CN110826113A - Data secure storage method and device - Google Patents
Data secure storage method and device Download PDFInfo
- Publication number
- CN110826113A CN110826113A CN201810903926.XA CN201810903926A CN110826113A CN 110826113 A CN110826113 A CN 110826113A CN 201810903926 A CN201810903926 A CN 201810903926A CN 110826113 A CN110826113 A CN 110826113A
- Authority
- CN
- China
- Prior art keywords
- data
- password
- storage device
- data storage
- processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012545 processing Methods 0.000 claims abstract description 117
- 238000013500 data storage Methods 0.000 claims abstract description 109
- 238000005192 partition Methods 0.000 claims abstract description 85
- 230000001960 triggered effect Effects 0.000 claims abstract description 20
- 238000012217 deletion Methods 0.000 claims description 31
- 230000037430 deletion Effects 0.000 claims description 31
- 238000000605 extraction Methods 0.000 claims description 22
- 238000012986 modification Methods 0.000 claims description 20
- 230000004048 modification Effects 0.000 claims description 20
- 238000004590 computer program Methods 0.000 claims description 8
- 230000004044 response Effects 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 2
- 210000000887 face Anatomy 0.000 description 2
- 210000000554 iris Anatomy 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000013075 data extraction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a data safety storage method and a device, wherein the method comprises the steps of obtaining partition information for representing an internal partition of a data storage device, wherein the partition is used for storing data in a partition mode in the data storage device; acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage device; acquiring a real-time processing password according to a data processing request triggered by an external object; judging whether the real-time processing password is legal or not; and if the real-time processing password is legal, outputting an identification signal for identifying the processing of the data in the data storage equipment. The scheme disclosed by the invention can improve the safety factor of the data in the data storage device, and process the data in the storage device or the data driver according to the password provided by the device holder.
Description
Technical Field
The invention belongs to the technical field of data security, and particularly relates to a data security storage method and device.
Background
With the advent of the information society and the continuous development of network technology, various digital data can be stored in a storage device or a data drive, and the requirements for security and confidentiality of information in the storage device or the data drive are higher and higher. In the prior art, the most common data security method is to encrypt a data area in a storage device or a data drive, and to keep secret for information in the storage device or the data drive through a login user name and a password, so as to protect the security of the information in the storage device or the data drive.
However, in the prior art, all data stored in the storage device or the data driver can be extracted by one password, so that when the storage device or the data driver is lost or invaded by others, the decryption and cracking cost is low, and the information in the storage device or the data driver can be easily acquired; furthermore, when a storage device or data drive holder is forced to have to retrieve data from the device, the storage device or data drive is unable to modify and/or delete the data stored within the storage device or data drive according to the password entered by the device holder, resulting in data leakage.
Therefore, how to process the data in the storage device or the data drive according to the password provided by the device holder becomes an urgent technical problem to be solved.
Disclosure of Invention
The technical problem to be solved by the invention is how to process data in a storage device or a data drive according to a password provided by a device holder.
Therefore, according to a first aspect, an embodiment of the present invention discloses a data secure storage method, which is applicable to a data storage device, and includes: obtaining partition information for representing an internal partition of the data storage device, wherein the partition is used for storing data in the data storage device in a partition mode; acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage device; acquiring a real-time processing password according to a data processing request triggered by an external object; judging whether the real-time processing password is legal or not; and if the real-time processing password is legal, outputting an identification signal for identifying the processing of the data in the data storage equipment.
Optionally, the method further comprises: the partition information is reset in response to a reset request triggered by an external object.
Optionally, the preset processing password comprises one or any combination of a preset extraction password, a preset modification password, a preset deletion password and a preset reset password.
Optionally, outputting an identification signal for identifying processing of data in the data storage device comprises: outputting an extraction signal for identifying extraction of data within the data storage device; outputting a deletion signal for identifying deletion of data in the data storage device; a modification signal is output identifying the deletion and rewriting of data within the data storage device.
According to a second aspect, an embodiment of the present invention provides a data security storage apparatus, which is suitable for a data storage device, and includes: the data storage device comprises a partition information module, a partition information module and a partition management module, wherein the partition information module is used for acquiring partition information for representing an internal partition of the data storage device, and the partition is used for storing data in a partition mode in the data storage device; the password presetting module is used for acquiring a preset processing password according to the partition information, and the preset processing password is used for processing data in the data storage device; the real-time password module is used for acquiring a real-time processing password according to a data processing request triggered by an external object; the password judgment module is used for judging whether the real-time processing password is legal or not; and the identification signal module is used for outputting an identification signal for identifying and processing the data in the data storage equipment if the real-time processing password is legal.
Optionally, the method further comprises: and the partition resetting module is used for resetting the partition information in response to a resetting request triggered by an external object.
Optionally, the preset processing password comprises one or any combination of a preset extraction password, a preset modification password, a preset deletion password and a preset reset password.
Optionally, the identification signal module comprises: the extraction signal unit is used for outputting an extraction signal used for identifying the extraction of the data in the data storage device; a deletion signal unit for outputting a deletion signal for identifying deletion of data in the data storage device; and the modification signal unit is used for outputting a modification signal for identifying deletion and rewriting of the data in the data storage device.
According to a third aspect, the present invention provides a computer apparatus comprising a processor for executing a computer program stored in a memory to implement the method of any of the first aspects above.
According to a fourth aspect, the present invention provides a computer readable storage medium having stored thereon a computer program, a processor being adapted to execute the computer program stored in the storage medium to implement the method of any of the first aspects described above.
The invention has the beneficial effects that:
the embodiment of the invention discloses a data security storage method and a data security storage device, which are characterized in that partition information of output data storage equipment is obtained, a preset processing password is obtained according to the partition information, a real-time processing password is obtained according to a data processing request triggered by an external object, whether the real-time processing password is legal or not is judged, and if the real-time processing password is legal, an identification signal for identifying data in the data storage equipment for processing is output. Compared with the scheme of directly storing all data in one data storage device in the prior art, the scheme disclosed by the embodiment of the invention can store the data in the data storage device in a partition mode, sets the corresponding preset processing password aiming at the partition in the data storage device, can process the data in the corresponding partition only when the real-time processing password is legal, increases the cost of an unauthorized user for invading the data storage device, and can process the data in the data storage device according to the real-time processing password provided by the user.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a method for securely storing data according to an embodiment of the present invention; fig. 2 is a schematic structural diagram of a data storage device according to an embodiment of the invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to process data in a storage device or a data drive according to a password provided by a device holder, the present invention provides a data security storage method, which is suitable for a data storage device, and please refer to fig. 1, which is a flowchart of the data security storage method disclosed in this embodiment, where the data security storage method includes: step S101, obtaining partition information for representing the internal partition of the data storage device.
In particular embodiments, the data storage device may be a usb disk, a mobile phone memory, or other form of data drive.
In this embodiment, a plurality of partitions or regions are pre-configured in the data storage device, and the partitions are used for storing data in the data storage device in a partitioned manner. The data storage device obtains partition information inside the data storage device, wherein the partition information includes information such as the number of partitions inside the data storage device, and the capacity of each partition inside the data storage device. And step S102, acquiring a preset processing password according to the partition information.
In a particular embodiment, the preset processing password is used for processing data in the data storage device. The preset processing password includes: a preset extraction password, a preset modification password, a preset deletion password and a preset reset password. The preset processing password can be a numeric/English password or biometric data, such as: fingerprints, faces, irises, etc.
The user of the data storage device can enter the corresponding partition by using one preset processing password, can enter a plurality of partitions by using one preset processing password, and can extract, modify and delete the data in the partitions.
The data are stored in the data storage device in a partitioned mode, and the corresponding preset processing password is set for each partition, so that compared with the prior art that the data are all stored in one partition of the data storage device, the difficulty that an unauthorized user invades the data storage device can be increased by storing multiple kinds of data in the data storage device in the partitioned mode, the safety factor of the data storage device is further improved, and the protection of the data stored in the data storage device is enhanced.
Step S103, acquiring a real-time processing password according to a data processing request triggered by an external object.
In a particular embodiment, processing the password in real-time includes: extracting the password in real time, modifying the password in real time, deleting the password in real time, and resetting the password in real time. The real-time processing password can be a digital/English password or biological characteristic data, such as: fingerprints, faces, irises, etc.
When a user of the data storage device needs to process data in the data storage device, the data storage device acquires a real-time processing password provided by the user according to a data processing request triggered by an external object. The real-time password processing mode provided by the user can be manual input, automatic acquisition through the data storage device, or other modes which can enable the data storage device to obtain the real-time password processing mode.
And step S104, judging whether the real-time processing password is legal.
In a specific embodiment, determining whether the real-time processing password is legal comprises: comparing the real-time processing password with a preset processing password; and when the real-time processing password is compared with the preset processing password to be consistent, outputting an identification signal that the real-time processing password is legal.
The data storage equipment compares the acquired real-time processing password with a preset processing password, and by taking face recognition as an example, similarity scores in the acquired face features and the face features stored in the data storage equipment in advance are calculated, if the maximum value of the similarity scores is larger than a preset threshold value, the recognition is successful, and the real-time processing password is judged to be legal; if the maximum value of the similarity score is not greater than the preset threshold value, the recognition is failed, and the real-time password processing is judged to be illegal.
Step S105, if the real-time processing password is legal, outputting an identification signal for identifying the data in the data storage device to be processed.
And if the real-time processing password is judged to be legal, outputting corresponding identification signals according to different data processing requests triggered by the user, wherein the identification signals are used for representing and processing data in the data storage equipment. Wherein outputting an identification signal identifying processing of data within the data storage device comprises: outputting an extraction signal for identifying extraction of data within the data storage device; outputting a deletion signal for identifying deletion of data in the data storage device; a modification signal is output identifying the deletion and rewriting of data within the data storage device.
In a specific implementation process, if a data extraction request is triggered by a user, outputting an extraction signal for identifying and extracting data in a data storage device after judging that a real-time processing password is legal, and presenting the data stored in a partition corresponding to the real-time processing password to the user by the data storage device according to the extraction signal; if the user triggers a data deletion request, outputting a deletion signal for identifying deletion of data in the data storage device after judging that the real-time processing password is legal, and deleting the data stored in the partition corresponding to the real-time processing password by the data storage device according to the deletion signal; if the user triggers a data modification request, outputting a modification signal for identifying deletion and rewriting of data in the data storage device after judging that the real-time processing password is legal, deleting and rewriting the data stored in the partition corresponding to the real-time processing password by the data storage device according to the modification signal, and presenting the rewritten false data to the user.
When the data storage device deletes and rewrites the data stored in the corresponding partition according to the modification signal, the rewritten data may be that a part of the file name in the partition is reserved, and only the data stored in the partition is changing randomly, so as to obtain the dummy data. The rewritten data may also be a set of replacement data stored in the data storage device in advance, and when the data storage device deletes and rewrites the data stored in the corresponding partition according to the modification signal, the replacement data is used to directly replace the data in the data storage device that needs to be rewritten.
In addition, in a specific embodiment, the data security storage method may further include: the partition information is reset in response to a reset request triggered by an external object. After the user purchases the data storage device, the data storage device may reset some or all of the partitions within the data storage device according to a reset request triggered by the user. In addition, the information of the total capacity, the number of partitions, the partition capacity and the like in the data storage device cannot be reset or is always in a hidden state so as to better protect the secret.
The embodiment also discloses a data security storage apparatus, which is suitable for a data storage device, please refer to fig. 2, which is a schematic structural diagram of the data security storage apparatus, and the data security storage apparatus includes:
a partition information module 201, configured to obtain partition information used to represent an internal partition of a data storage device, where the partition is used to store data in a partitioned manner in the data storage device; the password presetting module 202 is used for acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage device; the real-time password module 203 is used for acquiring a real-time processing password according to a data processing request triggered by an external object; a password judgment module 204, configured to judge whether the real-time processing password is legal; an identification signal module 205, configured to output an identification signal for identifying processing of data in the data storage device if the real-time processing password is legal; a partition resetting module 206, configured to reset the partition information in response to a reset request triggered by an external object.
In a particular embodiment, the identification signal module 205 includes: the extraction signal unit is used for outputting an extraction signal used for identifying the extraction of the data in the data storage device; a deletion signal unit for outputting a deletion signal for identifying deletion of data in the data storage device; and the modification signal unit is used for outputting a modification signal for identifying deletion and rewriting of the data in the data storage device.
In addition, an embodiment of the present invention further provides a computer apparatus, where a processor executes the computer instructions, so as to implement the following method: obtaining partition information for representing an internal partition of the data storage device, wherein the partition is used for storing data in the data storage device in a partition mode; acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage device; acquiring a real-time processing password according to a data processing request triggered by an external object; judging whether the real-time processing password is legal or not; and if the real-time processing password is legal, outputting an identification signal for identifying the processing of the data in the data storage equipment.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like. The computer processor is used to execute a computer program stored in a storage medium to implement the following method: obtaining partition information for representing an internal partition of the data storage device, wherein the partition is used for storing data in the data storage device in a partition mode; acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage device; acquiring a real-time processing password according to a data processing request triggered by an external object; judging whether the real-time processing password is legal or not; and if the real-time processing password is legal, outputting an identification signal for identifying the processing of the data in the data storage equipment.
The foregoing is merely an example of the present invention and common general knowledge of known specific structures and features of the embodiments is not described herein in any greater detail. It should be noted that variations and modifications can be made by those skilled in the art without departing from the structure of the present invention. These should also be construed as the scope of the present invention, and they should not be construed as affecting the effectiveness of the practice of the present invention or the applicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.
Claims (10)
1. A data security storage method is suitable for data storage equipment, and is characterized by comprising the following steps:
obtaining partition information for characterizing a partition within a data storage device, the partition being for storing data in the data storage device;
acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage equipment;
acquiring a real-time processing password according to a data processing request triggered by an external object;
judging whether the real-time processing password is legal or not;
and if the real-time processing password is legal, outputting an identification signal for identifying and processing the data in the data storage equipment.
2. The method for secure storage of data according to claim 1, further comprising:
resetting the partition information in response to a reset request triggered by an external object.
3. The method for securely storing data according to claim 2, wherein the preset processing password comprises one or any combination of a preset extraction password, a preset modification password, a preset deletion password and a preset reset password.
4. A method for the secure storage of data as claimed in claim 2 or 3, wherein said outputting an identification signal identifying the processing of data within said data storage device comprises:
outputting an extraction signal for identifying extraction of data within the data storage device;
outputting a deletion signal for identifying deletion of data in the data storage device;
and outputting a modification signal for identifying deletion and rewriting of data in the data storage device.
5. A data security storage apparatus adapted for use with a data storage device, comprising:
the data storage device comprises a partition information module, a partition information module and a partition information module, wherein the partition information module is used for acquiring partition information for representing an internal partition of the data storage device, and the partition is used for storing data in a partition mode in the data storage device;
the preset password module is used for acquiring a preset processing password according to the partition information, and the preset processing password is used for processing data in the data storage device;
the real-time password module is used for acquiring a real-time processing password according to a data processing request triggered by an external object;
the password judgment module is used for judging whether the real-time processing password is legal or not;
and the identification signal module is used for outputting an identification signal for identifying and processing the data in the data storage equipment if the real-time processing password is legal.
6. The data security storage device of claim 5, further comprising:
and the partition resetting module is used for resetting the partition information in response to a resetting request triggered by an external object.
7. The data security storage device of claim 6, further comprising: the preset processing password comprises one or any combination of a preset extraction password, a preset modification password, a preset deletion password and a preset reset password.
8. The data security storage device of claim 6 or 7, wherein the identification signal module comprises:
the extraction signal unit is used for outputting an extraction signal used for identifying the extraction of the data in the data storage device;
a deletion signal unit for outputting a deletion signal for identifying deletion of data in the data storage device;
and the modification signal unit is used for outputting a modification signal for identifying deletion and rewriting of the data in the data storage device.
9. A computer arrangement comprising a processor for executing a computer program stored in a memory to implement the method of any of claims 1-4.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that a processor is adapted to execute the computer program stored in the storage medium to implement the method according to any of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810903926.XA CN110826113A (en) | 2018-08-09 | 2018-08-09 | Data secure storage method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810903926.XA CN110826113A (en) | 2018-08-09 | 2018-08-09 | Data secure storage method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110826113A true CN110826113A (en) | 2020-02-21 |
Family
ID=69540933
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810903926.XA Pending CN110826113A (en) | 2018-08-09 | 2018-08-09 | Data secure storage method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110826113A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102096641A (en) * | 2010-12-13 | 2011-06-15 | 沈晖 | Double-factor shadow password protection method for mobile storage medium data safety |
US20110307724A1 (en) * | 2008-05-23 | 2011-12-15 | Norman Shaw | Secure storage device |
CN103279431A (en) * | 2013-05-23 | 2013-09-04 | 青岛海信宽带多媒体技术有限公司 | Access method for kinds of permissions of memorizer |
CN103688269A (en) * | 2011-07-18 | 2014-03-26 | 惠普发展公司,有限责任合伙企业 | Cryptographic information association to memory regions |
US20150319294A1 (en) * | 2014-05-05 | 2015-11-05 | Apple Inc. | Fingerprint activation of a panic mode of operation for a mobile device |
US9218474B1 (en) * | 2014-01-13 | 2015-12-22 | Amazon Technologies, Inc. | Enhanced biometric security measures |
CN105989392A (en) * | 2015-02-13 | 2016-10-05 | 中国科学院信息工程研究所 | Mobile storage system, access control method thereof and manufacturing method thereof |
CN106897635A (en) * | 2017-02-28 | 2017-06-27 | 广东虹勤通讯技术有限公司 | Movable memory equipment and its operating method |
US9846784B1 (en) * | 2013-02-26 | 2017-12-19 | Rockwell Collins, Inc. | Multi-level storage system and method |
US20170372087A1 (en) * | 2016-06-28 | 2017-12-28 | Line Corporation | Method and system for data management |
CN107743131A (en) * | 2017-11-20 | 2018-02-27 | 张博 | A kind of identity identifying method and device based on a variety of different types input composite sequence |
-
2018
- 2018-08-09 CN CN201810903926.XA patent/CN110826113A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110307724A1 (en) * | 2008-05-23 | 2011-12-15 | Norman Shaw | Secure storage device |
CN102096641A (en) * | 2010-12-13 | 2011-06-15 | 沈晖 | Double-factor shadow password protection method for mobile storage medium data safety |
CN103688269A (en) * | 2011-07-18 | 2014-03-26 | 惠普发展公司,有限责任合伙企业 | Cryptographic information association to memory regions |
US9846784B1 (en) * | 2013-02-26 | 2017-12-19 | Rockwell Collins, Inc. | Multi-level storage system and method |
CN103279431A (en) * | 2013-05-23 | 2013-09-04 | 青岛海信宽带多媒体技术有限公司 | Access method for kinds of permissions of memorizer |
US9218474B1 (en) * | 2014-01-13 | 2015-12-22 | Amazon Technologies, Inc. | Enhanced biometric security measures |
US20150319294A1 (en) * | 2014-05-05 | 2015-11-05 | Apple Inc. | Fingerprint activation of a panic mode of operation for a mobile device |
CN105989392A (en) * | 2015-02-13 | 2016-10-05 | 中国科学院信息工程研究所 | Mobile storage system, access control method thereof and manufacturing method thereof |
US20170372087A1 (en) * | 2016-06-28 | 2017-12-28 | Line Corporation | Method and system for data management |
CN106897635A (en) * | 2017-02-28 | 2017-06-27 | 广东虹勤通讯技术有限公司 | Movable memory equipment and its operating method |
CN107743131A (en) * | 2017-11-20 | 2018-02-27 | 张博 | A kind of identity identifying method and device based on a variety of different types input composite sequence |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10785241B2 (en) | URL attack detection method and apparatus, and electronic device | |
RU2676947C2 (en) | Device and method of increasing security of terminal | |
CN109299135A (en) | Abnormal inquiry recognition methods, identification equipment and medium based on identification model | |
CN105787324A (en) | Computer information security system | |
CN104836781A (en) | Method distinguishing identities of access users, and device | |
CN106098069B (en) | Identity authentication method and terminal equipment | |
US10083194B2 (en) | Process for obtaining candidate data from a remote storage server for comparison to a data to be identified | |
WO2017020387A1 (en) | Method and terminal equipment for entering different system through fingerprint identification | |
CN110175475B (en) | Smart card data processing method and device and computer readable storage medium | |
CN112416895A (en) | Database information processing method and device, readable storage medium and electronic equipment | |
CN109766215B (en) | Data processing method and device | |
CN113254994A (en) | Database access method and device, storage medium and computer equipment | |
KR101363668B1 (en) | Apparatus and method for authentication user using captcha | |
CN109284590B (en) | Method, equipment, storage medium and device for access behavior security protection | |
CN113535823B (en) | Abnormal access behavior detection method and device and electronic equipment | |
CN111090616B (en) | File management method, corresponding device, equipment and storage medium | |
WO2016112712A1 (en) | Secure access method, apparatus, and terminal, storage medium | |
CN106098070B (en) | identity authentication method and network system | |
CN106130968B (en) | A kind of identity identifying method and system | |
CN110826113A (en) | Data secure storage method and device | |
CN113032755B (en) | Nuclear power equipment operator verification method, device, equipment and storage medium | |
CN103942293A (en) | Self-destroying protection method based on malicious invasion of file system and device thereof | |
CN105306496B (en) | User identity detection method and system | |
WO2017028609A1 (en) | Method and apparatus for displaying terminal information | |
CN110633585A (en) | Hard disk locking and unlocking method, device, equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20200221 |