CN110909385B - Safety management method for storage data in esim card - Google Patents

Safety management method for storage data in esim card Download PDF

Info

Publication number
CN110909385B
CN110909385B CN201911137155.9A CN201911137155A CN110909385B CN 110909385 B CN110909385 B CN 110909385B CN 201911137155 A CN201911137155 A CN 201911137155A CN 110909385 B CN110909385 B CN 110909385B
Authority
CN
China
Prior art keywords
data
sequence
row
array
data file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911137155.9A
Other languages
Chinese (zh)
Other versions
CN110909385A (en
Inventor
钱京
崔可
尤洪松
梁宇
何碧波
底明辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengbao Co Ltd
Original Assignee
Hengbao Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hengbao Co Ltd filed Critical Hengbao Co Ltd
Priority to CN201911137155.9A priority Critical patent/CN110909385B/en
Publication of CN110909385A publication Critical patent/CN110909385A/en
Application granted granted Critical
Publication of CN110909385B publication Critical patent/CN110909385B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0623Securing storage systems in relation to content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data

Abstract

The invention relates to a safety management system for data stored in an esim card, which comprises the following components: the device comprises a request module, a data segmentation module, a write-in module, an additional sequence generation module and a data recovery module; the system divides a current required data file into first data and second data, respectively writes a first data sequence and a second data sequence into a storage array where the current required data file is located according to preset conditions, and then writes an additional sequence into the array according to the sequence and the residual length in each row. A safety management method for the data stored in the esim card is also provided. The system protects the data content, improves the data security, simultaneously enables the recovery data to have certain basis, and ensures the data reading and recovery speed.

Description

Safety management method for storage data in esim card
Technical Field
The invention relates to the field of data security, in particular to a security management method for data stored in an esim card.
Background
The mobile phone has become more and more popular as a tool frequently used in daily life, various functions are provided to the mobile phone by the development of scientific technology, and the capacity of the mobile phone for storing data is increased. Among these data are many information that needs to be kept secret from someone other than the user of the mobile phone. The mobile phone is frequently lost due to the portability of the mobile phone, and the detachability of the data storage card brings great potential safety hazard to the data of a user. With the popularization of smart phones and the popularization of mobile internet, hackers steal user data by trojan horses, viruses and other methods and also bring great threats to the data security of users.
In the prior art, the cache data in the cache is stored in a line-by-line sequence, and a plurality of data are cached in a front-back sequence, if the important information in the cache is easily read according to the rule.
Disclosure of Invention
This section provides a general summary of the disclosure, and is not a comprehensive disclosure of its full scope or all of its features.
The purpose of the present disclosure is to provide a security management system for data stored in an esim card, which includes: the device comprises a request module, a data segmentation module, a write-in module, an additional sequence generation module and a data recovery module;
the request module is used for receiving a user data downloading instruction, generating data downloading request information by combining an authentication parameter KI code of the esim card and sending the request information to a corresponding target server;
the data segmentation module is used for receiving a current required data file and a historical data file sent by a target server according to a current request data identifier, and dividing the current required data file into first data and second data according to each parameter identifier in the current required data file;
the writing module is used for respectively writing the first data sequence and the second data sequence into a data array where the currently required data file is located according to preset conditions;
the additional sequence generating module is used for intercepting data sequences with corresponding lengths from the acquired historical data file according to the length of the remaining positions in every other row in the data array in sequence, and then generating additional sequences by using the intercepted data sequences;
the writing module is further configured to write the additional sequences into the array according to the sequence and the remaining length in each row, corresponding to the remaining positions in each other row in the array, of each segment sequence in the additional sequences;
and the data recovery module is used for removing the additional sequence when reading the data and recovering the first data and the second data into a complete data file required by the user currently according to the previous storage mode.
Preferably, the request module is further specifically configured to generate a current data file download request according to the current request data identifier, synthesize the current data file download request and the recent historical data download request into a data download request, and then send the data download request to the target server according to the target server identifier.
Preferably, the current request data identifier includes a data file name or other one or more parameter combinations; the target server identification comprises a server IP address and a server name.
Preferably, the length of the first or second data sequence in each row in the array is equally distributed according to the size of the actual data file or the total length of each sequence, so as to ensure that the sequence length of each storage row is the same and the content proportion of each row is the same.
Preferably, the writing module writes the additional sequence of each segment in sequence according to the remaining positions in every other row in the array, and finally generates a complete data array including the first data sequence, the second data sequence, and the additional sequence.
The invention also provides a safety management method for the stored data in the esim card, which specifically comprises the following steps:
(1) receiving a user data downloading instruction, generating data downloading request information by combining an authentication parameter KI code of the esim card, and then sending the request information to a corresponding target server;
(2) receiving a current required data file sent by a target server according to a current request data identifier, receiving a historical data file sent by the target server, and dividing the current required data file into first data and second data according to each parameter identifier in the current required data file;
(3) respectively writing the first data sequence and the second data sequence into a data array where a currently required data file is located according to preset conditions;
(4) intercepting data sequences with corresponding lengths from the acquired historical data file according to the length of the rest positions in every other row in the data array in sequence, and then generating additional sequences by utilizing the intercepted data sequences;
(5) writing each segmented sequence in the additional sequence into the array according to the sequence and the remaining length in each row corresponding to the remaining positions in each other row in the array;
(6) when the data is read, the additional sequence is removed, and the first data and the second data are restored into a complete data file currently required by the user according to the previous storage mode.
Has the advantages that: for important data, when it is not known which sequences are additional sequences or the combination rule of the first data, the complete first data cannot be obtained after being stolen, and the data content is protected. Moreover, the data safety is improved, meanwhile, the data recovery has certain basis, and the data reading and recovery speed is ensured.
Further areas of applicability will become apparent from the description provided herein. The description and specific examples in this summary are intended for purposes of illustration only and are not intended to limit the scope of the present disclosure.
Drawings
The drawings described herein are for illustrative purposes only of selected embodiments and not all possible implementations, and are not intended to limit the scope of the present disclosure. In the drawings:
FIG. 1 is a schematic diagram of a security management system for data stored in an esim card;
FIG. 2 is a flow chart of a method for secure management of data stored in an esim card.
While the disclosure is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the disclosure to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosure. It is noted that throughout the several views, corresponding reference numerals indicate corresponding parts.
Detailed Description
Examples of the present disclosure will now be described more fully with reference to the accompanying drawings. The following description is merely exemplary in nature and is not intended to limit the present disclosure, application, or uses.
Example embodiments are provided so that this disclosure will be thorough, and will fully convey the scope to those skilled in the art. Numerous specific details are set forth such as examples of specific components, devices, and methods to provide a thorough understanding of embodiments of the present disclosure. It will be apparent to those skilled in the art that specific details need not be employed, that example embodiments may be embodied in many different forms and that neither should be construed to limit the scope of the disclosure. In certain example embodiments, well-known processes, well-known structures, and well-known technologies are not described in detail.
The technical problems posed by the present disclosure will be explained in detail below. It is to be noted that this technical problem is merely exemplary and is not intended to limit the application of the present invention.
As shown in FIG. 1, the invention provides a security management system for data stored in an esim card, which comprises: the device comprises a request module, a data segmentation module, a writing module, an additional sequence generation module and a data recovery module.
Wherein the content of the first and second substances,
and the request module is used for receiving a user data downloading instruction, generating data downloading request information by combining the authentication parameter KI code of the esim card and sending the request information to the corresponding target server.
The data downloading instruction comprises a current request data identifier, a user account, a target server identifier and the like;
the request module is specifically used for generating a recent historical data downloading request according to a user account and an esim card authentication parameter KI code, namely acquiring a part of data file downloaded last time from the target server aiming at the user, or acquiring the part of data file downloaded last time from the target server aiming at the esim card. The partial data file size is equal to or smaller than the data file size of the current request.
And if the request module can not acquire the last downloaded data aiming at the user or the esim card, requesting the target server to generate a part of data file according to the name or the size of the currently requested data file. The partial data file serves as a history data file.
The request module is further specifically configured to generate a current data file download request according to the current request data identifier, combine the current data file download request and the recent historical data download request into a data download request, and then send the data download request to the target server according to the target server identifier.
The current request data identification comprises a data file name or other one or more parameters, such as file size, format, and the like.
The target server identification comprises a server IP address, a server name and the like.
The data segmentation module is used for receiving a current required data file sent by a target server according to a current request data identifier, receiving a historical data file sent by the target server, and dividing the current required data file into first data and second data according to each parameter identifier in the current required data file.
The first data is important data, namely data content which is encrypted or related to privacy or marked as important in a data file currently required by a user; the second data is common data, that is, data content related to identification parameters such as file time, format, name, size and the like or marked as being publicable in the data file currently required by the user.
The data segmentation module is specifically configured to receive a currently required data file, and extract a plurality of parameter identifiers therein, such as encryption information, tag information, or a file format. And then, the data segmentation module segments the currently required data file into a first data sequence and a second data sequence according to the parameter identification. The first and second data sequences constitute a completed data file currently required by the user.
And the writing module is used for respectively writing the first data sequence and the second data sequence into the data array where the currently required data file is located according to preset conditions.
The writing module is specifically configured to divide the first data sequence and the second data sequence into a plurality of identical rows according to the length, and then perform a writing process, where the process satisfies two conditions: writing part of the first data sequence in each row and all the second data sequences in each row into the same row in every other row, so that every other row of the array comprises the first data and the second data; secondly, the remaining part of the first data sequence of the row is written into the next row comprising the first data and the second data row at intervals of the same size and ensuring that the row has a remaining position compared to the previous row.
The length of the first or second data sequence of each row in the array is evenly distributed according to the size of an actual data file or the total length of each sequence, so that the length of each storage row sequence is the same, and the content proportion of each row is the same.
For example: the total length of the first data sequence is 2000, which is divided into 10 rows, 200 each; the second data sequence has a total length of 700 and is divided into 10 rows, each row 70. If the first data of length 140 is written every other row, while the second data of length 70 is written, the total length of the row is 210, the remaining data of length 60 of the first data sequence is written in the next row, which needs to be the same length as the previous row, 150 remains. I.e. 10 lines of first data and second data lines in total, and 10 lines of first data and remaining position lines in total.
The additional sequence generating module is used for intercepting data sequences with corresponding lengths from the acquired historical data file according to the length of the remaining positions in every other row in the data array in sequence, and then the additional sequence generating module generates additional sequences by using a plurality of intercepted data sequences.
The additional sequence generation module is specifically configured to extract a historical data file sequence, and because the lengths of the remaining positions of every other row are the same, each segment sequence with the same length is sequentially read from the file sequence according to an interlaced sequence, and the number of the segment sequences is acquired at the same time. And then, the additional sequence generation module forms a complete additional sequence by the sequence of each segment sequence and the information of the number of the segments according to the acquisition sequence of each segment, and deletes the file sequence of the historical data.
For example: as described in the above example, the appended sequence generation module extracts a data sequence from the historical data file sequence according to the length of 150 every other line with the remaining length of 150. And aiming at the 10 rows of residual positions, the additional sequence generation module sequentially extracts 10 data sequences with the length of 150 bits and combines the 10 data sequences with the parameter 10 to generate a complete additional sequence with the length of 150+1 bits.
The writing module is further configured to write the additional sequence into the array according to the sequence and the remaining length in each row, corresponding to the remaining positions in each other row in the array.
That is, the writing module sequentially writes the additional sequence of each segment according to the remaining positions in every other row in the array, and finally generates a complete data array including the first data sequence, the second data sequence and the additional sequence.
And the data recovery module is used for removing the additional sequence when reading the data and recovering the first data and the second data into a complete data file required by the user currently according to the previous storage mode.
Because the currently required data file is located in the storage array, the row header position of each of the first data sequence and the second data sequence is located in every other row of data rows, and the second data sequence is also stored in the array at intervals. Thus, the data recovery module can read the complete first and second data sequences according to the rules and headers.
The method specifically comprises the following steps: firstly, the data recovery module extracts the additional sequence and the number information of the segments, positions the position of the additional sequence in the first row of the array according to the content of the initial part sequence of the additional sequence, and deletes the segment content of the additional sequence in the row according to the position.
Subsequently, the data recovery module deletes all the additional sequence segments of the segment number at the same position every other row, so that the remaining array includes only the contents of the first data sequence and the second data sequence.
Then, the data recovery module reads the first data sequence from the first row of the array, switches to the next row starting position to continue reading the first data sequence when the position of the second data sequence row header in the row is reached, continues to switch to the next row when the position of the row header in the row is reached, and so on, namely, each row reads the position of the second data sequence row header or the position of the blank, switches to the next row to read until the reading of the last row of the first data sequence is finished. Thus, the data recovery module reads in the order of each line to obtain the complete first data sequence.
Again, the data recovery module starts reading from the second data sequence row header of each row until the end of the row and switches to the next row of the interval, also starting reading from the second data sequence row header, and so on until the end of the last row of the second data sequence reading. Thus, the data recovery module reads in the order of every other row to obtain the complete second data sequence.
And finally, the data recovery module combines the complete first data sequence and the complete second data sequence into a complete data file required by the user according to each parameter identifier in the current required data file.
In another case, if the stored data array is illegally stolen, the actual required data file cannot be restored because the storage rule and the additional sequence cannot be obtained. Reading is usually performed in a line-by-line sequential manner, a data file containing useless information such as an additional sequence is obtained, and important information cannot be acquired for uncertainty of positions of segments of the important data, so that the safety of the important data is protected.
As shown in fig. 2, the present invention provides a security management method for stored data in an esim card, which specifically includes:
1. and receiving a user data downloading instruction, generating data downloading request information by combining the authentication parameter KI code of the esim card, and then sending the request information to a corresponding target server.
The data downloading instruction comprises a current request data identifier, a user account, a target server identifier and the like;
and generating a recent historical data downloading request according to the user account and the authentication parameter KI code of the esim card, namely acquiring a part of data file downloaded last time from the target server aiming at the user, or acquiring the part of data file downloaded last time from the target server aiming at the esim card, wherein the size of the part of data file is equal to or smaller than that of the data file requested currently. And if the last downloaded data aiming at the user or the esim card cannot be acquired, requesting the target server to generate a partial data file according to the name or the size of the currently requested data file. The partial data file serves as a history data file.
And generating a current data file downloading request according to the current request data identifier, synthesizing the current data file downloading request and the latest historical data downloading request into a data downloading request, and then sending the data downloading request to a target server according to the target server identifier.
The current request data identification comprises a data file name or other one or more parameters, such as file size, format, and the like.
The target server identification comprises a server IP address, a server name and the like.
2. And receiving a current required data file and a historical data file sent by a target server according to the current request data identifier, and dividing the current required data file into first data and second data according to each parameter identifier in the current required data file.
The first data is important data, namely data content which is encrypted or related to privacy or marked as important in a data file currently required by a user;
the second data is common data, that is, data content related to identification parameters such as file time, format, name, size and the like or marked as being publicable in the data file currently required by the user.
After receiving the current required data file, extracting a plurality of parameter identifications, such as encryption information, marking information or file format, and dividing the current required data file into a first data sequence and a second data sequence according to the parameter identifications. The first and second data sequences constitute a completed data file currently required by the user.
3. And respectively writing the first data sequence and the second data sequence into the data array where the current required data file is located according to preset conditions.
The method specifically comprises the following steps: first, the first data sequence and the second data sequence are equally divided into a plurality of same rows according to the length, and then, a writing process is performed, wherein the process meets two conditions: writing a part of the first data sequence of each row and all second data sequences of each row into the same row in every other row, so that every other row of the array comprises the first data and the second data; secondly, the remaining part of the first data sequence of the row is written into the next row comprising the first data and the second data row at intervals of the same size and ensuring that the row has a remaining position compared to the previous row.
The length of the first or second data sequence of each row in the array is evenly distributed according to the size of an actual data file or the total length of each sequence, so that the length of each storage row sequence is the same, and the content proportion of each row is the same.
For example: the total length of the first data sequence is 2000, which is divided into 10 rows, 200 each; the second data sequence has a total length of 700 and is divided into 10 rows, each row 70. If the first data of length 140 is written every other row, while the second data of length 70 is written, the total length of the row is 210, the remaining data of length 60 of the first data sequence is written in the next row, which needs to be the same length as the previous row, 150 remains. I.e. 10 lines of first data and second data lines in total, and 10 lines of first data and remaining position lines in total.
4. And intercepting data sequences with corresponding lengths from the acquired historical data file according to the length of the rest positions in every other row in the data array in sequence, and generating an additional sequence by utilizing the intercepted data sequences.
And extracting a historical data file sequence, and sequentially reading each segmented sequence with the same length from the file sequence according to an interlaced sequence because the lengths of the rest positions of every other line are the same, and simultaneously acquiring the number of the segmented sequences. And then, according to the acquisition sequence of each segment, forming a complete additional sequence by the sequence of each segment and the number information of the segments, and deleting the historical data file sequence.
For example: as in the example above, every other row is left of length 150, then the data sequence is extracted from the sequence of history data files at a length of 150. And sequentially extracting 10 data sequences with the length of 150 bits from the 10 rows of residual positions, and combining the 10 data sequences with the parameters 10 to generate a complete additional sequence with the length of 150+1 bits.
5. And writing the segmentation sequences in the additional sequence into the array according to the sequence and the residual length in each row corresponding to the residual positions in each other row in the array.
That is, the additional sequence of each segment is written in sequence according to the remaining positions in every other row in the array, and finally, a complete data array including the first data sequence, the second data sequence and the additional sequence is generated.
6. When the data is read, the additional sequence is removed, and the first data and the second data are restored into a complete data file currently required by the user according to the previous storage mode.
In the storage array where the currently required data file is located, the row header position of each of the first data sequence and the second data sequence is in the data row of every other row, and the second data sequence is also stored in the array at intervals. The complete first and second data sequences can be read according to the rules and headers described above.
The method specifically comprises the following steps: firstly, extracting the additional sequence and the segmentation number information, positioning the position of the additional sequence in the first row of the array according to the initial part sequence content of the additional sequence, and deleting the segmentation content of the additional sequence in the row according to the position.
Subsequently, every other row is deleted in the same position of all the segment-number additional sequence segments, so that the remaining array comprises only the contents of the first and second data sequences.
Then, the first data sequence is read from the first row of the array, when the position of the head of the second data sequence row in the row is reached, the first data sequence is switched to the next row starting position to continue reading the first data sequence, when the position of the blank position of the row is reached, the next row is switched to, and so on, namely, each row reads the head position or the blank position of the second data sequence row, the next row is switched to read, and the reading of the first data sequence in the last row is finished. Thus, reading in the order of each line, the complete first data sequence is obtained.
Again, the reading starts from the second data sequence row header for each row until the end of the row and switches to the next row of the interval, again starting from the second data sequence row header and so on until the end of the last row of the second data sequence reading. This results in a complete second data sequence, read in the order of every other row.
And finally, combining the complete first data sequence and the complete second data sequence into a complete data file required by the user according to each parameter identifier in the current required data file.
In another case, if the stored data array is illegally stolen, the actual required data file cannot be restored because the storage rule and the additional sequence cannot be obtained. Reading is usually performed in a line-by-line sequential manner, a data file containing useless information such as an additional sequence is obtained, and important information cannot be acquired for uncertainty of positions of segments of the important data, so that the safety of the important data is protected.
The preferred embodiments of the present disclosure are described above with reference to the drawings, but the present disclosure is of course not limited to the above examples. Various changes and modifications within the scope of the appended claims may be made by those skilled in the art, and it should be understood that these changes and modifications naturally will fall within the technical scope of the present disclosure.
For example, a plurality of functions included in one unit may be implemented by separate devices in the above embodiments. Alternatively, a plurality of functions implemented by a plurality of units in the above embodiments may be implemented by separate devices, respectively. In addition, one of the above functions may be implemented by a plurality of units. Needless to say, such a configuration is included in the technical scope of the present disclosure.
In this specification, the steps described in the flowcharts include not only the processing performed in time series in the described order but also the processing performed in parallel or individually without necessarily being performed in time series. Further, even in the steps processed in time series, needless to say, the order can be changed as appropriate.
Although the embodiments of the present disclosure have been described in detail with reference to the accompanying drawings, it should be understood that the above-described embodiments are merely illustrative of the present disclosure and do not constitute a limitation of the present disclosure. It will be apparent to those skilled in the art that various modifications and variations can be made in the above-described embodiments without departing from the spirit and scope of the disclosure. Accordingly, the scope of the disclosure is to be defined only by the claims appended hereto, and by their equivalents.

Claims (10)

1. A system for secure management of data stored in an esim card, the system comprising: the device comprises a request module, a data segmentation module, a write-in module, an additional sequence generation module and a data recovery module;
wherein the content of the first and second substances,
the request module is used for receiving a user data downloading instruction, generating data downloading request information by combining an authentication parameter KI code of the esim card and sending the request information to a corresponding target server;
the data segmentation module is used for receiving a current required data file and a historical data file sent by a target server according to a current request data identifier, and dividing the current required data file into first data and second data according to each parameter identifier in the current required data file;
the writing module is used for respectively writing the first data sequence and the second data sequence into a data array where the currently required data file is located according to preset conditions;
the writing module is specifically configured to divide the first data sequence and the second data sequence into a plurality of identical rows according to the length, and then perform a writing process, where the process satisfies two conditions: writing part of the first data sequence in each row and all the second data sequences in each row into the same row in every other row, so that every other row of the array comprises the first data and the second data; secondly, the rest part of the first data sequence of the row is written into the next row comprising the first data and the second data row according to the same size interval, and the row is ensured to have the rest position compared with the previous row;
the length of the first or second data sequence of each line in the array is evenly distributed according to the size of an actual data file or the total length of each sequence, the length of each storage line sequence is ensured to be the same, and the content proportion of each line is ensured to be the same;
the additional sequence generating module is used for intercepting data sequences with corresponding lengths from the acquired historical data file according to the length of the remaining positions in every other row in the data array in sequence, and then generating additional sequences by using the intercepted data sequences;
the writing module is further configured to write the additional sequences into the array according to the sequence and the remaining length in each row, corresponding to the remaining positions in each other row in the array, of each segment sequence in the additional sequences;
and the data recovery module is used for removing the additional sequence when reading the data and recovering the first data and the second data into a complete data file required by the user currently according to the previous storage mode.
2. The system according to claim 1, wherein the request module is further specifically configured to generate a current data file download request according to the current request data identifier, combine the current data file download request and the latest historical data download request into a data download request, and then send the data download request to the target server according to the target server identifier.
3. The system of claim 2, wherein the current request data identification comprises a data file name or other combination of one or more parameters; the target server identification comprises a server IP address and a server name.
4. The system of claim 1, wherein the length of the first or second data sequence in each row in the array is equally distributed according to the actual data file size or the total length of each sequence, so as to ensure that the length of each storage row sequence is the same and the content ratio of each row is the same.
5. The system of claim 1, wherein the write module sequentially writes the additional sequence for each segment according to remaining locations in every other row of the array, resulting in a complete data array comprising the first data sequence, the second data sequence, and the additional sequence.
6. A safety management method for data stored in an esim card specifically comprises the following steps:
(1) receiving a user data downloading instruction, generating data downloading request information by combining an authentication parameter KI code of the esim card, and then sending the request information to a corresponding target server;
(2) receiving a current required data file and a historical data file sent by a target server according to a current request data identifier, and dividing the current required data file into first data and second data according to each parameter identifier in the current required data file;
(3) respectively writing the first data sequence and the second data sequence into a data array where a currently required data file is located according to preset conditions;
the method specifically comprises the following steps: first, the first data sequence and the second data sequence are equally divided into a plurality of same rows according to the length, and then, a writing process is performed, wherein the process meets two conditions: writing part of the first data sequence in each row and all the second data sequences in each row into the same row in every other row, so that every other row of the array comprises the first data and the second data; secondly, the rest part of the first data sequence of the row is written into the next row comprising the first data and the second data row according to the same size interval, and the row is ensured to have the rest position compared with the previous row;
the length of the first or second data sequence of each line in the array is evenly distributed according to the size of an actual data file or the total length of each sequence, the length of each storage line sequence is ensured to be the same, and the content proportion of each line is ensured to be the same;
(4) intercepting data sequences with corresponding lengths from the acquired historical data file according to the length of the rest positions in every other row in the data array in sequence, and then generating additional sequences by utilizing the intercepted data sequences;
(5) writing each segmented sequence in the additional sequence into the array according to the sequence and the remaining length in each row corresponding to the remaining positions in each other row in the array;
(6) when the data is read, the additional sequence is removed, and the first data and the second data are restored into a complete data file currently required by the user according to the previous storage mode.
7. The method of claim 6, wherein the current data file download request is generated based on the current request data identifier, the current data file download request and the recent historical data download request are combined into a data download request, and the data download request is sent to the target server based on the target server identifier.
8. The method of claim 7, wherein the current request data identification comprises a data file name or other combination of one or more parameters; the target server identification comprises a server IP address and a server name.
9. The method of claim 6, wherein the length of the first or second data sequence in each row in the array is equally distributed according to the actual data file size or the total length of each sequence, so as to ensure that the length of each storage row sequence is the same and the content ratio of each row is the same.
10. The method of claim 6, wherein the additional sequence for each segment is written sequentially at every other position in the array remaining in the row to produce a complete data array comprising the first data sequence, the second data sequence, and the additional sequence.
CN201911137155.9A 2019-11-19 2019-11-19 Safety management method for storage data in esim card Active CN110909385B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911137155.9A CN110909385B (en) 2019-11-19 2019-11-19 Safety management method for storage data in esim card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911137155.9A CN110909385B (en) 2019-11-19 2019-11-19 Safety management method for storage data in esim card

Publications (2)

Publication Number Publication Date
CN110909385A CN110909385A (en) 2020-03-24
CN110909385B true CN110909385B (en) 2022-04-01

Family

ID=69818091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911137155.9A Active CN110909385B (en) 2019-11-19 2019-11-19 Safety management method for storage data in esim card

Country Status (1)

Country Link
CN (1) CN110909385B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607393A (en) * 2013-11-21 2014-02-26 浪潮电子信息产业股份有限公司 Data safety protection method based on data partitioning
CN105721148A (en) * 2016-04-12 2016-06-29 武汉优信众网科技有限公司 Data file encryption method and system based on double random numbers
DE102015001815A1 (en) * 2015-02-13 2016-08-18 Giesecke & Devrient Gmbh Subscriber identity module
CN110287715A (en) * 2019-06-25 2019-09-27 江苏恒宝智能系统技术有限公司 A kind of data cached safety management system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607393A (en) * 2013-11-21 2014-02-26 浪潮电子信息产业股份有限公司 Data safety protection method based on data partitioning
DE102015001815A1 (en) * 2015-02-13 2016-08-18 Giesecke & Devrient Gmbh Subscriber identity module
CN105721148A (en) * 2016-04-12 2016-06-29 武汉优信众网科技有限公司 Data file encryption method and system based on double random numbers
CN110287715A (en) * 2019-06-25 2019-09-27 江苏恒宝智能系统技术有限公司 A kind of data cached safety management system

Also Published As

Publication number Publication date
CN110909385A (en) 2020-03-24

Similar Documents

Publication Publication Date Title
CN110324143B (en) Data transmission method, electronic device and storage medium
CN107153794B (en) File encryption method and device and file decryption method and device
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN100464313C (en) Mobile memory device and method for accessing encrypted data in mobile memory device
CN102571950A (en) Media content providing and acquiring methods, server and user terminal
CN111262910A (en) Wireless equipment firmware protection method and system
CN111310222A (en) File encryption method
CN111414635A (en) File encryption and decryption method, device, equipment and storage medium
CN112883388A (en) File encryption method and device, storage medium and electronic device
CN111835505B (en) Activation code generation method and device and computer storage medium
CN111866864B (en) Method, device and storage medium for realizing encrypted storage and safe use management of cloud platform certificate based on wireless AP
CN110909385B (en) Safety management method for storage data in esim card
CN113542187A (en) File uploading and downloading method and device, computer device and medium
US8347113B2 (en) System and method for encrypting an electronic file in a mobile electronic device
CN114390317B (en) Encryption method and system for streaming video
JPWO2005038661A1 (en) Terminal authentication apparatus and method
CN107395616B (en) Method and system for safely processing data file
CN111506913B (en) Audio encryption method and device, storage medium and electronic device
CN110401941B (en) Cache data security management method in esim card
CN101841353B (en) Method and equipment for encrypting data through softdog
CN108182127B (en) Method for extracting deleted file fragments, terminal equipment and storage medium
CN114124469A (en) Data processing method, device and equipment
CN103337024A (en) Application software acquisition method, browser and application store server
CN106941473B (en) Encryption method and device
EP3355546A1 (en) Device identification encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 801, 8 / F, building 4a, international R & D headquarters park, 68 Olympic street, Jianye District, Nanjing City, Jiangsu Province 210019

Applicant after: JIANGSU HENGBAO INTELLIGENT SYSTEM TECHNOLOGY Co.,Ltd.

Address before: 212355 Hengtang Industrial Zone, Yunyang Town, Danyang City, Zhenjiang City, Jiangsu Province

Applicant before: JIANGSU HENGBAO INTELLIGENT SYSTEM TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220310

Address after: 212355 Hengtang Industrial Zone, Danyang City, Zhenjiang City, Jiangsu Province

Applicant after: HENGBAO Corp.

Address before: 801, 8 / F, building 4a, international R & D headquarters park, 68 Olympic street, Jianye District, Nanjing City, Jiangsu Province 210019

Applicant before: JIANGSU HENGBAO INTELLIGENT SYSTEM TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant