CN110012004A - A kind of data leakage prevention method for keeping in technology based on data - Google Patents

A kind of data leakage prevention method for keeping in technology based on data Download PDF

Info

Publication number
CN110012004A
CN110012004A CN201910253632.1A CN201910253632A CN110012004A CN 110012004 A CN110012004 A CN 110012004A CN 201910253632 A CN201910253632 A CN 201910253632A CN 110012004 A CN110012004 A CN 110012004A
Authority
CN
China
Prior art keywords
data
temporary
cipher text
encrypted cipher
pointer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910253632.1A
Other languages
Chinese (zh)
Other versions
CN110012004B (en
Inventor
王龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing huidawei Information Technology Co., Ltd
Original Assignee
王龙
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 王龙 filed Critical 王龙
Publication of CN110012004A publication Critical patent/CN110012004A/en
Application granted granted Critical
Publication of CN110012004B publication Critical patent/CN110012004B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a kind of data leakage prevention methods that technology is kept in based on data, it is provided with and connects the local area network formed by several terminals, the local area network is configured with a central server, the central server connects each terminal in the local area network, each terminal is configured with memory module for storing data, the memory module is made of several storage sections, specifically includes the following steps: data processing step;Data configuration step;Refresh temporary step, using the terminal where first encrypted cipher text as link terminal, including the first temporary step, pointer encrypting step, the second temporary step and address encryption step.It is arranged in this way, the concept of data sharing storage is established in local area network, by the storage mode of time-varying and bounce, and ensure that the safety of data.

Description

A kind of data leakage prevention method for keeping in technology based on data
Technical field
The present invention relates to date storage methods, let out more specifically to a kind of data for keeping in technology based on data are anti- Leakage method.
Background technique
Data (Data) are a kind of expression-forms to true, concept or instruction, can set progress by manual or automatic makeup Processing.Data become after explaining and assigning certain meaning as information.Data processing (data processing) is To the acquisition of data, storage, retrieval, processing, transformation and transmission.
The basic object of data processing be from it is a large amount of, may be to be extracted simultaneously in rambling, elusive data Derive for certain specific people it is valuable, significant data.
Data processing is the basic link of system engineering and automatic control.Data processing is raw through social production and society Every field living.The breadth and depth of development and its application of data processing technique, greatly affects human social development Process.
And during actually using, due to the terminal that is stored in of data, and data theft is carried out for terminal Mode is more, as long as then being very easy to cause the leakage of data, and realizing data in data link layer so terminal is invaded The example stolen is more, once data are stolen, huge loss can be caused to user.
Summary of the invention
In view of this, it is an object of the present invention to provide a kind of data leakage prevention method for keeping in technology based on data, to solve The above problem.
In order to solve the above-mentioned technical problem, the technical scheme is that a kind of data for keeping in technology based on data are anti- Leakage method, is provided with and connects the local area network formed by several terminals, and the local area network is configured with a central server, institute It states central server and connects each terminal in the local area network, each terminal is configured with memory module for storing number According to, the memory module is made of several storage sections, specifically includes the following steps:
Data processing step encrypts tape handling by the first Encryption Algorithm using the terminal where pending data as initial terminal Data are to generate the first encrypted cipher text and the corresponding first key of the first encrypted cipher text, into data configuration step;
Data configuration step configures the first refresh time and the second refresh time for first encrypted cipher text, into refreshing Temporary step;
Refresh temporary step, using the terminal where first encrypted cipher text as link terminal, including the first temporary step, pointer Encrypting step, the second temporary step and address encryption step;
First temporary step was configured with for the first cumulative time, whole in relaying when the first cumulative time reaching the first refresh time The storage section that the memory module at end has generated at random obtains the storage section to store first encrypted cipher text Storage pointer information, the storage pointer information is directed toward the memory space, first cumulative time reset, into pointer Encrypting step;
Pointer encrypting step encrypts the storage pointer information by the second Encryption Algorithm to generate pointer cipher-text information and right The pointer key answered saves the pointer key, and the pointer cipher-text information is sent to central server;
Second temporary step configured for the second cumulative time, when the second cumulative time reaching the second refresh time, eventually according to relaying The routing table at the place at end generates a destination address at random, the end first encrypted cipher text being sent to where the destination address End, and second cumulative time is reset, into address encryption step;
Address encryption step encrypts the destination address by third Encryption Algorithm to generate address cipher-text information and corresponding The address cipher-text information is sent to corresponding link terminal by address key, by address key be sent to it is corresponding just always End.
Further: in the pointer encrypting step, when the central server receives one newly from same link terminal Pointer cipher-text information when, delete the original pointer cipher-text information of the link terminal.
Further: in the pointer encrypting step, when the link terminal generates a new pointer key, deleting should The original pointer key of link terminal.
Further: second refresh time when 5-20 times of duration of a length of first refresh time.
Further: the address encryption step is also configured with benchmark migration number, corresponding one first encrypted cipher text setting There is actual migration number, increases a unit whenever executing actual migration number described in the primary address encryption step, work as institute When stating actual migration number more than benchmark migration number, the address cipher-text information is sent to corresponding initial Terminal.
Further: the benchmark migration number is set as 10 times.
Further: the first temporary step further includes, when first encrypted cipher text is stored into the storage section Before, first encrypted cipher text is encrypted to obtain the first temporary encrypted cipher text by the first temporary Encryption Algorithm;When described first Before temporary encrypted cipher text is removed from the storage section, it is close that the described first temporary encryption is decrypted by the first temporary decipherment algorithm Text is to obtain the first encrypted cipher text.
Further: the data lattice of the first corresponding encrypted cipher text of the data format of the first temporary encrypted cipher text Formula is identical.
Further: the second temporary step further includes, when a link terminal receives first encrypted cipher text, leading to It crosses the second temporary Encryption Algorithm and encrypts first encrypted cipher text to obtain the second temporary encrypted cipher text;When a link terminal is sent When the second temporary encrypted cipher text, the second temporary encrypted cipher text is decrypted to obtain first by the second temporary decipherment algorithm Encrypted cipher text.
Further: the temporary encrypted cipher text of described second is identical as the data format of first encrypted cipher text.
The technology of the present invention effect major embodiment is in the following areas: being arranged in this way, data sharing is established in local area network The concept of storage by the storage mode of time-varying and bounce, and ensure that the safety of data.
Detailed description of the invention
Fig. 1: the step logic chart of the data leakage prevention method of the invention that technology is kept in based on data;
Fig. 2: the system architecture schematic diagram of the data leakage prevention method of the invention that technology is kept in based on data;
Fig. 3: step logic chart is kept in the refreshing of the data leakage prevention method of the invention that technology is kept in based on data;
Appended drawing reference: 1, initial terminal;2, link terminal;3, central server;10, memory module;110, section is stored;a1, Data processing step;A2, data configuration step;A3, refresh temporary step;A31, the first temporary step;A32, pointer encryption step Suddenly;A33, the second temporary step;A34, address encryption step.
Specific embodiment
Below in conjunction with attached drawing, a specific embodiment of the invention is described in further detail, so that technical solution of the present invention is more It should be readily appreciated that and grasp.
Shown in referring to Fig.1, a kind of data leakage prevention method for being kept in technology based on data is provided with and is connected by several terminals The local area network of composition, the local area network are configured with a central server 3, and the central server 3 connects the local area network Each terminal in network, for storing data configured with memory module 10, the memory module 10 is by several for each terminal Section 110 is stored to form, the present invention first is for the data storage in local area network, and data storage includes two positions, and one The position for the terminal that data are located at, the other is data be located at which storage section 110 position, and it should be noted that Firstly the need of marking off an independent memory module 10 from terminal, and memory module 10 is divided into several storage sections 110, storage 110 size of section is identical, and similarly needs to guarantee the size of each be-encrypted data and be less than the appearance of memory space Amount.Specifically includes the following steps:
Data processing step a1, using the terminal where pending data as initial terminal 1, at the first Encryption Algorithm encryption band Data are managed to generate the first encrypted cipher text and the corresponding first key of the first encrypted cipher text, into data configuration step a2; It is that data are handled first, so that it may encrypted data are obtained, and the first encrypted cipher text can only pass through initial terminal 1 Could decrypt, that is to say, that no matter the first encrypted cipher text be sent to where, the right to use still falls within initial terminal 1, In this way it is prevented that leaking data.
Data configuration step a2 configures the first refresh time and the second refresh time for first encrypted cipher text, into Enter and refreshes temporary step a3;It then corresponds to each first encrypted cipher text and configures the first refresh time and the second refresh time, institute State the second refresh time when 5-20 times of duration of a length of first refresh time.
Refresh temporary step a3, using the terminal where first encrypted cipher text as link terminal 2, including the first temporary step Rapid a31, pointer encrypting step a32, the second temporary step a33 and address encryption step a34;It is walked as core of the invention Suddenly, it is described in detail, for a corresponding encrypted cipher text, the terminal where defining it is link terminal 2, such as link terminal at this time 2B receives the encrypted cipher text.It should be noted that being continuous for refreshing corresponding first encrypted cipher text of temporary step a3 Repeat to execute, is triggered according to the time actual time, rather than triggered according to sequence of steps.
First temporary step a31 was configured with for the first cumulative time, when the first cumulative time reaching the first refresh time, In the storage section 110 that the memory module 10 of link terminal 2 has generated at random to store first encrypted cipher text, and The storage pointer information in the storage section 110 is obtained, the storage pointer information is directed toward the memory space, resetting described first Cumulative time, into pointer encrypting step a32;Cumulative time obtains according to the real time, and can be received with link terminal 2 One encrypted cipher text is initial time, and such as the first refresh time is set as 60 seconds, that is to say, that was then added every 60 seconds for first Ciphertext changes a memory space, in another embodiment, when first encrypted cipher text is stored into the storage section 110 Before, first encrypted cipher text is encrypted to obtain the first temporary encrypted cipher text by the first temporary Encryption Algorithm;When described first Before temporary encrypted cipher text is removed from the storage section 110, add by the way that the first temporary decipherment algorithm decryption described first is temporary Ciphertext is to obtain the first encrypted cipher text.Namely deposit and taking-up carry out primary encryption and decryption step respectively every time, improve Information Security, and the information that pointer information is unique available position to storage section 110 is stored, as long as so initial Terminal 1 get the address of link terminal 2 and get storage pointer information position be obtained with the first encrypted cipher text, To carry out using.The data format phase of the first corresponding encrypted cipher text of the data format of the first temporary encrypted cipher text Together.
Pointer encrypting step a32 encrypts the storage pointer information by the second Encryption Algorithm to generate pointer ciphertext letter Breath and corresponding pointer key, save the pointer key, the pointer cipher-text information are sent to central server 3;And Pointer encrypting step a32 is to be encrypted by the second Encryption Algorithm to storage pointer information, so, this location information It needs just to can be carried out acquisition by pointer key.And so if initial terminal 1 needs to obtain storage pointer information, it is necessary to To pointer cipher-text information and corresponding pointer key, and pointer cipher-text information is managed collectively in central server 3, each Link terminal 2 does not retain pointer cipher-text information, and pointer key is then saved in corresponding link terminal 2, so, always just End 1 needs to transmit a request to central server 3, and central server 3 finds corresponding link terminal 2, acquisition pair after receiving request The pointer key answered, obtains storage pointer information, and such initial terminal 1 could complete the acquisition of the first encrypted cipher text, more pacify It is complete reliable.In the pointer encrypting step a32, when the central server 3 receives a new pointer from same link terminal 2 When cipher-text information, the original pointer cipher-text information of link terminal 2 is deleted.In the pointer encrypting step a32, when the relaying When terminal 2 generates a new pointer key, the original pointer key of link terminal 2 is deleted.
Second temporary step a33 configures the second cumulative time, when the second cumulative time reaching the second refresh time, root A destination address is generated at random according to the routing table at the place of link terminal 2, and first encrypted cipher text is sent to the destination Terminal where location, and second cumulative time is reset, into address encryption step a34;And the step is to count According to sending, so the second cumulative time is accumulative according to the real time, such as is set as 5 minutes by configuring for the second cumulative time, When the time reaching 5 minutes, so that it may it is sent to next terminal, and destination address is random according to 2 routing table of link terminal It generates, has not regulation, can not track.The second temporary step a33 further includes, when a link terminal 2 receives described When one encrypted cipher text, first encrypted cipher text is encrypted to obtain the second temporary encrypted cipher text by the second temporary Encryption Algorithm; When a link terminal 2 sends the second temporary encrypted cipher text, it is temporary that described second is decrypted by the second temporary decipherment algorithm Encrypted cipher text is to obtain the first encrypted cipher text.The data format of the temporary encrypted cipher text of described second and first encrypted cipher text It is identical.So, reliability and safety are improved.
Address encryption step a34, the destination address is encrypted by third Encryption Algorithm with generate address cipher-text information with And corresponding address key, the address cipher-text information is sent to corresponding link terminal 2, address key is sent to correspondence Initial terminal 1.The setting of address encryption step a34, in order to encryption address, and address key is sent to just always End 1, address cipher-text information is sent to corresponding link terminal 2, that is to say, that a corresponding data X, by A-B-C-D-E Terminal, initial terminal 1A only has the address cipher-text information of B, but initial terminal 1 has all address keys, so can To obtain the address of B, and B has the address cipher-text information of C, and is fed back to obtain the address of C according to B, thus successively until obtaining The position of first encryption data sends to central server 3 and requests and obtain corresponding pointer storage information, to obtain correspondence The first encryption data.In another embodiment, the address encryption step a34 is also configured with benchmark migration number, corresponding One first encrypted cipher text is provided with actual migration number, whenever executing actual migration described in the primary address encryption step a34 Number increases a unit, when the actual migration number is more than benchmark migration number, by the address cipher-text information It is sent to corresponding initial terminal 1.And it should be noted that is for a long time if constantly repeating data transmission The data transmission range of formation increases, and data efficiency is called to reduce, so one numerical value of configuration, such as benchmark migration Number is set as 10 times.And after being sent when 10 times, initial terminal 1 can be obtained by current position, that is to say, that pervious It is invalid for address key and address cipher-text information, reduces data volume.
Certainly, above is representative instance of the invention, and in addition to this, the present invention can also have other a variety of specific implementations Mode, all technical solutions formed using equivalent substitution or equivalent transformation, is all fallen within the scope of protection of present invention.

Claims (10)

1. a kind of data leakage prevention method for keeping in technology based on data, it is characterised in that: be provided with by several terminal connection groups At local area network, the local area network is configured with a central server, and the central server connects in the local area network Each terminal, each terminal configured with memory module for storing data, the memory module is by several storage sections Composition, specifically includes the following steps:
Data processing step encrypts tape handling by the first Encryption Algorithm using the terminal where pending data as initial terminal Data are to generate the first encrypted cipher text and the corresponding first key of the first encrypted cipher text, into data configuration step;
Data configuration step configures the first refresh time and the second refresh time for first encrypted cipher text, into refreshing Temporary step;
Refresh temporary step, using the terminal where first encrypted cipher text as link terminal, including the first temporary step, pointer Encrypting step, the second temporary step and address encryption step;
First temporary step was configured with for the first cumulative time, whole in relaying when the first cumulative time reaching the first refresh time The storage section that the memory module at end has generated at random obtains the storage section to store first encrypted cipher text Storage pointer information, the storage pointer information is directed toward the memory space, first cumulative time reset, into pointer Encrypting step;
Pointer encrypting step encrypts the storage pointer information by the second Encryption Algorithm to generate pointer cipher-text information and right The pointer key answered saves the pointer key, and the pointer cipher-text information is sent to central server;
Second temporary step configured for the second cumulative time, when the second cumulative time reaching the second refresh time, eventually according to relaying The routing table at the place at end generates a destination address at random, the end first encrypted cipher text being sent to where the destination address End, and second cumulative time is reset, into address encryption step;
Address encryption step encrypts the destination address by third Encryption Algorithm to generate address cipher-text information and corresponding The address cipher-text information is sent to corresponding link terminal by address key, by address key be sent to it is corresponding just always End.
2. a kind of data leakage prevention method for keeping in technology based on data as described in claim 1, it is characterised in that: the finger In needle encrypting step, when the central server receives a new pointer cipher-text information from same link terminal, deleting should The original pointer cipher-text information of link terminal.
3. a kind of data leakage prevention method for keeping in technology based on data as claimed in claim 2, it is characterised in that: the finger In needle encrypting step, when the link terminal generates a new pointer key, the original pointer key of the link terminal is deleted.
4. a kind of data leakage prevention method for keeping in technology based on data as described in claim 1, it is characterised in that: described the Two refresh times when 5-20 times of duration of a length of first refresh time.
5. a kind of data leakage prevention method for keeping in technology based on data as described in claim 1, it is characterised in that: describedly Location encrypting step is also configured with benchmark migration number, and corresponding one first encrypted cipher text is provided with actual migration number, whenever execution Actual migration number described in the primary address encryption step increases a unit, when the actual migration number is more than the base When quasi- migration number, the address cipher-text information is sent to corresponding initial terminal.
6. a kind of data leakage prevention method for keeping in technology based on data as claimed in claim 5, it is characterised in that: the base Quasi- migration number is set as 10 times.
7. a kind of data leakage prevention method for keeping in technology based on data as described in claim 1, it is characterised in that: described the One temporary step further includes before first encrypted cipher text is stored into the storage section, passing through the first temporary Encryption Algorithm First encrypted cipher text is encrypted to obtain the first temporary encrypted cipher text;When the described first temporary encrypted cipher text is from the memory block Between be removed before, the first temporary encrypted cipher text is decrypted to obtain the first encrypted cipher text by the first temporary decipherment algorithm.
8. a kind of data leakage prevention method for keeping in technology based on data as claimed in claim 7, it is characterised in that: described the The data format of the first corresponding encrypted cipher text of the data format of one temporary encrypted cipher text is identical.
9. a kind of data leakage prevention method for keeping in technology based on data as described in claim 1, it is characterised in that: described the Two temporary steps further include, and when a link terminal receives first encrypted cipher text, are encrypted by the second temporary Encryption Algorithm First encrypted cipher text is to obtain the second temporary encrypted cipher text;When a link terminal sends the second temporary encrypted cipher text When, the second temporary encrypted cipher text is decrypted to obtain the first encrypted cipher text by the second temporary decipherment algorithm.
10. a kind of data leakage prevention method for keeping in technology based on data as claimed in claim 9, it is characterised in that: described The second temporary encrypted cipher text it is identical as the data format of first encrypted cipher text.
CN201910253632.1A 2018-10-12 2019-03-30 Data anti-leakage method based on data temporary storage technology Active CN110012004B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811191841X 2018-10-12
CN201811191841 2018-10-12

Publications (2)

Publication Number Publication Date
CN110012004A true CN110012004A (en) 2019-07-12
CN110012004B CN110012004B (en) 2020-08-18

Family

ID=67169105

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910253632.1A Active CN110012004B (en) 2018-10-12 2019-03-30 Data anti-leakage method based on data temporary storage technology

Country Status (1)

Country Link
CN (1) CN110012004B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152362A (en) * 2013-03-28 2013-06-12 胡祥义 Cloud-computing-based encrypted transmission method for large data files
CN103544217A (en) * 2013-09-26 2014-01-29 福建省闽保信息技术股份有限公司 Data storage system
CN104143355A (en) * 2013-05-09 2014-11-12 华为技术有限公司 Dynamic random access memory refreshing method and apparatus thereof
CN105262843A (en) * 2015-11-12 2016-01-20 武汉理工大学 Data anti-leakage protection method for cloud storage environment
CN106209373A (en) * 2015-04-30 2016-12-07 富泰华工业(深圳)有限公司 Key generation system, data stamped signature and encryption system and method
CN106409336A (en) * 2016-09-13 2017-02-15 天津大学 Random time based nonvolatile memory data secure erasure method
CN106682903A (en) * 2017-01-18 2017-05-17 齐宇庆 Feedback verification method of bank payment permission authentication information
US20170228202A1 (en) * 2000-11-01 2017-08-10 Flexiworld Technologies, Inc. Sound output system or internet appliance that supports voice activated commands, and that plays audio data received from a service over a network
CN108446172A (en) * 2018-02-26 2018-08-24 平安普惠企业管理有限公司 Data transfer method, apparatus, computer equipment and storage medium
CN108596618A (en) * 2018-04-26 2018-09-28 众安信息技术服务有限公司 Data processing method, device and the computer readable storage medium of block catenary system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170228202A1 (en) * 2000-11-01 2017-08-10 Flexiworld Technologies, Inc. Sound output system or internet appliance that supports voice activated commands, and that plays audio data received from a service over a network
CN103152362A (en) * 2013-03-28 2013-06-12 胡祥义 Cloud-computing-based encrypted transmission method for large data files
CN104143355A (en) * 2013-05-09 2014-11-12 华为技术有限公司 Dynamic random access memory refreshing method and apparatus thereof
CN103544217A (en) * 2013-09-26 2014-01-29 福建省闽保信息技术股份有限公司 Data storage system
CN106209373A (en) * 2015-04-30 2016-12-07 富泰华工业(深圳)有限公司 Key generation system, data stamped signature and encryption system and method
CN105262843A (en) * 2015-11-12 2016-01-20 武汉理工大学 Data anti-leakage protection method for cloud storage environment
CN106409336A (en) * 2016-09-13 2017-02-15 天津大学 Random time based nonvolatile memory data secure erasure method
CN106682903A (en) * 2017-01-18 2017-05-17 齐宇庆 Feedback verification method of bank payment permission authentication information
CN108446172A (en) * 2018-02-26 2018-08-24 平安普惠企业管理有限公司 Data transfer method, apparatus, computer equipment and storage medium
CN108596618A (en) * 2018-04-26 2018-09-28 众安信息技术服务有限公司 Data processing method, device and the computer readable storage medium of block catenary system

Also Published As

Publication number Publication date
CN110012004B (en) 2020-08-18

Similar Documents

Publication Publication Date Title
CN109040090B (en) A kind of data ciphering method and device
CN108235772B (en) Data processing method and device based on block chain, storage medium and electronic equipment
CN110224814B (en) Block chain data sharing method and device
CN105610793B (en) A kind of outsourcing data encryption storage and cryptogram search system and its application process
CN107347058A (en) Data ciphering method, data decryption method, apparatus and system
CN103533539B (en) Virtual SIM card parameter management method and device
CN110073634A (en) Data conversion system and method
CN106534085A (en) Privacy protection method based on block chain technology
CN108737374A (en) The method for secret protection that data store in a kind of block chain
CN102567688B (en) File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN102138300A (en) Message authentication code pre-computation with applications to secure memory
CN104660551B (en) A kind of database access device and method based on webservice
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN108063756A (en) A kind of key management method, device and equipment
CN107948152A (en) Information storage means, acquisition methods, device and equipment
CN107995299A (en) The blind storage method of anti-access module leakage under a kind of cloud environment
JP2014175970A (en) Information distribution system, information processing device, and program
CN107426162A (en) A kind of method based on attribute base encryption Implement Core mutual role help
CN106161444A (en) Secure storage method of data and subscriber equipment
CN104836790A (en) Linked storage fine-grained access control model based on attribute encryption and timestamp
WO2017033843A1 (en) Searchable cryptograph processing system
CN109802832A (en) A kind of processing method of data file, system, big data processing server and computer storage medium
CN108965279A (en) Data processing method, device, terminal device and computer readable storage medium
CN111444268A (en) Data encryption method based on block chain
CN102892113B (en) Method for safety transmission of data between nodes in hierarchical wireless sensor network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200723

Address after: Room 651, 128 Lushan Road, Jianye District, Nanjing City, Jiangsu Province

Applicant after: Nanjing huidawei Information Technology Co., Ltd

Address before: The large village of Qinglong Town Yuxi City, Yunnan province 652803 Huaning County will White Village No. 73

Applicant before: Wang Long

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant