CN110401941B - Cache data security management method in esim card - Google Patents

Cache data security management method in esim card Download PDF

Info

Publication number
CN110401941B
CN110401941B CN201910642195.2A CN201910642195A CN110401941B CN 110401941 B CN110401941 B CN 110401941B CN 201910642195 A CN201910642195 A CN 201910642195A CN 110401941 B CN110401941 B CN 110401941B
Authority
CN
China
Prior art keywords
data
cache
random sequence
sequence
esim card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910642195.2A
Other languages
Chinese (zh)
Other versions
CN110401941A (en
Inventor
崔可
何碧波
底明辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengbao Co Ltd
Original Assignee
Hengbao Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hengbao Co Ltd filed Critical Hengbao Co Ltd
Priority to CN201910642195.2A priority Critical patent/CN110401941B/en
Publication of CN110401941A publication Critical patent/CN110401941A/en
Application granted granted Critical
Publication of CN110401941B publication Critical patent/CN110401941B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier

Abstract

The invention relates to a cache data security management method in an esim card, which is used for the esim card and is used for generating a random sequence, and inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user. The invention also relates to a cache data security management system in the esim card, which is arranged on the esim card and specifically comprises the following steps: the device comprises an acquisition module, a proportionality coefficient module, a sequence generation module, an insertion module and a cache module. By utilizing the system and the method, the data reading and recovering speed can be ensured while the data safety is improved.

Description

Cache data security management method in esim card
Technical Field
The invention relates to the technical field of data security management, in particular to a cache data security management method in an esim card.
Background
The structure for coordinating the difference of the data transmission speeds of two pieces of hardware with larger speed difference can be called as a cache. Because the memory has a higher reading and writing speed relative to the hard disk, the memory can be used as the cache of the hard disk; similarly, the read-write speed of the hard disk is far higher than that of the network data, and the hard disk can also be used as the cache of the network data.
The caching carrier and the cached carrier are always opposite, the caching device cost is higher than that of the cached device, the caching device speed is higher than that of the cached device, and the capacity of the caching device is far smaller than that of the cached device. A cache may be considered a pool of data, a temporary place to store frequently used data, and a subset of the original data, copied from the original data, and tagged for retrieval.
The mobile phone is more and more popular as a tool frequently used in daily life of people, various functions are given to the mobile phone by the development of scientific technology, and the capacity of the mobile phone for storing data is more and more large. Among these data are many information that needs to be kept secret from someone other than the user of the mobile phone. The portability of the mobile phone causes the mobile phone to be frequently lost, and the detachability of the data storage card brings great potential safety hazard to the data of the user. With the popularization of smart phones and the popularization of mobile internet, hackers steal user data by trojan horses, viruses and other methods and also bring great threats to the data security of users.
In the prior art, when a random sequence is generated, if the sequence is too long, the time for reading and recovering complete data is prolonged, the access efficiency is affected, and if the sequence is too short, certain risk is caused.
Disclosure of Invention
This section provides a general summary of the disclosure, and is not a comprehensive disclosure of its full scope or all of its features.
The disclosed objective is to provide a cache data security management method in an esim card, where the method is used for the esim card, and specifically includes:
(1) receiving request information read by user data, extracting data identification included in the request information, and acquiring corresponding data volume according to the data identification;
(2) generating a scaling factor according to the data quantity, wherein the scaling factor is inversely proportional to the data quantity;
(3) generating a random sequence;
(4) inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user;
(5) and sending the new cache sequence to the user terminal, and deleting the random sequence at a specific position in the local cache data.
Further, the user sends request information to the esim card through terminal equipment, wherein the terminal equipment is different from the terminal where the esim card is located.
Further, the data in the random sequence is the same as the data type corresponding to the data identification in the request information.
Further, the length L of the random sequence is the length LM of the data after buffering.
Further, the step (4) is specifically as follows: according to a preset rule, a first bit of the random sequence is inserted into a specific position of a corresponding cache line or cache column, and other bits are sequentially inserted after the first bit according to the sequence to form a new cache sequence comprising one line (column) or a plurality of lines (columns) of the random sequence.
The invention also provides a cache data security management system in the esim card, which is arranged on the esim card and specifically comprises the following steps: the device comprises an acquisition module, a proportionality coefficient module, a sequence generation module, an insertion module and a cache module;
wherein the content of the first and second substances,
the acquisition module is used for receiving request information read by user data, extracting data identification included in the request information and acquiring corresponding data volume according to the data identification;
the scale coefficient module is used for generating a scale coefficient according to the data volume;
the sequence generation module is used for generating a random sequence;
the inserting module is used for inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user;
and the cache module is used for sending the new cache sequence to the user terminal and deleting the random sequence at a specific position in the local cache data.
Has the advantages that: by utilizing the system and the method, the data reading and recovering speed can be ensured while the data safety is improved.
Further areas of applicability will become apparent from the description provided herein. The description and specific examples in this summary are intended for purposes of illustration only and are not intended to limit the scope of the present disclosure.
Drawings
The drawings described herein are for illustrative purposes only of selected embodiments and not all possible implementations, and are not intended to limit the scope of the present disclosure. In the drawings:
FIG. 1 is a flow diagram of a method for cache data security management;
fig. 2 is a schematic diagram of a cache data security management system.
While the disclosure is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the disclosure to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosure. It is noted that throughout the several views, corresponding reference numerals indicate corresponding parts.
Detailed Description
Examples of the present disclosure will now be described more fully with reference to the accompanying drawings. The following description is merely exemplary in nature and is not intended to limit the present disclosure, application, or uses.
Example embodiments are provided so that this disclosure will be thorough, and will fully convey the scope to those skilled in the art. Numerous specific details are set forth such as examples of specific components, devices, and methods to provide a thorough understanding of embodiments of the present disclosure. It will be apparent to those skilled in the art that specific details need not be employed, that example embodiments may be embodied in many different forms and that neither should be construed to limit the scope of the disclosure. In certain example embodiments, well-known processes, well-known structures, and well-known technologies are not described in detail.
The technical problems posed by the present disclosure will be explained in detail below. It is to be noted that this technical problem is merely exemplary and is not intended to limit the application of the present invention.
As shown in FIG. 1, the invention provides a cache data security management method in an esim card. The method is used for the esim card and specifically comprises the following steps:
(1) receiving request information read by user data, extracting a data identifier included in the request information, and acquiring a corresponding data volume according to the data identifier, wherein the data identifier is an identifier of data content to be read, and the data volume is the size of a data file to be read.
The user sends request information to the esim card through terminal equipment, wherein the terminal equipment is different from the terminal where the esim card is located.
(2) And generating a proportionality coefficient according to the data quantity, wherein the proportionality coefficient is inversely proportional to the data quantity.
The scale factor is smaller when the data amount is larger, and is larger when the data amount is smaller, and the scale factor is between 0.001 and 0.01. Specifically, if the data amount is the total buffer capacity, the scaling factor is 0.001, and if the data amount is 1% or less of the total buffer capacity, the scaling factor is 0.01.
(3) And generating a random sequence, wherein the length of the random sequence is the length of the data after being cached and multiplied by the proportionality coefficient.
The data in the random sequence is the same as the data type corresponding to the data identification in the request information. For example, if the data corresponding to the data identification is a binary number, a random sequence of binary numbers is generated; if the data identifies that the corresponding data is a number and other characters, a random sequence of a plurality of characters is generated.
The length L of the random sequence is the length LM of the data after caching;
the length of the random sequence is the total number of bits that the random sequence is generated from, and is determined by the scaling factor. Because the proportionality coefficient is inversely proportional to the data quantity, and the data quantity is proportional to the length after the data caching, the longer the length after the data caching is, the smaller the obtained proportionality coefficient is, and the shorter the length of the generated random sequence is; on the contrary, the shorter the length of the data after caching, the larger the obtained proportionality coefficient is, the longer the length of the generated random sequence is relatively, thus ensuring that the length of the random sequence is not too long or too short. The method avoids the problem that too much buffer space or transmission bandwidth is occupied due to the overlong length of the random sequence, thereby affecting the transmission efficiency, and simultaneously avoids the problem that the data stealers cannot be confused due to the overlong length of the random sequence.
(4) And inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user.
According to a preset rule, a first bit of the random sequence is inserted into a specific position of a corresponding cache line or cache column, and other bits are sequentially inserted after the first bit according to the sequence to form a new cache sequence comprising one-line (column) or multiple-line (column) random sequences. Wherein the specific position is a data bit of a cache line or a cache column calculated according to a rule.
In addition, when random sequences are inserted, cache lines and columns alternate. That is, if a random sequence is inserted into a cache line according to the current request, then a random sequence is inserted into a cache column according to the next request, and so on.
(5) And sending the new cache sequence to the user terminal, and deleting the random sequence at a specific position in the local cache data.
After the new cache sequence containing one row (column) or a plurality of rows (columns) of random sequences is sent to the user terminal, if the user terminal is a security terminal associated with the esim card, the required data can be extracted by using a pre-stored rule, namely the random sequences are removed, and correct cache data are obtained; if the user terminal is an illegal or fake terminal, the required data cannot be extracted, that is, the random sequence cannot be removed because the position of the random sequence cannot be obtained, and only the cache data with the confusion information can be obtained.
After the new cache sequence is sent, the random sequence at the specific position in the local cache data is deleted, so that the original cache data is recovered, and the purpose of reducing the occupied cache space is achieved.
Further description of the process according to the invention is carried out using the application examples below.
In the interaction process of a user and a terminal where the esim card is located through a remote terminal, related interaction information in the esim card, such as terminal information or audio and video data, needs to be acquired. And the user sends request information containing the terminal name or the audio/video file name to the esim card.
And after receiving the request information, the esim card extracts the terminal name or the audio/video file name, and then searches the size of the corresponding data file in the cache according to the terminal name or the audio/video file name. For example, the file size is a, and the total cache capacity is a. Based on the file size a, an approximate scale factor of 0.002 was obtained. The total number of bits of the file data is b.
After the scaling factor is determined again, the random sequence length is calculated to be 0.002 b.
According to the obtained length of 0.002b, the esim card generates a random sequence in the same form as the file data.
Since the last time the data was read, a random sequence is inserted into the cache column. According to a preset rule stored in the esim card, inserting a first bit of the generated random sequence into a corresponding bit of a corresponding cache line, and then inserting other bits of data of the random sequence in sequence. If the length of the random sequence is 0.002b greater than the length of the cache line c, the random sequence occupies a plurality of cache lines after the random sequence is inserted. And finally, forming a new cache sequence containing a plurality of cache lines, wherein the cache sequence is the terminal information or the audio and video information which is requested by the user and subjected to the confusion processing.
The esim card sends the new cached sequence to the user remote terminal. Since the remote terminal is a terminal previously associated with the esim card, the terminal stores the same preset rules as used by the esim card. And then, the terminal removes the random sequence with the length of 0.002b in the corresponding line generated by the esim card from the new cache sequence by using the preset rule to obtain the required correct terminal information or audio and video information.
As shown in fig. 2, the present invention also relates to a cache data security management system in an esim card. The above system is arranged on the esim card, and specifically comprises: the device comprises an acquisition module, a proportionality coefficient module, a sequence generation module, an insertion module and a cache module. Wherein the content of the first and second substances,
and the acquisition module is used for receiving request information read by user data, extracting a data identifier included in the request information, and acquiring a corresponding data volume according to the data identifier.
The data identification is the identification of the data content needing to be read, and the data volume is the size of the data file needing to be read.
The user sends request information to the acquisition module through terminal equipment, wherein the terminal equipment is different from a terminal where the acquisition module is located.
And the proportion coefficient module is used for generating a proportion coefficient according to the data volume.
The scaling factor is inversely proportional to the size of the data volume. That is, the scale factor is smaller as the data amount is larger, and the scale factor is larger as the data amount is smaller, and the scale factor is between 0.001 and 0.01. Specifically, if the data amount is the total buffer capacity, the scaling factor is 0.001, and if the data amount is 1% of the total buffer capacity, the scaling factor is 0.01.
And the sequence generation module is used for generating a random sequence.
The length of the random sequence is the length of the data after buffering multiplied by the proportionality coefficient.
The data in the random sequence is the same as the data type corresponding to the data identification in the request information. For example, if the data corresponding to the data identification is a binary number, a random sequence of binary numbers is generated; if the data identifies that the corresponding data is a number and other characters, a random sequence of a plurality of characters is generated.
The length L of the random sequence is the length LM of the data after caching;
the length of the random sequence is the total number of bits that the random sequence is generated from, and is determined by the scaling factor. Because the proportionality coefficient is inversely proportional to the data quantity, and the data quantity is proportional to the length after the data caching, the longer the length after the data caching is, the smaller the obtained proportionality coefficient is, and the shorter the length of the generated random sequence is; on the contrary, the shorter the length of the data after caching, the larger the obtained proportionality coefficient is, the longer the length of the generated random sequence is relatively, thus ensuring that the length of the random sequence is not too long or too short. Therefore, the problem that too much buffer space or transmission bandwidth is occupied due to the fact that the length of the random sequence is too long is avoided, and therefore transmission efficiency is affected, and the problem that true data cannot be confused due to the fact that the random sequence is too short is also avoided.
And the inserting module is used for inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user.
The inserting module inserts a first bit of the random sequence into a specific position of a corresponding cache line or cache column according to a preset rule, and other bits are sequentially inserted after the first bit according to the sequence to form a new cache sequence comprising one line (column) or a plurality of lines (columns) of the random sequence. Wherein the specific position is a data bit of a cache line or a cache column calculated according to a rule.
In addition, when the insertion module inserts the random sequence, the cache rows and the cache columns are alternately performed. That is, if a random sequence is inserted into a cache line according to the current request, then a random sequence is inserted into a cache column according to the next request, and so on.
And the cache module is used for sending the new cache sequence to the user terminal and deleting the random sequence at a specific position in the local cache data.
After the cache module sends the new cache sequence containing one line (column) or a plurality of lines (columns) of random sequences to the user terminal, if the user terminal is a safety terminal associated with the esim card, the cache module can extract required data by using a pre-stored rule, namely remove the random sequences to obtain correct cache data; if the user terminal is an illegal or fake terminal, the required data cannot be extracted, that is, the random sequence cannot be removed because the position of the random sequence cannot be obtained, and only the cache data with the confusion information can be obtained.
After the cache module sends a new cache sequence, the random sequence at a specific position in the local cache data is deleted, so that the original cache data is recovered, and the purpose of reducing the occupied cache space is achieved.
The preferred embodiments of the present disclosure are described above with reference to the drawings, but the present disclosure is of course not limited to the above examples. Various changes and modifications within the scope of the appended claims may be made by those skilled in the art, and it should be understood that these changes and modifications naturally will fall within the technical scope of the present disclosure.
For example, a plurality of functions included in one unit may be implemented by separate devices in the above embodiments. Alternatively, a plurality of functions implemented by a plurality of units in the above embodiments may be implemented by separate devices, respectively. In addition, one of the above functions may be implemented by a plurality of units. Needless to say, such a configuration is included in the technical scope of the present disclosure.
In this specification, the steps described in the flowcharts include not only the processing performed in time series in the described order but also the processing performed in parallel or individually without necessarily being performed in time series. Further, even in the steps processed in time series, needless to say, the order can be changed as appropriate.
Although the embodiments of the present disclosure have been described in detail with reference to the accompanying drawings, it should be understood that the above-described embodiments are merely illustrative of the present disclosure and do not constitute a limitation of the present disclosure. It will be apparent to those skilled in the art that various modifications and variations can be made in the above-described embodiments without departing from the spirit and scope of the disclosure. Accordingly, the scope of the disclosure is to be defined only by the claims appended hereto, and by their equivalents.

Claims (6)

1. A safety management method for cache data in an esim card is used for the esim card and specifically comprises the following steps:
(1) receiving request information read by user data, extracting data identification included in the request information, and acquiring corresponding data volume according to the data identification;
(2) generating a scaling factor according to the data quantity, wherein the scaling factor is inversely proportional to the data quantity;
(3) generating a random sequence; the length of the random sequence is the length after data caching multiplied by the proportionality coefficient, the data in the random sequence is the same as the data type corresponding to the data identification in the request information, and the length L of the random sequence is the length LM of the data after data caching;
(4) inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user;
(5) and sending the new cache sequence to the user terminal, and deleting the random sequence at a specific position in the local cache data.
2. The cache data security management method of claim 1, wherein a user sends request information to the esim card through a terminal device, and the terminal device is a device different from a terminal where the esim card is located.
3. The cache data security management method according to claim 1, wherein the step (4) is specifically: according to a preset rule, inserting a first bit of the random sequence into a specific position of a corresponding cache line or cache column, and sequentially inserting other bits behind the first bit according to a sequence to form a new cache sequence comprising one or more lines of the random sequence.
4. A safety management system for cache data in an esim card is arranged on the esim card and specifically comprises: the device comprises an acquisition module, a proportionality coefficient module, a sequence generation module, an insertion module and a cache module;
wherein the content of the first and second substances,
the acquisition module is used for receiving request information read by user data, extracting data identification included in the request information and acquiring corresponding data volume according to the data identification;
the scale coefficient module is used for generating a scale coefficient according to the data volume;
the sequence generation module is used for generating a random sequence; the length of the random sequence is the length after data caching multiplied by the proportionality coefficient, the data in the random sequence is the same as the data type corresponding to the data identification in the request information, and the length L of the random sequence is the length LM of the data after data caching;
the inserting module is used for inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user;
and the cache module is used for sending the new cache sequence to the user terminal and deleting the random sequence at a specific position in the local cache data.
5. The cache data security management system of claim 4, wherein a user sends a request message to the esim card through a terminal device, and the terminal device is a device different from a terminal where the esim card is located.
6. The cache data security management system of claim 4, wherein the insertion module is specifically configured to: according to a preset rule, inserting a first bit of the random sequence into a specific position of a corresponding cache line or cache column, and sequentially inserting other bits behind the first bit according to a sequence to form a new cache sequence comprising one or more lines of the random sequence.
CN201910642195.2A 2019-07-16 2019-07-16 Cache data security management method in esim card Active CN110401941B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910642195.2A CN110401941B (en) 2019-07-16 2019-07-16 Cache data security management method in esim card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910642195.2A CN110401941B (en) 2019-07-16 2019-07-16 Cache data security management method in esim card

Publications (2)

Publication Number Publication Date
CN110401941A CN110401941A (en) 2019-11-01
CN110401941B true CN110401941B (en) 2021-12-21

Family

ID=68324344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910642195.2A Active CN110401941B (en) 2019-07-16 2019-07-16 Cache data security management method in esim card

Country Status (1)

Country Link
CN (1) CN110401941B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113326055B (en) * 2021-06-25 2022-10-28 潍柴动力股份有限公司 Equipment updating method and related device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105468305A (en) * 2015-12-09 2016-04-06 浪潮(北京)电子信息产业有限公司 Data caching method, apparatus and system
CN106919813A (en) * 2015-12-25 2017-07-04 中国电信股份有限公司 Big data watermark management method and system
CN107359989A (en) * 2017-08-03 2017-11-17 广东美的制冷设备有限公司 Data ciphering method, safety chip and computer-readable recording medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9910798B2 (en) * 2015-10-05 2018-03-06 Avago Technologies General Ip (Singapore) Pte. Ltd. Storage controller cache memory operations that forego region locking

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105468305A (en) * 2015-12-09 2016-04-06 浪潮(北京)电子信息产业有限公司 Data caching method, apparatus and system
CN106919813A (en) * 2015-12-25 2017-07-04 中国电信股份有限公司 Big data watermark management method and system
CN107359989A (en) * 2017-08-03 2017-11-17 广东美的制冷设备有限公司 Data ciphering method, safety chip and computer-readable recording medium

Also Published As

Publication number Publication date
CN110401941A (en) 2019-11-01

Similar Documents

Publication Publication Date Title
CN103780622B (en) A kind of data classification encryption method of facing cloud storage
KR100749428B1 (en) Distributed data archive device, system and recording medium
CN107025239B (en) Sensitive word filtering method and device
CN103150397B (en) A kind of data directory creation method, data retrieval method and system
CN106874348B (en) File storage and index method and device and file reading method
CN103049491A (en) Method and device for managing picture file
CN106155845B (en) XFS-based file system data reorganization and recovery method
CN101763397B (en) Device and method for processing expanding information in image file
CN105279440A (en) Photo file encryption method
US10360354B1 (en) Method and apparatus of performing distributed steganography of a data message
CN110401941B (en) Cache data security management method in esim card
CN107481181B (en) Picture hiding method, restoration method and picture hiding system for protecting personal privacy
CN104021178B (en) Multimedia messages filter method and device
CN101827140B (en) Method for writing data in user identification module card and mobile terminal
Li et al. Reversible data hiding in block compressed sensing images
CN102568049B (en) Method, device and system for sending student card reading data
CN1454351A (en) Method for editing/restoring electronic information
KR101936999B1 (en) Methode for data hiding using timestamp information
CN104113509B (en) Pushing method for media files and server
CN106469166A (en) A kind of information processing method and device
CN113806782A (en) Ciphertext judgment method, system and equipment based on transfer matrix
CN114124469A (en) Data processing method, device and equipment
CN110008663B (en) Method for quickly embedding and extracting information for PDF document protection and distribution tracking
CN112287391B (en) Block chain-based data secure storage method and system
CN108182127B (en) Method for extracting deleted file fragments, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant