CN110401941B - Cache data security management method in esim card - Google Patents
Cache data security management method in esim card Download PDFInfo
- Publication number
- CN110401941B CN110401941B CN201910642195.2A CN201910642195A CN110401941B CN 110401941 B CN110401941 B CN 110401941B CN 201910642195 A CN201910642195 A CN 201910642195A CN 110401941 B CN110401941 B CN 110401941B
- Authority
- CN
- China
- Prior art keywords
- data
- cache
- random sequence
- sequence
- esim card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
Abstract
The invention relates to a cache data security management method in an esim card, which is used for the esim card and is used for generating a random sequence, and inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user. The invention also relates to a cache data security management system in the esim card, which is arranged on the esim card and specifically comprises the following steps: the device comprises an acquisition module, a proportionality coefficient module, a sequence generation module, an insertion module and a cache module. By utilizing the system and the method, the data reading and recovering speed can be ensured while the data safety is improved.
Description
Technical Field
The invention relates to the technical field of data security management, in particular to a cache data security management method in an esim card.
Background
The structure for coordinating the difference of the data transmission speeds of two pieces of hardware with larger speed difference can be called as a cache. Because the memory has a higher reading and writing speed relative to the hard disk, the memory can be used as the cache of the hard disk; similarly, the read-write speed of the hard disk is far higher than that of the network data, and the hard disk can also be used as the cache of the network data.
The caching carrier and the cached carrier are always opposite, the caching device cost is higher than that of the cached device, the caching device speed is higher than that of the cached device, and the capacity of the caching device is far smaller than that of the cached device. A cache may be considered a pool of data, a temporary place to store frequently used data, and a subset of the original data, copied from the original data, and tagged for retrieval.
The mobile phone is more and more popular as a tool frequently used in daily life of people, various functions are given to the mobile phone by the development of scientific technology, and the capacity of the mobile phone for storing data is more and more large. Among these data are many information that needs to be kept secret from someone other than the user of the mobile phone. The portability of the mobile phone causes the mobile phone to be frequently lost, and the detachability of the data storage card brings great potential safety hazard to the data of the user. With the popularization of smart phones and the popularization of mobile internet, hackers steal user data by trojan horses, viruses and other methods and also bring great threats to the data security of users.
In the prior art, when a random sequence is generated, if the sequence is too long, the time for reading and recovering complete data is prolonged, the access efficiency is affected, and if the sequence is too short, certain risk is caused.
Disclosure of Invention
This section provides a general summary of the disclosure, and is not a comprehensive disclosure of its full scope or all of its features.
The disclosed objective is to provide a cache data security management method in an esim card, where the method is used for the esim card, and specifically includes:
(1) receiving request information read by user data, extracting data identification included in the request information, and acquiring corresponding data volume according to the data identification;
(2) generating a scaling factor according to the data quantity, wherein the scaling factor is inversely proportional to the data quantity;
(3) generating a random sequence;
(4) inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user;
(5) and sending the new cache sequence to the user terminal, and deleting the random sequence at a specific position in the local cache data.
Further, the user sends request information to the esim card through terminal equipment, wherein the terminal equipment is different from the terminal where the esim card is located.
Further, the data in the random sequence is the same as the data type corresponding to the data identification in the request information.
Further, the length L of the random sequence is the length LM of the data after buffering.
Further, the step (4) is specifically as follows: according to a preset rule, a first bit of the random sequence is inserted into a specific position of a corresponding cache line or cache column, and other bits are sequentially inserted after the first bit according to the sequence to form a new cache sequence comprising one line (column) or a plurality of lines (columns) of the random sequence.
The invention also provides a cache data security management system in the esim card, which is arranged on the esim card and specifically comprises the following steps: the device comprises an acquisition module, a proportionality coefficient module, a sequence generation module, an insertion module and a cache module;
wherein the content of the first and second substances,
the acquisition module is used for receiving request information read by user data, extracting data identification included in the request information and acquiring corresponding data volume according to the data identification;
the scale coefficient module is used for generating a scale coefficient according to the data volume;
the sequence generation module is used for generating a random sequence;
the inserting module is used for inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user;
and the cache module is used for sending the new cache sequence to the user terminal and deleting the random sequence at a specific position in the local cache data.
Has the advantages that: by utilizing the system and the method, the data reading and recovering speed can be ensured while the data safety is improved.
Further areas of applicability will become apparent from the description provided herein. The description and specific examples in this summary are intended for purposes of illustration only and are not intended to limit the scope of the present disclosure.
Drawings
The drawings described herein are for illustrative purposes only of selected embodiments and not all possible implementations, and are not intended to limit the scope of the present disclosure. In the drawings:
FIG. 1 is a flow diagram of a method for cache data security management;
fig. 2 is a schematic diagram of a cache data security management system.
While the disclosure is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the disclosure to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosure. It is noted that throughout the several views, corresponding reference numerals indicate corresponding parts.
Detailed Description
Examples of the present disclosure will now be described more fully with reference to the accompanying drawings. The following description is merely exemplary in nature and is not intended to limit the present disclosure, application, or uses.
Example embodiments are provided so that this disclosure will be thorough, and will fully convey the scope to those skilled in the art. Numerous specific details are set forth such as examples of specific components, devices, and methods to provide a thorough understanding of embodiments of the present disclosure. It will be apparent to those skilled in the art that specific details need not be employed, that example embodiments may be embodied in many different forms and that neither should be construed to limit the scope of the disclosure. In certain example embodiments, well-known processes, well-known structures, and well-known technologies are not described in detail.
The technical problems posed by the present disclosure will be explained in detail below. It is to be noted that this technical problem is merely exemplary and is not intended to limit the application of the present invention.
As shown in FIG. 1, the invention provides a cache data security management method in an esim card. The method is used for the esim card and specifically comprises the following steps:
(1) receiving request information read by user data, extracting a data identifier included in the request information, and acquiring a corresponding data volume according to the data identifier, wherein the data identifier is an identifier of data content to be read, and the data volume is the size of a data file to be read.
The user sends request information to the esim card through terminal equipment, wherein the terminal equipment is different from the terminal where the esim card is located.
(2) And generating a proportionality coefficient according to the data quantity, wherein the proportionality coefficient is inversely proportional to the data quantity.
The scale factor is smaller when the data amount is larger, and is larger when the data amount is smaller, and the scale factor is between 0.001 and 0.01. Specifically, if the data amount is the total buffer capacity, the scaling factor is 0.001, and if the data amount is 1% or less of the total buffer capacity, the scaling factor is 0.01.
(3) And generating a random sequence, wherein the length of the random sequence is the length of the data after being cached and multiplied by the proportionality coefficient.
The data in the random sequence is the same as the data type corresponding to the data identification in the request information. For example, if the data corresponding to the data identification is a binary number, a random sequence of binary numbers is generated; if the data identifies that the corresponding data is a number and other characters, a random sequence of a plurality of characters is generated.
The length L of the random sequence is the length LM of the data after caching;
the length of the random sequence is the total number of bits that the random sequence is generated from, and is determined by the scaling factor. Because the proportionality coefficient is inversely proportional to the data quantity, and the data quantity is proportional to the length after the data caching, the longer the length after the data caching is, the smaller the obtained proportionality coefficient is, and the shorter the length of the generated random sequence is; on the contrary, the shorter the length of the data after caching, the larger the obtained proportionality coefficient is, the longer the length of the generated random sequence is relatively, thus ensuring that the length of the random sequence is not too long or too short. The method avoids the problem that too much buffer space or transmission bandwidth is occupied due to the overlong length of the random sequence, thereby affecting the transmission efficiency, and simultaneously avoids the problem that the data stealers cannot be confused due to the overlong length of the random sequence.
(4) And inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user.
According to a preset rule, a first bit of the random sequence is inserted into a specific position of a corresponding cache line or cache column, and other bits are sequentially inserted after the first bit according to the sequence to form a new cache sequence comprising one-line (column) or multiple-line (column) random sequences. Wherein the specific position is a data bit of a cache line or a cache column calculated according to a rule.
In addition, when random sequences are inserted, cache lines and columns alternate. That is, if a random sequence is inserted into a cache line according to the current request, then a random sequence is inserted into a cache column according to the next request, and so on.
(5) And sending the new cache sequence to the user terminal, and deleting the random sequence at a specific position in the local cache data.
After the new cache sequence containing one row (column) or a plurality of rows (columns) of random sequences is sent to the user terminal, if the user terminal is a security terminal associated with the esim card, the required data can be extracted by using a pre-stored rule, namely the random sequences are removed, and correct cache data are obtained; if the user terminal is an illegal or fake terminal, the required data cannot be extracted, that is, the random sequence cannot be removed because the position of the random sequence cannot be obtained, and only the cache data with the confusion information can be obtained.
After the new cache sequence is sent, the random sequence at the specific position in the local cache data is deleted, so that the original cache data is recovered, and the purpose of reducing the occupied cache space is achieved.
Further description of the process according to the invention is carried out using the application examples below.
In the interaction process of a user and a terminal where the esim card is located through a remote terminal, related interaction information in the esim card, such as terminal information or audio and video data, needs to be acquired. And the user sends request information containing the terminal name or the audio/video file name to the esim card.
And after receiving the request information, the esim card extracts the terminal name or the audio/video file name, and then searches the size of the corresponding data file in the cache according to the terminal name or the audio/video file name. For example, the file size is a, and the total cache capacity is a. Based on the file size a, an approximate scale factor of 0.002 was obtained. The total number of bits of the file data is b.
After the scaling factor is determined again, the random sequence length is calculated to be 0.002 b.
According to the obtained length of 0.002b, the esim card generates a random sequence in the same form as the file data.
Since the last time the data was read, a random sequence is inserted into the cache column. According to a preset rule stored in the esim card, inserting a first bit of the generated random sequence into a corresponding bit of a corresponding cache line, and then inserting other bits of data of the random sequence in sequence. If the length of the random sequence is 0.002b greater than the length of the cache line c, the random sequence occupies a plurality of cache lines after the random sequence is inserted. And finally, forming a new cache sequence containing a plurality of cache lines, wherein the cache sequence is the terminal information or the audio and video information which is requested by the user and subjected to the confusion processing.
The esim card sends the new cached sequence to the user remote terminal. Since the remote terminal is a terminal previously associated with the esim card, the terminal stores the same preset rules as used by the esim card. And then, the terminal removes the random sequence with the length of 0.002b in the corresponding line generated by the esim card from the new cache sequence by using the preset rule to obtain the required correct terminal information or audio and video information.
As shown in fig. 2, the present invention also relates to a cache data security management system in an esim card. The above system is arranged on the esim card, and specifically comprises: the device comprises an acquisition module, a proportionality coefficient module, a sequence generation module, an insertion module and a cache module. Wherein the content of the first and second substances,
and the acquisition module is used for receiving request information read by user data, extracting a data identifier included in the request information, and acquiring a corresponding data volume according to the data identifier.
The data identification is the identification of the data content needing to be read, and the data volume is the size of the data file needing to be read.
The user sends request information to the acquisition module through terminal equipment, wherein the terminal equipment is different from a terminal where the acquisition module is located.
And the proportion coefficient module is used for generating a proportion coefficient according to the data volume.
The scaling factor is inversely proportional to the size of the data volume. That is, the scale factor is smaller as the data amount is larger, and the scale factor is larger as the data amount is smaller, and the scale factor is between 0.001 and 0.01. Specifically, if the data amount is the total buffer capacity, the scaling factor is 0.001, and if the data amount is 1% of the total buffer capacity, the scaling factor is 0.01.
And the sequence generation module is used for generating a random sequence.
The length of the random sequence is the length of the data after buffering multiplied by the proportionality coefficient.
The data in the random sequence is the same as the data type corresponding to the data identification in the request information. For example, if the data corresponding to the data identification is a binary number, a random sequence of binary numbers is generated; if the data identifies that the corresponding data is a number and other characters, a random sequence of a plurality of characters is generated.
The length L of the random sequence is the length LM of the data after caching;
the length of the random sequence is the total number of bits that the random sequence is generated from, and is determined by the scaling factor. Because the proportionality coefficient is inversely proportional to the data quantity, and the data quantity is proportional to the length after the data caching, the longer the length after the data caching is, the smaller the obtained proportionality coefficient is, and the shorter the length of the generated random sequence is; on the contrary, the shorter the length of the data after caching, the larger the obtained proportionality coefficient is, the longer the length of the generated random sequence is relatively, thus ensuring that the length of the random sequence is not too long or too short. Therefore, the problem that too much buffer space or transmission bandwidth is occupied due to the fact that the length of the random sequence is too long is avoided, and therefore transmission efficiency is affected, and the problem that true data cannot be confused due to the fact that the random sequence is too short is also avoided.
And the inserting module is used for inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user.
The inserting module inserts a first bit of the random sequence into a specific position of a corresponding cache line or cache column according to a preset rule, and other bits are sequentially inserted after the first bit according to the sequence to form a new cache sequence comprising one line (column) or a plurality of lines (columns) of the random sequence. Wherein the specific position is a data bit of a cache line or a cache column calculated according to a rule.
In addition, when the insertion module inserts the random sequence, the cache rows and the cache columns are alternately performed. That is, if a random sequence is inserted into a cache line according to the current request, then a random sequence is inserted into a cache column according to the next request, and so on.
And the cache module is used for sending the new cache sequence to the user terminal and deleting the random sequence at a specific position in the local cache data.
After the cache module sends the new cache sequence containing one line (column) or a plurality of lines (columns) of random sequences to the user terminal, if the user terminal is a safety terminal associated with the esim card, the cache module can extract required data by using a pre-stored rule, namely remove the random sequences to obtain correct cache data; if the user terminal is an illegal or fake terminal, the required data cannot be extracted, that is, the random sequence cannot be removed because the position of the random sequence cannot be obtained, and only the cache data with the confusion information can be obtained.
After the cache module sends a new cache sequence, the random sequence at a specific position in the local cache data is deleted, so that the original cache data is recovered, and the purpose of reducing the occupied cache space is achieved.
The preferred embodiments of the present disclosure are described above with reference to the drawings, but the present disclosure is of course not limited to the above examples. Various changes and modifications within the scope of the appended claims may be made by those skilled in the art, and it should be understood that these changes and modifications naturally will fall within the technical scope of the present disclosure.
For example, a plurality of functions included in one unit may be implemented by separate devices in the above embodiments. Alternatively, a plurality of functions implemented by a plurality of units in the above embodiments may be implemented by separate devices, respectively. In addition, one of the above functions may be implemented by a plurality of units. Needless to say, such a configuration is included in the technical scope of the present disclosure.
In this specification, the steps described in the flowcharts include not only the processing performed in time series in the described order but also the processing performed in parallel or individually without necessarily being performed in time series. Further, even in the steps processed in time series, needless to say, the order can be changed as appropriate.
Although the embodiments of the present disclosure have been described in detail with reference to the accompanying drawings, it should be understood that the above-described embodiments are merely illustrative of the present disclosure and do not constitute a limitation of the present disclosure. It will be apparent to those skilled in the art that various modifications and variations can be made in the above-described embodiments without departing from the spirit and scope of the disclosure. Accordingly, the scope of the disclosure is to be defined only by the claims appended hereto, and by their equivalents.
Claims (6)
1. A safety management method for cache data in an esim card is used for the esim card and specifically comprises the following steps:
(1) receiving request information read by user data, extracting data identification included in the request information, and acquiring corresponding data volume according to the data identification;
(2) generating a scaling factor according to the data quantity, wherein the scaling factor is inversely proportional to the data quantity;
(3) generating a random sequence; the length of the random sequence is the length after data caching multiplied by the proportionality coefficient, the data in the random sequence is the same as the data type corresponding to the data identification in the request information, and the length L of the random sequence is the length LM of the data after data caching;
(4) inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user;
(5) and sending the new cache sequence to the user terminal, and deleting the random sequence at a specific position in the local cache data.
2. The cache data security management method of claim 1, wherein a user sends request information to the esim card through a terminal device, and the terminal device is a device different from a terminal where the esim card is located.
3. The cache data security management method according to claim 1, wherein the step (4) is specifically: according to a preset rule, inserting a first bit of the random sequence into a specific position of a corresponding cache line or cache column, and sequentially inserting other bits behind the first bit according to a sequence to form a new cache sequence comprising one or more lines of the random sequence.
4. A safety management system for cache data in an esim card is arranged on the esim card and specifically comprises: the device comprises an acquisition module, a proportionality coefficient module, a sequence generation module, an insertion module and a cache module;
wherein the content of the first and second substances,
the acquisition module is used for receiving request information read by user data, extracting data identification included in the request information and acquiring corresponding data volume according to the data identification;
the scale coefficient module is used for generating a scale coefficient according to the data volume;
the sequence generation module is used for generating a random sequence; the length of the random sequence is the length after data caching multiplied by the proportionality coefficient, the data in the random sequence is the same as the data type corresponding to the data identification in the request information, and the length L of the random sequence is the length LM of the data after data caching;
the inserting module is used for inserting the generated random sequence into a specific position of a cache line or a cache column to form a new cache sequence required by a user;
and the cache module is used for sending the new cache sequence to the user terminal and deleting the random sequence at a specific position in the local cache data.
5. The cache data security management system of claim 4, wherein a user sends a request message to the esim card through a terminal device, and the terminal device is a device different from a terminal where the esim card is located.
6. The cache data security management system of claim 4, wherein the insertion module is specifically configured to: according to a preset rule, inserting a first bit of the random sequence into a specific position of a corresponding cache line or cache column, and sequentially inserting other bits behind the first bit according to a sequence to form a new cache sequence comprising one or more lines of the random sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910642195.2A CN110401941B (en) | 2019-07-16 | 2019-07-16 | Cache data security management method in esim card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910642195.2A CN110401941B (en) | 2019-07-16 | 2019-07-16 | Cache data security management method in esim card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110401941A CN110401941A (en) | 2019-11-01 |
CN110401941B true CN110401941B (en) | 2021-12-21 |
Family
ID=68324344
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910642195.2A Active CN110401941B (en) | 2019-07-16 | 2019-07-16 | Cache data security management method in esim card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110401941B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113326055B (en) * | 2021-06-25 | 2022-10-28 | 潍柴动力股份有限公司 | Equipment updating method and related device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105468305A (en) * | 2015-12-09 | 2016-04-06 | 浪潮(北京)电子信息产业有限公司 | Data caching method, apparatus and system |
CN106919813A (en) * | 2015-12-25 | 2017-07-04 | 中国电信股份有限公司 | Big data watermark management method and system |
CN107359989A (en) * | 2017-08-03 | 2017-11-17 | 广东美的制冷设备有限公司 | Data ciphering method, safety chip and computer-readable recording medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9910798B2 (en) * | 2015-10-05 | 2018-03-06 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Storage controller cache memory operations that forego region locking |
-
2019
- 2019-07-16 CN CN201910642195.2A patent/CN110401941B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105468305A (en) * | 2015-12-09 | 2016-04-06 | 浪潮(北京)电子信息产业有限公司 | Data caching method, apparatus and system |
CN106919813A (en) * | 2015-12-25 | 2017-07-04 | 中国电信股份有限公司 | Big data watermark management method and system |
CN107359989A (en) * | 2017-08-03 | 2017-11-17 | 广东美的制冷设备有限公司 | Data ciphering method, safety chip and computer-readable recording medium |
Also Published As
Publication number | Publication date |
---|---|
CN110401941A (en) | 2019-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103780622B (en) | A kind of data classification encryption method of facing cloud storage | |
KR100749428B1 (en) | Distributed data archive device, system and recording medium | |
CN107025239B (en) | Sensitive word filtering method and device | |
CN103150397B (en) | A kind of data directory creation method, data retrieval method and system | |
CN106874348B (en) | File storage and index method and device and file reading method | |
CN103049491A (en) | Method and device for managing picture file | |
CN106155845B (en) | XFS-based file system data reorganization and recovery method | |
CN101763397B (en) | Device and method for processing expanding information in image file | |
CN105279440A (en) | Photo file encryption method | |
US10360354B1 (en) | Method and apparatus of performing distributed steganography of a data message | |
CN110401941B (en) | Cache data security management method in esim card | |
CN107481181B (en) | Picture hiding method, restoration method and picture hiding system for protecting personal privacy | |
CN104021178B (en) | Multimedia messages filter method and device | |
CN101827140B (en) | Method for writing data in user identification module card and mobile terminal | |
Li et al. | Reversible data hiding in block compressed sensing images | |
CN102568049B (en) | Method, device and system for sending student card reading data | |
CN1454351A (en) | Method for editing/restoring electronic information | |
KR101936999B1 (en) | Methode for data hiding using timestamp information | |
CN104113509B (en) | Pushing method for media files and server | |
CN106469166A (en) | A kind of information processing method and device | |
CN113806782A (en) | Ciphertext judgment method, system and equipment based on transfer matrix | |
CN114124469A (en) | Data processing method, device and equipment | |
CN110008663B (en) | Method for quickly embedding and extracting information for PDF document protection and distribution tracking | |
CN112287391B (en) | Block chain-based data secure storage method and system | |
CN108182127B (en) | Method for extracting deleted file fragments, terminal equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |