CN110826113A - Data secure storage method and device - Google Patents

Data secure storage method and device Download PDF

Info

Publication number
CN110826113A
CN110826113A CN201810903926.XA CN201810903926A CN110826113A CN 110826113 A CN110826113 A CN 110826113A CN 201810903926 A CN201810903926 A CN 201810903926A CN 110826113 A CN110826113 A CN 110826113A
Authority
CN
China
Prior art keywords
data
password
storage device
data storage
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810903926.XA
Other languages
Chinese (zh)
Inventor
王强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Purplelec Technology Ltd
Original Assignee
Shenzhen Purplelec Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Purplelec Technology Ltd filed Critical Shenzhen Purplelec Technology Ltd
Priority to CN201810903926.XA priority Critical patent/CN110826113A/en
Publication of CN110826113A publication Critical patent/CN110826113A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data safety storage method and a device, wherein the method comprises the steps of obtaining partition information for representing an internal partition of a data storage device, wherein the partition is used for storing data in a partition mode in the data storage device; acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage device; acquiring a real-time processing password according to a data processing request triggered by an external object; judging whether the real-time processing password is legal or not; and if the real-time processing password is legal, outputting an identification signal for identifying the processing of the data in the data storage equipment. The scheme disclosed by the invention can improve the safety factor of the data in the data storage device, and process the data in the storage device or the data driver according to the password provided by the device holder.

Description

Data secure storage method and device
Technical Field
The invention belongs to the technical field of data security, and particularly relates to a data security storage method and device.
Background
With the advent of the information society and the continuous development of network technology, various digital data can be stored in a storage device or a data drive, and the requirements for security and confidentiality of information in the storage device or the data drive are higher and higher. In the prior art, the most common data security method is to encrypt a data area in a storage device or a data drive, and to keep secret for information in the storage device or the data drive through a login user name and a password, so as to protect the security of the information in the storage device or the data drive.
However, in the prior art, all data stored in the storage device or the data driver can be extracted by one password, so that when the storage device or the data driver is lost or invaded by others, the decryption and cracking cost is low, and the information in the storage device or the data driver can be easily acquired; furthermore, when a storage device or data drive holder is forced to have to retrieve data from the device, the storage device or data drive is unable to modify and/or delete the data stored within the storage device or data drive according to the password entered by the device holder, resulting in data leakage.
Therefore, how to process the data in the storage device or the data drive according to the password provided by the device holder becomes an urgent technical problem to be solved.
Disclosure of Invention
The technical problem to be solved by the invention is how to process data in a storage device or a data drive according to a password provided by a device holder.
Therefore, according to a first aspect, an embodiment of the present invention discloses a data secure storage method, which is applicable to a data storage device, and includes: obtaining partition information for representing an internal partition of the data storage device, wherein the partition is used for storing data in the data storage device in a partition mode; acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage device; acquiring a real-time processing password according to a data processing request triggered by an external object; judging whether the real-time processing password is legal or not; and if the real-time processing password is legal, outputting an identification signal for identifying the processing of the data in the data storage equipment.
Optionally, the method further comprises: the partition information is reset in response to a reset request triggered by an external object.
Optionally, the preset processing password comprises one or any combination of a preset extraction password, a preset modification password, a preset deletion password and a preset reset password.
Optionally, outputting an identification signal for identifying processing of data in the data storage device comprises: outputting an extraction signal for identifying extraction of data within the data storage device; outputting a deletion signal for identifying deletion of data in the data storage device; a modification signal is output identifying the deletion and rewriting of data within the data storage device.
According to a second aspect, an embodiment of the present invention provides a data security storage apparatus, which is suitable for a data storage device, and includes: the data storage device comprises a partition information module, a partition information module and a partition management module, wherein the partition information module is used for acquiring partition information for representing an internal partition of the data storage device, and the partition is used for storing data in a partition mode in the data storage device; the password presetting module is used for acquiring a preset processing password according to the partition information, and the preset processing password is used for processing data in the data storage device; the real-time password module is used for acquiring a real-time processing password according to a data processing request triggered by an external object; the password judgment module is used for judging whether the real-time processing password is legal or not; and the identification signal module is used for outputting an identification signal for identifying and processing the data in the data storage equipment if the real-time processing password is legal.
Optionally, the method further comprises: and the partition resetting module is used for resetting the partition information in response to a resetting request triggered by an external object.
Optionally, the preset processing password comprises one or any combination of a preset extraction password, a preset modification password, a preset deletion password and a preset reset password.
Optionally, the identification signal module comprises: the extraction signal unit is used for outputting an extraction signal used for identifying the extraction of the data in the data storage device; a deletion signal unit for outputting a deletion signal for identifying deletion of data in the data storage device; and the modification signal unit is used for outputting a modification signal for identifying deletion and rewriting of the data in the data storage device.
According to a third aspect, the present invention provides a computer apparatus comprising a processor for executing a computer program stored in a memory to implement the method of any of the first aspects above.
According to a fourth aspect, the present invention provides a computer readable storage medium having stored thereon a computer program, a processor being adapted to execute the computer program stored in the storage medium to implement the method of any of the first aspects described above.
The invention has the beneficial effects that:
the embodiment of the invention discloses a data security storage method and a data security storage device, which are characterized in that partition information of output data storage equipment is obtained, a preset processing password is obtained according to the partition information, a real-time processing password is obtained according to a data processing request triggered by an external object, whether the real-time processing password is legal or not is judged, and if the real-time processing password is legal, an identification signal for identifying data in the data storage equipment for processing is output. Compared with the scheme of directly storing all data in one data storage device in the prior art, the scheme disclosed by the embodiment of the invention can store the data in the data storage device in a partition mode, sets the corresponding preset processing password aiming at the partition in the data storage device, can process the data in the corresponding partition only when the real-time processing password is legal, increases the cost of an unauthorized user for invading the data storage device, and can process the data in the data storage device according to the real-time processing password provided by the user.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a method for securely storing data according to an embodiment of the present invention; fig. 2 is a schematic structural diagram of a data storage device according to an embodiment of the invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to process data in a storage device or a data drive according to a password provided by a device holder, the present invention provides a data security storage method, which is suitable for a data storage device, and please refer to fig. 1, which is a flowchart of the data security storage method disclosed in this embodiment, where the data security storage method includes: step S101, obtaining partition information for representing the internal partition of the data storage device.
In particular embodiments, the data storage device may be a usb disk, a mobile phone memory, or other form of data drive.
In this embodiment, a plurality of partitions or regions are pre-configured in the data storage device, and the partitions are used for storing data in the data storage device in a partitioned manner. The data storage device obtains partition information inside the data storage device, wherein the partition information includes information such as the number of partitions inside the data storage device, and the capacity of each partition inside the data storage device. And step S102, acquiring a preset processing password according to the partition information.
In a particular embodiment, the preset processing password is used for processing data in the data storage device. The preset processing password includes: a preset extraction password, a preset modification password, a preset deletion password and a preset reset password. The preset processing password can be a numeric/English password or biometric data, such as: fingerprints, faces, irises, etc.
The user of the data storage device can enter the corresponding partition by using one preset processing password, can enter a plurality of partitions by using one preset processing password, and can extract, modify and delete the data in the partitions.
The data are stored in the data storage device in a partitioned mode, and the corresponding preset processing password is set for each partition, so that compared with the prior art that the data are all stored in one partition of the data storage device, the difficulty that an unauthorized user invades the data storage device can be increased by storing multiple kinds of data in the data storage device in the partitioned mode, the safety factor of the data storage device is further improved, and the protection of the data stored in the data storage device is enhanced.
Step S103, acquiring a real-time processing password according to a data processing request triggered by an external object.
In a particular embodiment, processing the password in real-time includes: extracting the password in real time, modifying the password in real time, deleting the password in real time, and resetting the password in real time. The real-time processing password can be a digital/English password or biological characteristic data, such as: fingerprints, faces, irises, etc.
When a user of the data storage device needs to process data in the data storage device, the data storage device acquires a real-time processing password provided by the user according to a data processing request triggered by an external object. The real-time password processing mode provided by the user can be manual input, automatic acquisition through the data storage device, or other modes which can enable the data storage device to obtain the real-time password processing mode.
And step S104, judging whether the real-time processing password is legal.
In a specific embodiment, determining whether the real-time processing password is legal comprises: comparing the real-time processing password with a preset processing password; and when the real-time processing password is compared with the preset processing password to be consistent, outputting an identification signal that the real-time processing password is legal.
The data storage equipment compares the acquired real-time processing password with a preset processing password, and by taking face recognition as an example, similarity scores in the acquired face features and the face features stored in the data storage equipment in advance are calculated, if the maximum value of the similarity scores is larger than a preset threshold value, the recognition is successful, and the real-time processing password is judged to be legal; if the maximum value of the similarity score is not greater than the preset threshold value, the recognition is failed, and the real-time password processing is judged to be illegal.
Step S105, if the real-time processing password is legal, outputting an identification signal for identifying the data in the data storage device to be processed.
And if the real-time processing password is judged to be legal, outputting corresponding identification signals according to different data processing requests triggered by the user, wherein the identification signals are used for representing and processing data in the data storage equipment. Wherein outputting an identification signal identifying processing of data within the data storage device comprises: outputting an extraction signal for identifying extraction of data within the data storage device; outputting a deletion signal for identifying deletion of data in the data storage device; a modification signal is output identifying the deletion and rewriting of data within the data storage device.
In a specific implementation process, if a data extraction request is triggered by a user, outputting an extraction signal for identifying and extracting data in a data storage device after judging that a real-time processing password is legal, and presenting the data stored in a partition corresponding to the real-time processing password to the user by the data storage device according to the extraction signal; if the user triggers a data deletion request, outputting a deletion signal for identifying deletion of data in the data storage device after judging that the real-time processing password is legal, and deleting the data stored in the partition corresponding to the real-time processing password by the data storage device according to the deletion signal; if the user triggers a data modification request, outputting a modification signal for identifying deletion and rewriting of data in the data storage device after judging that the real-time processing password is legal, deleting and rewriting the data stored in the partition corresponding to the real-time processing password by the data storage device according to the modification signal, and presenting the rewritten false data to the user.
When the data storage device deletes and rewrites the data stored in the corresponding partition according to the modification signal, the rewritten data may be that a part of the file name in the partition is reserved, and only the data stored in the partition is changing randomly, so as to obtain the dummy data. The rewritten data may also be a set of replacement data stored in the data storage device in advance, and when the data storage device deletes and rewrites the data stored in the corresponding partition according to the modification signal, the replacement data is used to directly replace the data in the data storage device that needs to be rewritten.
In addition, in a specific embodiment, the data security storage method may further include: the partition information is reset in response to a reset request triggered by an external object. After the user purchases the data storage device, the data storage device may reset some or all of the partitions within the data storage device according to a reset request triggered by the user. In addition, the information of the total capacity, the number of partitions, the partition capacity and the like in the data storage device cannot be reset or is always in a hidden state so as to better protect the secret.
The embodiment also discloses a data security storage apparatus, which is suitable for a data storage device, please refer to fig. 2, which is a schematic structural diagram of the data security storage apparatus, and the data security storage apparatus includes:
a partition information module 201, configured to obtain partition information used to represent an internal partition of a data storage device, where the partition is used to store data in a partitioned manner in the data storage device; the password presetting module 202 is used for acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage device; the real-time password module 203 is used for acquiring a real-time processing password according to a data processing request triggered by an external object; a password judgment module 204, configured to judge whether the real-time processing password is legal; an identification signal module 205, configured to output an identification signal for identifying processing of data in the data storage device if the real-time processing password is legal; a partition resetting module 206, configured to reset the partition information in response to a reset request triggered by an external object.
In a particular embodiment, the identification signal module 205 includes: the extraction signal unit is used for outputting an extraction signal used for identifying the extraction of the data in the data storage device; a deletion signal unit for outputting a deletion signal for identifying deletion of data in the data storage device; and the modification signal unit is used for outputting a modification signal for identifying deletion and rewriting of the data in the data storage device.
In addition, an embodiment of the present invention further provides a computer apparatus, where a processor executes the computer instructions, so as to implement the following method: obtaining partition information for representing an internal partition of the data storage device, wherein the partition is used for storing data in the data storage device in a partition mode; acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage device; acquiring a real-time processing password according to a data processing request triggered by an external object; judging whether the real-time processing password is legal or not; and if the real-time processing password is legal, outputting an identification signal for identifying the processing of the data in the data storage equipment.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like. The computer processor is used to execute a computer program stored in a storage medium to implement the following method: obtaining partition information for representing an internal partition of the data storage device, wherein the partition is used for storing data in the data storage device in a partition mode; acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage device; acquiring a real-time processing password according to a data processing request triggered by an external object; judging whether the real-time processing password is legal or not; and if the real-time processing password is legal, outputting an identification signal for identifying the processing of the data in the data storage equipment.
The foregoing is merely an example of the present invention and common general knowledge of known specific structures and features of the embodiments is not described herein in any greater detail. It should be noted that variations and modifications can be made by those skilled in the art without departing from the structure of the present invention. These should also be construed as the scope of the present invention, and they should not be construed as affecting the effectiveness of the practice of the present invention or the applicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (10)

1. A data security storage method is suitable for data storage equipment, and is characterized by comprising the following steps:
obtaining partition information for characterizing a partition within a data storage device, the partition being for storing data in the data storage device;
acquiring a preset processing password according to the partition information, wherein the preset processing password is used for processing data in the data storage equipment;
acquiring a real-time processing password according to a data processing request triggered by an external object;
judging whether the real-time processing password is legal or not;
and if the real-time processing password is legal, outputting an identification signal for identifying and processing the data in the data storage equipment.
2. The method for secure storage of data according to claim 1, further comprising:
resetting the partition information in response to a reset request triggered by an external object.
3. The method for securely storing data according to claim 2, wherein the preset processing password comprises one or any combination of a preset extraction password, a preset modification password, a preset deletion password and a preset reset password.
4. A method for the secure storage of data as claimed in claim 2 or 3, wherein said outputting an identification signal identifying the processing of data within said data storage device comprises:
outputting an extraction signal for identifying extraction of data within the data storage device;
outputting a deletion signal for identifying deletion of data in the data storage device;
and outputting a modification signal for identifying deletion and rewriting of data in the data storage device.
5. A data security storage apparatus adapted for use with a data storage device, comprising:
the data storage device comprises a partition information module, a partition information module and a partition information module, wherein the partition information module is used for acquiring partition information for representing an internal partition of the data storage device, and the partition is used for storing data in a partition mode in the data storage device;
the preset password module is used for acquiring a preset processing password according to the partition information, and the preset processing password is used for processing data in the data storage device;
the real-time password module is used for acquiring a real-time processing password according to a data processing request triggered by an external object;
the password judgment module is used for judging whether the real-time processing password is legal or not;
and the identification signal module is used for outputting an identification signal for identifying and processing the data in the data storage equipment if the real-time processing password is legal.
6. The data security storage device of claim 5, further comprising:
and the partition resetting module is used for resetting the partition information in response to a resetting request triggered by an external object.
7. The data security storage device of claim 6, further comprising: the preset processing password comprises one or any combination of a preset extraction password, a preset modification password, a preset deletion password and a preset reset password.
8. The data security storage device of claim 6 or 7, wherein the identification signal module comprises:
the extraction signal unit is used for outputting an extraction signal used for identifying the extraction of the data in the data storage device;
a deletion signal unit for outputting a deletion signal for identifying deletion of data in the data storage device;
and the modification signal unit is used for outputting a modification signal for identifying deletion and rewriting of the data in the data storage device.
9. A computer arrangement comprising a processor for executing a computer program stored in a memory to implement the method of any of claims 1-4.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that a processor is adapted to execute the computer program stored in the storage medium to implement the method according to any of claims 1-4.
CN201810903926.XA 2018-08-09 2018-08-09 Data secure storage method and device Pending CN110826113A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810903926.XA CN110826113A (en) 2018-08-09 2018-08-09 Data secure storage method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810903926.XA CN110826113A (en) 2018-08-09 2018-08-09 Data secure storage method and device

Publications (1)

Publication Number Publication Date
CN110826113A true CN110826113A (en) 2020-02-21

Family

ID=69540933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810903926.XA Pending CN110826113A (en) 2018-08-09 2018-08-09 Data secure storage method and device

Country Status (1)

Country Link
CN (1) CN110826113A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102096641A (en) * 2010-12-13 2011-06-15 沈晖 Double-factor shadow password protection method for mobile storage medium data safety
US20110307724A1 (en) * 2008-05-23 2011-12-15 Norman Shaw Secure storage device
CN103279431A (en) * 2013-05-23 2013-09-04 青岛海信宽带多媒体技术有限公司 Access method for kinds of permissions of memorizer
CN103688269A (en) * 2011-07-18 2014-03-26 惠普发展公司,有限责任合伙企业 Cryptographic information association to memory regions
US20150319294A1 (en) * 2014-05-05 2015-11-05 Apple Inc. Fingerprint activation of a panic mode of operation for a mobile device
US9218474B1 (en) * 2014-01-13 2015-12-22 Amazon Technologies, Inc. Enhanced biometric security measures
CN105989392A (en) * 2015-02-13 2016-10-05 中国科学院信息工程研究所 Mobile storage system, access control method thereof and manufacturing method thereof
CN106897635A (en) * 2017-02-28 2017-06-27 广东虹勤通讯技术有限公司 Movable memory equipment and its operating method
US9846784B1 (en) * 2013-02-26 2017-12-19 Rockwell Collins, Inc. Multi-level storage system and method
US20170372087A1 (en) * 2016-06-28 2017-12-28 Line Corporation Method and system for data management
CN107743131A (en) * 2017-11-20 2018-02-27 张博 A kind of identity identifying method and device based on a variety of different types input composite sequence

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110307724A1 (en) * 2008-05-23 2011-12-15 Norman Shaw Secure storage device
CN102096641A (en) * 2010-12-13 2011-06-15 沈晖 Double-factor shadow password protection method for mobile storage medium data safety
CN103688269A (en) * 2011-07-18 2014-03-26 惠普发展公司,有限责任合伙企业 Cryptographic information association to memory regions
US9846784B1 (en) * 2013-02-26 2017-12-19 Rockwell Collins, Inc. Multi-level storage system and method
CN103279431A (en) * 2013-05-23 2013-09-04 青岛海信宽带多媒体技术有限公司 Access method for kinds of permissions of memorizer
US9218474B1 (en) * 2014-01-13 2015-12-22 Amazon Technologies, Inc. Enhanced biometric security measures
US20150319294A1 (en) * 2014-05-05 2015-11-05 Apple Inc. Fingerprint activation of a panic mode of operation for a mobile device
CN105989392A (en) * 2015-02-13 2016-10-05 中国科学院信息工程研究所 Mobile storage system, access control method thereof and manufacturing method thereof
US20170372087A1 (en) * 2016-06-28 2017-12-28 Line Corporation Method and system for data management
CN106897635A (en) * 2017-02-28 2017-06-27 广东虹勤通讯技术有限公司 Movable memory equipment and its operating method
CN107743131A (en) * 2017-11-20 2018-02-27 张博 A kind of identity identifying method and device based on a variety of different types input composite sequence

Similar Documents

Publication Publication Date Title
US10785241B2 (en) URL attack detection method and apparatus, and electronic device
RU2676947C2 (en) Device and method of increasing security of terminal
CN109299135A (en) Abnormal inquiry recognition methods, identification equipment and medium based on identification model
CN105787324A (en) Computer information security system
CN104836781A (en) Method distinguishing identities of access users, and device
CN106098069B (en) Identity authentication method and terminal equipment
US10083194B2 (en) Process for obtaining candidate data from a remote storage server for comparison to a data to be identified
WO2017020387A1 (en) Method and terminal equipment for entering different system through fingerprint identification
CN110175475B (en) Smart card data processing method and device and computer readable storage medium
CN112416895A (en) Database information processing method and device, readable storage medium and electronic equipment
CN109766215B (en) Data processing method and device
CN113254994A (en) Database access method and device, storage medium and computer equipment
KR101363668B1 (en) Apparatus and method for authentication user using captcha
CN109284590B (en) Method, equipment, storage medium and device for access behavior security protection
CN113535823B (en) Abnormal access behavior detection method and device and electronic equipment
CN111090616B (en) File management method, corresponding device, equipment and storage medium
WO2016112712A1 (en) Secure access method, apparatus, and terminal, storage medium
CN106098070B (en) identity authentication method and network system
CN106130968B (en) A kind of identity identifying method and system
CN110826113A (en) Data secure storage method and device
CN113032755B (en) Nuclear power equipment operator verification method, device, equipment and storage medium
CN103942293A (en) Self-destroying protection method based on malicious invasion of file system and device thereof
CN105306496B (en) User identity detection method and system
WO2017028609A1 (en) Method and apparatus for displaying terminal information
CN110633585A (en) Hard disk locking and unlocking method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200221