CN110287715B - Cache data safety management system - Google Patents

Cache data safety management system Download PDF

Info

Publication number
CN110287715B
CN110287715B CN201910553060.9A CN201910553060A CN110287715B CN 110287715 B CN110287715 B CN 110287715B CN 201910553060 A CN201910553060 A CN 201910553060A CN 110287715 B CN110287715 B CN 110287715B
Authority
CN
China
Prior art keywords
data
sequence
user
information
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910553060.9A
Other languages
Chinese (zh)
Other versions
CN110287715A (en
Inventor
尤洪松
何碧波
底明辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengbao Co Ltd
Original Assignee
Hengbao Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hengbao Co Ltd filed Critical Hengbao Co Ltd
Priority to CN201910553060.9A priority Critical patent/CN110287715B/en
Publication of CN110287715A publication Critical patent/CN110287715A/en
Application granted granted Critical
Publication of CN110287715B publication Critical patent/CN110287715B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a cache data security management system, which is applied to an esim card and specifically comprises the following steps: the system comprises a receiving unit (1), a data acquiring unit (2), a sequence generating unit (3), an inserting unit (4) and a caching unit (5), wherein the system acquires data acquired by a previous user according to a data identifier acquired before, acquires data required by the user according to a current request data identifier, generates an additional sequence according to a preset rule according to the data acquired by the previous user, and then inserts the additional sequence into the data required by the user to acquire a processed data sequence required by the current request user. The invention also relates to a cache data security management method, which utilizes the cache data security management system and is applied to the esim card. By using the system and the method, the data safety can be improved, meanwhile, the recovery data has certain basis, and the data reading and recovery speed is ensured.

Description

Cache data safety management system
Technical Field
The invention relates to the technical field of data security management, in particular to a cache data security management system.
Background
Portable data carriers are frequently used for security-critical applications, for example in financial transactions, authorization in mobile communications, signature cards, such as for electronic signatures, etc. Since unauthorized use can cause considerable damage, the secret data stored on such data carriers must be reliably protected against snooping and manipulation.
There are three general cases of caching: one is pre-read. When the hard disk is controlled by a CPU instruction to start to read data, a control chip on the hard disk can control the magnetic head to read the data in the next cluster or clusters of the cluster being read into the cache, when the data in the next cluster or clusters needs to be read, the hard disk does not need to read the data again, and the data in the cache is directly transmitted to the memory, so that the purpose of obviously improving the performance can be achieved because the cache speed is far higher than the read-write speed of the magnetic head; the second is to cache the write action. When the hard disk receives the instruction of writing data, the data is not written into the disk immediately, but is temporarily stored in the buffer memory firstly, and then a signal of 'data written' is sent to the system, at this time, the system considers that the data is written and continues to execute the following work, and the hard disk writes the data in the buffer memory into the disk when the hard disk is idle. Although there is some improvement in the performance of writing data, it also inevitably brings about a safety hazard that if data is suddenly powered down while still in the cache, the data will be lost. Hard disk manufacturers naturally have solutions to this problem: when the power is off, the magnetic head writes the data in the cache into a temporary storage area except for a zero magnetic track by means of inertia, and writes the data into a destination when the magnetic head is started next time; the third function is to temporarily store the recently accessed data. Sometimes, some data are accessed frequently, a cache inside the hard disk stores some data which are read frequently in the cache, and when the data are read again, the data can be directly transmitted from the cache.
In high-performance data carriers with cache memories, there is an additional possibility of side-channel attacks. Whether a cache hit or a cache miss occurs may generally be determined based on a time response and/or a current consumption pattern of the program execution. From this information, conclusions can be drawn in turn about the data to be kept secret, provided that they relate to the sequence of operations performed — and in particular to the data values accessed in this sequence of operations.
In the prior art, when a random sequence is generated, if the random generation of the sequence has no rule, the time for recovering complete data is prolonged, and the access efficiency is influenced.
Disclosure of Invention
This section provides a general summary of the disclosure, and is not a comprehensive disclosure of its full scope or all of its features.
The disclosed objective is to provide a cache data security management system, which is applied to an esim card and specifically includes: the device comprises a receiving unit (1), a data acquisition unit (2), a sequence generation unit (3), an insertion unit (4) and a buffer unit (5);
the receiving unit (1) receives user request information, wherein the user request information comprises a current request data identifier and a previous user request data identifier;
the data acquisition unit (2) acquires data acquired by a user before according to the data identification acquired before, and simultaneously acquires data required by the user according to the current request data identification;
the sequence generating unit (3) generates an additional sequence according to a preset rule according to data acquired by a user;
the inserting unit (4) inserts the additional sequence into the data required by the user to obtain the processed data sequence required by the user and requested currently;
the caching unit (5) caches the processed data sequence required by the current requested user.
The invention also provides a cache data security management method, which is applied to the esim card and specifically comprises the following steps:
(1) sending data request information to an esim card;
(2) extracting a data identifier input by a user and a data identifier acquired last time from the request from the time from the request information, and sending the data identifier input by the user and the data identifier acquired last time to a data acquisition unit;
(3) after receiving the data identification sent by the receiving unit, acquiring a corresponding data file according to the data identification input by a user, and sending the data file to the inserting unit; meanwhile, according to the data identification obtained last time, obtaining the corresponding data file last time, and sending the data file last time and the data identification obtained last time to the sequence generation unit;
(4) after receiving a latest data file sent by a data acquisition unit and a latest acquired data identifier, extracting creation time, header information and a partial data sequence in the data file, wherein the partial data sequence is a sequence with a certain length intercepted from a random position in an original data sequence;
then, the creation time, the header information and a part of data sequence are spliced to form an additional sequence;
(5) after receiving the data sequence requested by the user and the encapsulation information sent by the sequence generation unit, the data acquisition unit acquires the additional sequence and the length information, inserts the additional sequence into the random position in the data sequence requested by the user, generates the processed data requested by the user, sends the data and the length information to the user mobile terminal, and simultaneously sends the data and the length information to the cache unit.
Has the advantages that: by using the system and the method, the data safety can be improved, meanwhile, the recovery data has certain basis, and the data reading and recovery speed is ensured.
Further areas of applicability will become apparent from the description provided herein. The description and specific examples in this summary are intended for purposes of illustration only and are not intended to limit the scope of the present disclosure.
Drawings
The drawings described herein are for illustrative purposes only of selected embodiments and not all possible implementations, and are not intended to limit the scope of the present disclosure. In the drawings:
FIG. 1 is a schematic diagram of a cache data security management system;
fig. 2 is a flow chart of a cache data security management method.
While the disclosure is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the disclosure to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosure. It is noted that throughout the several views, corresponding reference numerals indicate corresponding parts.
Detailed Description
Examples of the present disclosure will now be described more fully with reference to the accompanying drawings. The following description is merely exemplary in nature and is not intended to limit the present disclosure, application, or uses.
Example embodiments are provided so that this disclosure will be thorough, and will fully convey the scope to those skilled in the art. Numerous specific details are set forth such as examples of specific components, devices, and methods to provide a thorough understanding of embodiments of the present disclosure. It will be apparent to those skilled in the art that specific details need not be employed, that example embodiments may be embodied in many different forms and that neither should be construed to limit the scope of the disclosure. In certain example embodiments, well-known processes, well-known structures, and well-known technologies are not described in detail.
The technical problems posed by the present disclosure will be explained in detail below. It is to be noted that this technical problem is merely exemplary and is not intended to limit the application of the present invention.
As shown in fig. 1, the present invention provides a cache data security management system, which is applied to an esim card, and specifically includes: a receiving unit 1, a data acquisition unit 2, a sequence generation unit 3, an insertion unit 4, and a buffer unit 5.
The receiving unit 1 receives user request information, which includes a current request data identifier and a previous user request data identifier.
The request information comprises a request data identification input by the user and a data identification which is automatically acquired by the mobile terminal of the user and requested by the user before. The request data identification input by the user is information such as file name and type, and the data identification requested by the user is the data identification which is obtained by the mobile terminal from the esim card last time through file obtaining time of the mobile terminal of the user.
The data obtaining unit 2 obtains the data obtained by the previous user according to the data identifier obtained before, and obtains the data required by the user according to the data identifier requested currently.
The data acquired by the previous user and the data required by the user can be interactive information, video information, audio information and the like, and the information specifically comprises time and date, equipment identification, image and sound sequence and the like.
The sequence generating unit 3 generates an additional sequence according to a preset rule based on data acquired by a previous user.
The sequence generating unit 3 extracts one or more of interaction information, video information and audio information in data acquired by a user according to a preset rule, then combines the extracted information to obtain an additional sequence, generates specific rule information at the same time, and encapsulates the additional sequence and the rule information.
The inserting unit 4 inserts the additional sequence into the user required data to obtain the processed currently requested user required data sequence.
And inserting the additional sequence into the random position of the data sequence required by the current requested user to form the processed data sequence required by the current requested user.
And storing the data acquired by the previous user in a legal user mobile terminal associated with the esim card, quickly positioning the position of the additional sequence and acquiring the content of all the additional sequences according to the rule information, and removing the additional sequences to obtain the correct data required by the user.
And the data acquired by the previous user is not stored in the illegal user mobile terminal which is not associated with the esim card, the position of the additional sequence cannot be positioned according to the rule information, the correct additional sequence cannot be acquired, and the acquired data is incomplete or incorrect.
The buffer unit 5 buffers the processed data sequence required by the user and requested currently, and deletes the additional sequence after the mobile terminal of the user successfully acquires the data sequence. The buffer unit 5 also stores all data interacting with the user's mobile terminal.
The method specifically comprises the following steps: the buffer unit 5 buffers the processed data sequence required by the user and requested currently, receives a feedback notification sent by the mobile terminal after the user mobile terminal obtains the required data, and deletes the additional sequence according to the feedback notification.
The manner in which the units of the above system work cooperatively to accomplish the security management of the cached data will be described in detail below.
The user sends data request information to a receiving unit 1 in the esim card through the mobile terminal, and the receiving unit 1 extracts data identification input by the user and data identification acquired from the current request at the latest time in time from the request information. The receiving unit 1 sends the data identification input by the user and the data identification acquired last time to the data acquiring unit 2.
For example: the user inputs the name and source information of the file a, the user mobile terminal judges the last request according to the time and date of the request, acquires the data from the esim card as the file b 10 hours ago, and sends the name and creation time information of the file b, the name and the source information of the file a to the receiving unit 1. The files a and b are both stored in the cache unit 5 and are both data files sent by the esim card to the same user mobile terminal.
After receiving the data identifier sent by the receiving unit 1, the data obtaining unit 2 obtains the corresponding data file from the cache unit 5 according to the data identifier input by the user, and sends the data file to the inserting unit 4. Meanwhile, the data obtaining unit 2 obtains the corresponding data file from the cache unit 5 according to the data identifier obtained last time, and sends the data file and the data identifier to the sequence generating unit 3.
For example: the data acquisition unit 2 acquires all data files including the name of the file a, which are sent by a sender identified by the source information, according to the name of the file a and the source information; and acquiring the data of the file b according to the name and the creation time information of the file b, wherein the file b is the file data which is stored in the cache unit 5 and is sent to the mobile terminal of the user before 10 hours.
After receiving the data which is obtained last and sent by the data obtaining unit 2 and the corresponding data identification, the sequence generating unit 3 extracts the creation time, the header information and a partial data sequence in the data, wherein the partial data sequence is a sequence which is obtained by intercepting a certain length from a random position in the original data sequence. The sequence generating unit 3 concatenates the creation time, the header information, and the partial data sequence to form an additional sequence. Subsequently, the sequence generating unit 3 encapsulates the length of the additional sequence with the additional sequence, and transmits the encapsulated information to the inserting unit 4.
For example: the current request time is 201901011923, and when the sequence generating unit 3 receives the file b, the extracted creation time is 201901010923, and then the header information of the file b is extracted. The sequence generating unit 3 intercepts a data sequence with the length of 200 from the random position p of the file b, and then generates an additional sequence in the form of header information + creation time + data sequence with the length of 200 after splicing the creation information, the header information and the intercepted data sequence. It is assumed that the length of the header information is 20, and thus the length of the resulting additional sequence is 232.
The inserting unit 4 receives the data sequence requested by the user and the encapsulation information sent by the sequence generating unit 3, which are sent by the data acquiring unit 2, acquires the additional sequence and the length information, inserts the additional sequence into a random position in the data sequence requested by the user, generates the processed data requested by the user, sends the data and the length information to the user mobile terminal, and simultaneously sends the data and the length information to the buffer unit 5.
For example: the insertion unit 4 inserts the data sequence of header information + creation time + length 200 into a random position of the data sequence of the file a, which may be a front, middle or rear part of the sequence. Since the associated legal user mobile terminal can acquire the header information and the creation time of the correct file b, the user mobile terminal can quickly locate the additional sequence in the received file a sent by the inserting unit 4 according to the header information of the file b, and acquire the content of all the additional sequences according to the length information of the received additional sequences sent by the inserting unit 4, so that the correct data content of the file a can be obtained after the additional sequences are removed.
The invention also provides a cache data security management method, which is applied to the esim card and specifically comprises the following steps:
(1) and sending data request information to the esim card.
(2) And extracting the data identification input by the user and the data identification acquired last time from the request from the time from the request information, and sending the data identification input by the user and the data identification acquired last time to the data acquisition unit.
The specific mode is as follows: the user inputs the name and source information of the file a, the mobile terminal of the user judges through the time and date of the request, requests and obtains the file b with the data being 10 hours before from the esim card last time, and sends the name and the creation time information of the file b to the receiving unit together with the name and the source information of the file a. The file a and the file b are both stored in the cache unit and are both data files transmitted by the esim card to the same user mobile terminal.
(3) And after receiving the data identification sent by the receiving unit, acquiring a corresponding data file according to the data identification input by the user, and sending the data file to the inserting unit. Meanwhile, according to the data identification obtained last time, the corresponding data file obtained last time is obtained and sent to the sequence generation unit together with the data identification obtained last time.
The specific mode is as follows: acquiring all data files including the file a name sent by a sender of a source information identifier according to the file a name and the source information; and acquiring the data of the file b according to the name and the creation time information of the file b, wherein the file b is the file data which is stored in the cache unit 5 and is sent to the mobile terminal of the user before 10 hours.
(4) After receiving the latest data file sent by the data acquisition unit and the latest acquired data identifier, extracting the creation time, the header information and a partial data sequence in the data file, wherein the partial data sequence is a sequence with a certain length intercepted from a random position in the original data sequence. And then, splicing the creation time, the header information and the partial data sequence to form an additional sequence. Further, the length of the additional sequence is encapsulated with the additional sequence, and the encapsulated information is transmitted to an insertion unit.
The specific mode is as follows: the current request time is 201901011923, and after receiving the file b, the extracted creation time is 201901010923, and then the header information of the file b is extracted. And intercepting a data sequence with the length of 200 from the random position p of the file b, and splicing the creation information, the header information and the intercepted data sequence to generate an additional sequence in the form of header information + creation time + data sequence with the length of 200. It is assumed that the length of the header information is 20, and thus the length of the resulting additional sequence is 232.
(5) After receiving the data sequence requested by the user and the encapsulation information sent by the sequence generation unit, the data acquisition unit acquires the additional sequence and the length information, inserts the additional sequence into the random position in the data sequence requested by the user, generates the processed data requested by the user, sends the data and the length information to the user mobile terminal, and simultaneously sends the data and the length information to the cache unit.
The specific mode is as follows: the data sequence of header information + creation time + length 200 is inserted into the random position of the data sequence of the file a, and the position can be the front section, the middle section or the rear section of the sequence. Because the associated legal user mobile terminal can obtain the correct header information and the creation time of the file b, the additional sequence can be quickly positioned in the received file a sent by the inserting unit according to the header information of the file b, and the content of all the additional sequences can be obtained according to the length information of the received additional sequence sent by the inserting unit, so that the data content of the correct file a can be obtained after the additional sequences are removed.
The preferred embodiments of the present disclosure are described above with reference to the drawings, but the present disclosure is of course not limited to the above examples. Various changes and modifications within the scope of the appended claims may be made by those skilled in the art, and it should be understood that these changes and modifications naturally will fall within the technical scope of the present disclosure.
For example, a plurality of functions included in one unit may be implemented by separate devices in the above embodiments. Alternatively, a plurality of functions implemented by a plurality of units in the above embodiments may be implemented by separate devices, respectively. In addition, one of the above functions may be implemented by a plurality of units. Needless to say, such a configuration is included in the technical scope of the present disclosure.
In this specification, the steps described in the flowcharts include not only the processing performed in time series in the described order but also the processing performed in parallel or individually without necessarily being performed in time series. Further, even in the steps processed in time series, needless to say, the order can be changed as appropriate.
Although the embodiments of the present disclosure have been described in detail with reference to the accompanying drawings, it should be understood that the above-described embodiments are merely illustrative of the present disclosure and do not constitute a limitation of the present disclosure. It will be apparent to those skilled in the art that various modifications and variations can be made in the above-described embodiments without departing from the spirit and scope of the disclosure. Accordingly, the scope of the disclosure is to be defined only by the claims appended hereto, and by their equivalents.

Claims (10)

1. A cache data security management system is applied to an esim card and specifically comprises the following steps: the device comprises a receiving unit (1), a data acquisition unit (2), a sequence generation unit (3), an insertion unit (4) and a buffer unit (5);
the receiving unit (1) receives user request information, wherein the user request information comprises a current request data identifier and a previous user request data identifier;
the data acquisition unit (2) acquires data acquired by a user before according to the data identification acquired before, and simultaneously acquires data required by the user according to the current request data identification;
the sequence generating unit (3) generates an additional sequence according to a preset rule according to data acquired by a user;
after receiving the data which is obtained last time and is sent by the data obtaining unit (2) and the corresponding data identification, the sequence generating unit (3) extracts the creation time, the header information and a partial data sequence in the data, wherein the partial data sequence is a sequence which is obtained by intercepting a certain length from a random position in an original data sequence, and then the creation time, the header information and the partial data sequence are spliced to form an additional sequence;
the inserting unit (4) inserts the additional sequence into the data required by the user to obtain the processed data sequence required by the user and requested currently;
the caching unit (5) caches the processed data sequence required by the current requested user.
2. The system for securely managing cached data according to claim 1, wherein the request information comprises a request data identifier input by a user and a data identifier of a previous user request automatically acquired by a user mobile terminal.
3. The system for securely managing cached data according to claim 2, wherein the user-entered request data is identified as a file name or type information;
and the data identification requested by the previous user is the data identification which is obtained by the mobile terminal from the esim card last time through file acquisition time of the mobile terminal of the user.
4. The cache data security management system according to claim 1, wherein the sequence generation unit (3) extracts one or more of interaction information, video information, and audio information in data acquired by a user according to a preset rule, then combines the extracted information to obtain an additional sequence, generates specific rule information, and encapsulates the additional sequence and the rule information.
5. The cache data security management system of claim 4, wherein the extracted information is combined to obtain an additional sequence, specifically: and splicing the created information, the header information and the intercepted data sequence, and generating an additional sequence in the form of a data sequence of header information + creation time + length.
6. The cache data security management system according to claim 1, wherein the inserting unit (4) is further configured to insert an additional sequence into a random position of the currently requested user desired data sequence to form a processed currently requested user desired data sequence.
7. The system for securely managing cached data according to claim 6, wherein the inserting of the additional sequence into the random position of the currently requested user-desired data sequence is specifically: the insertion unit (4) inserts the data sequence of header information + creation time + length into a random position of the file data sequence, wherein the position can be a front section, a middle section or a rear section of the sequence.
8. The safety management system for cache data according to claim 1, wherein the cache unit (5) is further configured to receive a feedback notification sent by the mobile terminal after the user mobile terminal obtains the required data, and delete the additional sequence according to the feedback notification.
9. The cache data security management system of claim 1, wherein the previously user acquired data and the user desired data are interactive information, video information, or audio information.
10. A cache data security management method, which utilizes the cache data security management system of any one of claims 1 to 9 and is applied to an esim card, and specifically comprises:
(1) sending data request information to an esim card;
(2) extracting a data identifier input by a user and a data identifier acquired last time from the request from the time from the request information, and sending the data identifier input by the user and the data identifier acquired last time to a data acquisition unit;
(3) after receiving the data identification sent by the receiving unit, acquiring a corresponding data file according to the data identification input by a user, and sending the data file to the inserting unit; meanwhile, according to the data identification obtained last time, obtaining the corresponding data file last time, and sending the data file last time and the data identification obtained last time to the sequence generation unit;
(4) after receiving a latest data file sent by a data acquisition unit and a latest acquired data identifier, extracting creation time, header information and a partial data sequence in the data file, wherein the partial data sequence is a sequence with a certain length intercepted from a random position in an original data sequence;
then, the creation time, the header information and a part of data sequence are spliced to form an additional sequence;
(5) after receiving the data sequence requested by the user and the encapsulation information sent by the sequence generation unit, the data acquisition unit acquires the additional sequence and the length information, inserts the additional sequence into the random position in the data sequence requested by the user, generates the processed data requested by the user, sends the data and the length information to the user mobile terminal, and simultaneously sends the data and the length information to the cache unit.
CN201910553060.9A 2019-06-25 2019-06-25 Cache data safety management system Active CN110287715B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910553060.9A CN110287715B (en) 2019-06-25 2019-06-25 Cache data safety management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910553060.9A CN110287715B (en) 2019-06-25 2019-06-25 Cache data safety management system

Publications (2)

Publication Number Publication Date
CN110287715A CN110287715A (en) 2019-09-27
CN110287715B true CN110287715B (en) 2022-04-08

Family

ID=68005486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910553060.9A Active CN110287715B (en) 2019-06-25 2019-06-25 Cache data safety management system

Country Status (1)

Country Link
CN (1) CN110287715B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110909385B (en) * 2019-11-19 2022-04-01 恒宝股份有限公司 Safety management method for storage data in esim card

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127783A (en) * 2007-09-28 2008-02-20 北京金山软件有限公司 A website buffering method and device
CN102063384A (en) * 2009-11-13 2011-05-18 恒宝股份有限公司 Method for performing read-write operation on programmable read-only memory with cache by JAVA card
CN107423302A (en) * 2016-05-24 2017-12-01 北京京东尚科信息技术有限公司 Buffering updating method and device
CN109271394A (en) * 2018-08-27 2019-01-25 武汉达梦数据库有限公司 A kind of batch data insertion update implementation method based on ID caching

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150205882A1 (en) * 2007-03-19 2015-07-23 Dean Vukas Testing accessibility and compatibility of websites and web-based software
US20160379400A1 (en) * 2015-06-23 2016-12-29 Intel Corporation Three-Dimensional Renderer

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127783A (en) * 2007-09-28 2008-02-20 北京金山软件有限公司 A website buffering method and device
CN102063384A (en) * 2009-11-13 2011-05-18 恒宝股份有限公司 Method for performing read-write operation on programmable read-only memory with cache by JAVA card
CN107423302A (en) * 2016-05-24 2017-12-01 北京京东尚科信息技术有限公司 Buffering updating method and device
CN109271394A (en) * 2018-08-27 2019-01-25 武汉达梦数据库有限公司 A kind of batch data insertion update implementation method based on ID caching

Also Published As

Publication number Publication date
CN110287715A (en) 2019-09-27

Similar Documents

Publication Publication Date Title
US8370645B2 (en) Protection of security parameters in storage devices
EP2696305B1 (en) Method and device for file protection
US8307408B2 (en) System and method for file processing and file processing program
US7600133B2 (en) Backing up at least one encrypted computer file
US9069978B2 (en) Data storage device and data protection method
CN102750233A (en) Encrypting and storing confidential data
US20030145182A1 (en) Data storage apparatus, data storing method, data verification apparatus, data access permission apparatus, and program and storage medium therefor
US9208333B2 (en) Secure data recorder
CN108229190B (en) Transparent encryption and decryption control method, device, program, storage medium and electronic equipment
CN101578608A (en) Methods and apparatuses for accessing content based on a session ticket
CN110832490A (en) Secure snapshot management for data storage devices
US10331365B2 (en) Accessing a serial number of a removable non-volatile memory device
US7024532B2 (en) File management method, and memory card and terminal apparatus that make use of the method
CN110287715B (en) Cache data safety management system
CN110929302B (en) Data security encryption storage method and storage device
US11995223B2 (en) Data storage device encryption
US20220123932A1 (en) Data storage device encryption
JP2023081374A (en) Method and system for session-based secured access control on data storing system
KR100407692B1 (en) Hard Disk Real Time Security System and Preservation Method of Hard Disk Real Time Security System
JP4057858B2 (en) File management method and memory card and terminal device using the same
CN111984605A (en) Small file management method, electronic equipment and storage device
EP2199927A1 (en) Display device and method aiming to protect access to audiovisual documents recorded in storage means
CN101617318A (en) Be used for method and apparatus that content and licence are linked
CN114239091B (en) Disk encryption method and system based on trusted chip
CN108616537A (en) A kind of conventional data encryption and decryption method and system of lower coupling

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 801, 8 / F, building 4a, international R & D headquarters park, 68 Olympic street, Jianye District, Nanjing City, Jiangsu Province 210019

Applicant after: JIANGSU HENGBAO INTELLIGENT SYSTEM TECHNOLOGY Co.,Ltd.

Address before: 212355 Hengtang Industrial Zone, Yunyang Town, Danyang City, Zhenjiang City, Jiangsu Province

Applicant before: JIANGSU HENGBAO INTELLIGENT SYSTEM TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
TA01 Transfer of patent application right

Effective date of registration: 20220316

Address after: 212355 Hengtang Industrial Zone, Danyang City, Zhenjiang City, Jiangsu Province

Applicant after: HENGBAO Corp.

Address before: 801, 8 / F, building 4a, international R & D headquarters park, 68 Olympic street, Jianye District, Nanjing City, Jiangsu Province 210019

Applicant before: JIANGSU HENGBAO INTELLIGENT SYSTEM TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant