 2013-09-26 | 2014-01-29 | 福建省闽保信息技术股份有限公司 | Data storage system |
CN104143355A (en) * | 2013-05-09 | 2014-11-12 | 华为技术有限公司 | Dynamic random access memory refreshing method and apparatus thereof |
CN105262843A (en) * | 2015-11-12 | 2016-01-20 | 武汉理工大学 | Data anti-leakage protection method for cloud storage environment |
CN106209373A (en) * | 2015-04-30 | 2016-12-07 | 富泰华工业(深圳)有限公司 | Key generation system, data stamped signature and encryption system and method |
CN106409336A (en) * | 2016-09-13 | 2017-02-15 | 天津大学 | Random time based nonvolatile memory data secure erasure method |
CN106682903A (en) * | 2017-01-18 | 2017-05-17 | 齐宇庆 | Feedback verification method of bank payment permission authentication information |
US20170228202A1 (en) * | 2000-11-01 | 2017-08-10 | Flexiworld Technologies, Inc. | Sound output system or internet appliance that supports voice activated commands, and that plays audio data received from a service over a network |
CN108446172A (en) * | 2018-02-26 | 2018-08-24 | 平安普惠企业管理有限公司 | Data transfer method, apparatus, computer equipment and storage medium |
CN108596618A (en) * | 2018-04-26 | 2018-09-28 | 众安信息技术服务有限公司 | Data processing method, device and the computer readable storage medium of block catenary system |
-
2019
- 2019-03-30 CN CN201910253632.1A patent/CN110012004B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170228202A1 (en) * | 2000-11-01 | 2017-08-10 | Flexiworld Technologies, Inc. | Sound output system or internet appliance that supports voice activated commands, and that plays audio data received from a service over a network |
CN103152362A (en) * | 2013-03-28 | 2013-06-12 | 胡祥义 | Cloud-computing-based encrypted transmission method for large data files |
CN104143355A (en) * | 2013-05-09 | 2014-11-12 | 华为技术有限公司 | Dynamic random access memory refreshing method and apparatus thereof |
CN103544217A (en) * | 2013-09-26 | 2014-01-29 | 福建省闽保信息技术股份有限公司 | Data storage system |
CN106209373A (en) * | 2015-04-30 | 2016-12-07 | 富泰华工业(深圳)有限公司 | Key generation system, data stamped signature and encryption system and method |
CN105262843A (en) * | 2015-11-12 | 2016-01-20 | 武汉理工大学 | Data anti-leakage protection method for cloud storage environment |
CN106409336A (en) * | 2016-09-13 | 2017-02-15 | 天津大学 | Random time based nonvolatile memory data secure erasure method |
CN106682903A (en) * | 2017-01-18 | 2017-05-17 | 齐宇庆 | Feedback verification method of bank payment permission authentication information |
CN108446172A (en) * | 2018-02-26 | 2018-08-24 | 平安普惠企业管理有限公司 | Data transfer method, apparatus, computer equipment and storage medium |
CN108596618A (en) * | 2018-04-26 | 2018-09-28 | 众安信息技术服务有限公司 | Data processing method, device and the computer readable storage medium of block catenary system |
Also Published As
Publication number | Publication date |
---|---|
CN110012004B (en) | 2020-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040090B (en) | A kind of data ciphering method and device | |
CN108235772B (en) | Data processing method and device based on block chain, storage medium and electronic equipment | |
CN110224814B (en) | Block chain data sharing method and device | |
CN105610793B (en) | A kind of outsourcing data encryption storage and cryptogram search system and its application process | |
CN107347058A (en) | Data ciphering method, data decryption method, apparatus and system | |
CN103533539B (en) | Virtual SIM card parameter management method and device | |
CN110073634A (en) | Data conversion system and method | |
CN106534085A (en) | Privacy protection method based on block chain technology | |
CN108737374A (en) | The method for secret protection that data store in a kind of block chain | |
CN102567688B (en) | File confidentiality keeping system and file confidentiality keeping method on Android operating system | |
CN102138300A (en) | Message authentication code pre-computation with applications to secure memory | |
CN104660551B (en) | A kind of database access device and method based on webservice | |
CN109543434B (en) | Block chain information encryption method, decryption method, storage method and device | |
CN108063756A (en) | A kind of key management method, device and equipment | |
CN107948152A (en) | Information storage means, acquisition methods, device and equipment | |
CN107995299A (en) | The blind storage method of anti-access module leakage under a kind of cloud environment | |
JP2014175970A (en) | Information distribution system, information processing device, and program | |
CN107426162A (en) | A kind of method based on attribute base encryption Implement Core mutual role help | |
CN106161444A (en) | Secure storage method of data and subscriber equipment | |
CN104836790A (en) | Linked storage fine-grained access control model based on attribute encryption and timestamp | |
WO2017033843A1 (en) | Searchable cryptograph processing system | |
CN109802832A (en) | A kind of processing method of data file, system, big data processing server and computer storage medium | |
CN108965279A (en) | Data processing method, device, terminal device and computer readable storage medium | |
CN111444268A (en) | Data encryption method based on block chain | |
CN102892113B (en) | Method for safety transmission of data between nodes in hierarchical wireless sensor network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200723 Address after: Room 651, 128 Lushan Road, Jianye District, Nanjing City, Jiangsu Province Applicant after: Nanjing huidawei Information Technology Co., Ltd Address before: The large village of Qinglong Town Yuxi City, Yunnan province 652803 Huaning County will White Village No. 73 Applicant before: Wang Long |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |