CN113347001A - Data protection method, server, system, device and medium - Google Patents

Data protection method, server, system, device and medium Download PDF

Info

Publication number
CN113347001A
CN113347001A CN202110602078.0A CN202110602078A CN113347001A CN 113347001 A CN113347001 A CN 113347001A CN 202110602078 A CN202110602078 A CN 202110602078A CN 113347001 A CN113347001 A CN 113347001A
Authority
CN
China
Prior art keywords
upgrade package
encryption
secret key
encrypted
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110602078.0A
Other languages
Chinese (zh)
Other versions
CN113347001B (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Zhongnuo Microelectronics Co ltd
Original Assignee
Guangzhou Zhono Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Zhono Electronic Technology Co ltd filed Critical Guangzhou Zhono Electronic Technology Co ltd
Priority to CN202110602078.0A priority Critical patent/CN113347001B/en
Publication of CN113347001A publication Critical patent/CN113347001A/en
Application granted granted Critical
Publication of CN113347001B publication Critical patent/CN113347001B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data protection method, a server, a system, equipment and a medium, wherein the method is applied to the server and comprises the following steps: responding to a downloading request of a client, taking the current downloading time as a timestamp, wherein the downloading request is used for requesting to download an upgrade package; processing the timestamp through a preset initial value to obtain an encryption parameter; encrypting the preset secret key through the encryption parameters to obtain a new secret key; encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package; the encrypted upgrade package is sent to the client, so that the technical problems that the existing upgrade package is easy to steal and tamper and has low safety are solved.

Description

Data protection method, server, system, device and medium
Technical Field
The present application relates to the field of data security technologies, and in particular, to a data protection method, a server, a system, a device, and a medium.
Background
An existing upgrade package of chip firmware and the like is generally stored in a server, and the upgrade package is downloaded locally by accessing the server to perform upgrade. The upgrade package of the current version in the server is usually unchanged in the upgrade process, the upgrade package of the current version downloaded each time is the same, and an attacker can obtain the content of the upgrade by comparing the upgrade package with the upgrade package of the last time, so that data is stolen or tampered, and the data security is low.
Disclosure of Invention
The application provides a data protection method, a server, a system, equipment and a medium, which are used for improving the technical problems that the existing upgrade container is easy to steal and tamper and has lower safety.
In view of this, a first aspect of the present application provides a data protection method applied to a server, the method including:
responding to a downloading request of a client, and taking the current downloading time as a timestamp, wherein the downloading request is used for requesting to download an upgrade package;
processing the timestamp through a preset initial value to obtain an encryption parameter;
encrypting the preset secret key through the encryption parameters to obtain a new secret key;
encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
and sending the encrypted upgrade package to the client.
Optionally, the processing the timestamp by a preset initial value to obtain an encryption parameter includes:
and carrying out XOR operation on the preset initial value and the time stamp to obtain an encryption parameter.
Optionally, the encrypting the upgrade package by using the new key to obtain an encrypted upgrade package includes:
and carrying out XOR operation on the new secret key and the upgrade package, and encrypting the upgrade package subjected to XOR operation through the preset secret key to obtain an encrypted upgrade package.
Optionally, the encrypting the upgrade package by using the new key to obtain an encrypted upgrade package includes:
partitioning the upgrade package to obtain N blocks of data, wherein N is an integer greater than 1;
when the ith is encrypted for 1 time, carrying out exclusive-or operation on the new secret key and the ith data block in the N data blocks, and carrying out encryption processing on the ith data block subjected to exclusive-or operation through the preset secret key to obtain an ith encrypted data block;
when the ith-1 encryption is carried out for i +1 times, carrying out exclusive OR operation on the ith encrypted data block and the ith data block in the N data blocks, and carrying out encryption processing on the ith data block subjected to the exclusive OR operation through the preset secret key to obtain an ith encrypted data block;
and (4) carrying out iterative encryption until i is equal to N, and obtaining an encryption upgrade package which comprises N encryption data blocks.
Optionally, the method further includes:
and when the server does not receive the downloading request in the target time period, taking the current time as a time stamp at every preset time interval, and encrypting the upgrading packet in the server based on the time stamp.
A second aspect of the present application provides a server comprising:
the response unit is used for responding to a downloading request of the client and taking the current downloading time as a timestamp, wherein the downloading request is used for requesting to download the upgrade package;
the processing unit is used for processing the timestamp through a preset initial value to obtain an encryption parameter;
the first encryption unit is used for encrypting the preset secret key through the encryption parameters to obtain a new secret key;
the second encryption unit is used for encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
and the sending unit is used for sending the encrypted upgrade package to the client.
Optionally, the method further includes:
and the third encryption unit is used for taking the current time as a time stamp at intervals of preset time when the server does not receive the downloading request in the target time period, and encrypting the upgrade package in the server based on the time stamp.
A third aspect of the present application provides a data protection system, comprising: a client and the server of any one of the second aspect;
the client is in communication connection with the server.
A fourth aspect of the present application provides a data protection device comprising a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the data protection method of any of the first aspect according to instructions in the program code.
A fifth aspect of the present application provides a computer-readable storage medium for storing program code for performing the data protection method of any one of the first aspects.
According to the technical scheme, the method has the following advantages:
the application provides a data protection method, which is applied to a server and comprises the following steps: responding to a downloading request of a client, taking the current downloading time as a timestamp, wherein the downloading request is used for requesting to download an upgrade package; processing the timestamp through a preset initial value to obtain an encryption parameter; encrypting the preset secret key through the encryption parameters to obtain a new secret key; encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package; and sending the encrypted upgrade package to the client.
According to the method and the device, when the server receives a downloading request of the client, the current downloading time is used as the timestamp to encrypt the upgrading packet, so that different encrypted upgrading packets are obtained at different downloading times, an attacker is prevented from obtaining upgrading contents of the upgrading packet through simple comparison, and data safety is improved; the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the upgrade package is not easy to crack, the data safety is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and the safety is low are solved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a data protection method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
The application provides a data protection method, a server, a system, equipment and a medium, which are used for improving the technical problems that the existing upgrade container is easy to steal and tamper and has lower safety.
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the embodiment of the application, it is considered that the upgrade package of the same version is fixed in the server, when a certain firmware is repeatedly upgraded, the upgrade package downloaded each time is the same (the version is unchanged), and when the upgrade package of the next version is released, an attacker can easily obtain the place where the two versions of the firmware are modified by comparing the upgrade package of the previous version with the upgrade package of the current version, so that the security of the firmware is not high.
In order to solve the problem that the upgrade package is easily stolen and tampered and has low security, referring to fig. 1, an embodiment of the present application provides a data protection method applied to a server, where the method includes:
step 101, responding to a downloading request of a client, taking the current downloading time as a timestamp, wherein the downloading request is used for requesting to download an upgrade package.
When a client initiates a downloading request for downloading the upgrade package to a server, the server acquires the current downloading time as a timestamp, wherein the current downloading time is the time when the client receives the downloading request or the time when the client initiates the downloading request.
And 102, processing the time stamp through a preset initial value to obtain an encryption parameter.
The preset initial value is a fixed value pre-stored in the server, and the time stamp is processed through the preset initial value so as to be disordered to obtain the encryption parameter. Specifically, an exclusive or operation is performed on a preset initial value and the timestamp to obtain an encryption parameter. It will be appreciated that other processing may be used.
And 103, encrypting the preset secret key through the encryption parameters to obtain a new secret key.
The preset key is a fixed value stored in the server in advance. The server can input the preset secret key and the encryption parameters into the existing encryption tool for encryption processing to obtain a new secret key.
According to the embodiment of the application, the timestamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, so that the situation that the encryption upgrading packet obtained by encrypting the upgrading packet through the timestamp is directly cracked easily is avoided, the cracking difficulty of the encryption upgrading packet is improved, and the data safety of the upgrading packet is guaranteed.
And step 104, encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package.
In an embodiment, the whole upgrade package may be encrypted by using the new key to obtain an encrypted upgrade package, specifically:
and carrying out XOR operation on the new secret key and the upgrade package, and encrypting the upgrade package subjected to the XOR operation by using a preset secret key to obtain an encrypted upgrade package.
In another embodiment, after the upgrade package is processed in blocks, each data block may be encrypted, specifically:
partitioning the upgrade package to obtain N blocks of data, wherein N is an integer greater than 1;
when the ith is encrypted for 1 time, carrying out XOR operation on the new secret key and the ith data block in the N block data blocks, and carrying out encryption processing on the ith data block subjected to XOR operation through a preset secret key to obtain an ith encrypted data block;
when the ith-1 encryption is carried out for i +1 times, carrying out exclusive OR operation on the ith encrypted data block and the ith data block in the N data blocks, and carrying out encryption processing on the ith data block subjected to the exclusive OR operation through a preset secret key to obtain an ith encrypted data block;
and (4) carrying out iterative encryption until i is equal to N, and obtaining an encryption upgrade package which comprises N encryption data blocks.
Supposing that the upgrade package is sequentially partitioned into 3 data blocks, and a first data block is encrypted through a new secret key and a preset secret key to obtain a first encrypted data block; then, the first encrypted data block is used as a new secret key, and the second encrypted data block is encrypted by combining a preset secret key to obtain a second encrypted data block; and taking the second encrypted data block as a new secret key, encrypting the third encrypted data block by combining a preset secret key to obtain a third encrypted data block, and combining the first encrypted data block, the second encrypted data block and the third encrypted data block to obtain an encrypted upgrade package.
And step 105, sending the encrypted upgrade package to the client.
The server sends the encrypted upgrade package obtained after encryption to the client, so that the encrypted upgrade packages obtained when the client downloads the upgrade package of the same version at different time are different, and the content of the upgrade package obtained after decryption of the encrypted upgrade package is the same.
Further, when the server does not receive the downloading request in the target time period, the current time is used as a time stamp at intervals of preset time, and the upgrading packet in the server is encrypted based on the time stamp.
When the server does not receive the download request of the client in the target time period, the timestamp can be acquired at regular time to encrypt the upgrade package in the server, for example, the server can acquire the current time once at an interval of 5 hours as the timestamp to encrypt the upgrade package, so that the upgrade package is prevented from keeping the data unchanged all the time, and the security is improved.
In the embodiment of the application, when the server receives a downloading request of the client, the current downloading time is used as the timestamp to encrypt the upgrade package, so that different encrypted upgrade packages are obtained at different downloading times, an attacker is prevented from obtaining the upgrade content of the upgrade package through simple comparison, and the data security is improved; the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the upgrade package is not easy to crack, the data safety is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and the safety is low are solved.
The above is an embodiment of a data protection method provided by the present application, and the following is an embodiment of a server provided by the present application.
Referring to fig. 2, an embodiment of the present application provides a server, including:
the response unit is used for responding to a downloading request of the client, taking the current downloading time as a timestamp, and the downloading request is used for requesting to download the upgrade package;
the processing unit is used for processing the time stamp through a preset initial value to obtain an encryption parameter;
the first encryption unit is used for encrypting the preset secret key through the encryption parameters to obtain a new secret key;
the second encryption unit is used for encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
and the sending unit is used for sending the encrypted upgrade package to the client.
As a further improvement, the processing unit is specifically configured to:
and carrying out XOR operation on the preset initial value and the time stamp to obtain the encryption parameter.
As a further improvement, the second encryption unit is specifically configured to:
and carrying out XOR operation on the new secret key and the upgrade package, and encrypting the upgrade package subjected to the XOR operation by using a preset secret key to obtain an encrypted upgrade package.
As a further improvement, the second encryption unit is specifically configured to:
partitioning the upgrade package to obtain N blocks of data, wherein N is an integer greater than 1;
when the ith is encrypted for 1 time, carrying out XOR operation on the new secret key and the ith data block in the N block data blocks, and carrying out encryption processing on the ith data block subjected to XOR operation through a preset secret key to obtain an ith encrypted data block;
when the ith-1 encryption is carried out for i +1 times, carrying out exclusive OR operation on the ith encrypted data block and the ith data block in the N data blocks, and carrying out encryption processing on the ith data block subjected to the exclusive OR operation through a preset secret key to obtain an ith encrypted data block;
and (4) carrying out iterative encryption until i is equal to N, and obtaining an encryption upgrade package which comprises N encryption data blocks.
As a further improvement, the server further comprises:
and the third encryption unit is used for taking the current time as a time stamp at intervals of preset time when the server does not receive the downloading request in the target time period, and encrypting the upgrade package in the server based on the time stamp.
In the embodiment of the application, when the server receives a downloading request of the client, the current downloading time is used as the timestamp to encrypt the upgrade package, so that different encrypted upgrade packages are obtained at different downloading times, an attacker is prevented from obtaining the upgrade content of the upgrade package through simple comparison, and the data security is improved; the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the upgrade package is not easy to crack, the data safety is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and the safety is low are solved.
The above is an embodiment of a server provided by the present application, and the following is an embodiment of a data protection system provided by the present application.
An embodiment of the present application provides a data protection system, including: a client and a server in the aforementioned server embodiments;
the client is in communication connection with the server.
It is understood that the number of clients may be plural.
In the embodiment of the application, when the server receives a downloading request of the client, the current downloading time is used as the timestamp to encrypt the upgrade package, so that different encrypted upgrade packages are obtained at different downloading times, an attacker is prevented from obtaining the upgrade content of the upgrade package through simple comparison, and the data security is improved; the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the upgrade package is not easy to crack, the data safety is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and the safety is low are solved.
The embodiment of the application also provides data protection equipment, which comprises a processor and a memory;
the memory is used for storing the program codes and transmitting the program codes to the processor;
the processor is configured to execute the data protection method in the foregoing method embodiment according to instructions in the program code.
The embodiment of the present application further provides a computer-readable storage medium, which is used for storing a program code, where the program code is used for executing the data protection method in the foregoing method embodiment.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The terms "first," "second," "third," "fourth," and the like in the description of the application and the above-described figures, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that in the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" for describing an association relationship of associated objects, indicating that there may be three relationships, e.g., "a and/or B" may indicate: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for executing all or part of the steps of the method described in the embodiments of the present application through a computer device (which may be a personal computer, a server, or a network device). And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A data protection method is applied to a server, and the method comprises the following steps:
responding to a downloading request of a client, and taking the current downloading time as a timestamp, wherein the downloading request is used for requesting to download an upgrade package;
processing the timestamp through a preset initial value to obtain an encryption parameter;
encrypting the preset secret key through the encryption parameters to obtain a new secret key;
encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
and sending the encrypted upgrade package to the client.
2. The data protection method according to claim 1, wherein the processing the timestamp by a preset initial value to obtain an encryption parameter comprises:
and carrying out XOR operation on the preset initial value and the time stamp to obtain an encryption parameter.
3. The data protection method according to claim 1, wherein the encrypting the upgrade package by the new key to obtain an encrypted upgrade package comprises:
and carrying out XOR operation on the new secret key and the upgrade package, and encrypting the upgrade package subjected to XOR operation through the preset secret key to obtain an encrypted upgrade package.
4. The data protection method according to claim 1, wherein the encrypting the upgrade package by the new key to obtain an encrypted upgrade package comprises:
partitioning the upgrade package to obtain N blocks of data, wherein N is an integer greater than 1;
when the ith is encrypted for 1 time, carrying out exclusive-or operation on the new secret key and the ith data block in the N data blocks, and carrying out encryption processing on the ith data block subjected to exclusive-or operation through the preset secret key to obtain an ith encrypted data block;
when the ith-1 encryption is carried out for i +1 times, carrying out exclusive OR operation on the ith encrypted data block and the ith data block in the N data blocks, and carrying out encryption processing on the ith data block subjected to the exclusive OR operation through the preset secret key to obtain an ith encrypted data block;
and (4) carrying out iterative encryption until i is equal to N, and obtaining an encryption upgrade package which comprises N encryption data blocks.
5. The data protection method of claim 1, further comprising:
and when the server does not receive the downloading request in the target time period, taking the current time as a time stamp at every preset time interval, and encrypting the upgrading packet in the server based on the time stamp.
6. A server, comprising:
the response unit is used for responding to a downloading request of the client and taking the current downloading time as a timestamp, wherein the downloading request is used for requesting to download the upgrade package;
the processing unit is used for processing the timestamp through a preset initial value to obtain an encryption parameter;
the first encryption unit is used for encrypting the preset secret key through the encryption parameters to obtain a new secret key;
the second encryption unit is used for encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
and the sending unit is used for sending the encrypted upgrade package to the client.
7. The server of claim 6, further comprising:
and the third encryption unit is used for taking the current time as a time stamp at intervals of preset time when the server does not receive the downloading request in the target time period, and encrypting the upgrade package in the server based on the time stamp.
8. A data protection system, comprising: a client and the server of any one of claims 6-7;
the client is in communication connection with the server.
9. A data protection device, characterized in that the device comprises a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the data protection method of any one of claims 1-5 according to instructions in the program code.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium is configured to store a program code for executing the data protection method of any one of claims 1-5.
CN202110602078.0A 2021-05-31 2021-05-31 Data protection method, server, system, equipment and medium Active CN113347001B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110602078.0A CN113347001B (en) 2021-05-31 2021-05-31 Data protection method, server, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110602078.0A CN113347001B (en) 2021-05-31 2021-05-31 Data protection method, server, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN113347001A true CN113347001A (en) 2021-09-03
CN113347001B CN113347001B (en) 2023-04-28

Family

ID=77473178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110602078.0A Active CN113347001B (en) 2021-05-31 2021-05-31 Data protection method, server, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN113347001B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753292A (en) * 2008-12-15 2010-06-23 汤姆森许可贸易公司 Methods and devices for a chained encryption mode
US20120117385A1 (en) * 2010-11-09 2012-05-10 International Business Machines Corporation Method and apparatus for data encryption
WO2015192206A1 (en) * 2014-06-16 2015-12-23 Polyvalor, Limited Partnership Methods for securing an application and data
CN107370721A (en) * 2016-05-13 2017-11-21 福特全球技术公司 Vehicle data is encrypted
CN110098937A (en) * 2019-04-16 2019-08-06 西安前观测控技术有限公司 A kind of data block associated Encryption Algorithm based on timestamp
CN110768787A (en) * 2018-07-27 2020-02-07 中国移动通信集团吉林有限公司 Data encryption and decryption method and device
CN112182512A (en) * 2020-09-01 2021-01-05 北京幻想纵横网络技术有限公司 Information processing method, device and storage medium
CN112287366A (en) * 2020-10-29 2021-01-29 平安信托有限责任公司 Data encryption method and device, computer equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753292A (en) * 2008-12-15 2010-06-23 汤姆森许可贸易公司 Methods and devices for a chained encryption mode
US20120117385A1 (en) * 2010-11-09 2012-05-10 International Business Machines Corporation Method and apparatus for data encryption
WO2015192206A1 (en) * 2014-06-16 2015-12-23 Polyvalor, Limited Partnership Methods for securing an application and data
CN107370721A (en) * 2016-05-13 2017-11-21 福特全球技术公司 Vehicle data is encrypted
CN110768787A (en) * 2018-07-27 2020-02-07 中国移动通信集团吉林有限公司 Data encryption and decryption method and device
CN110098937A (en) * 2019-04-16 2019-08-06 西安前观测控技术有限公司 A kind of data block associated Encryption Algorithm based on timestamp
CN112182512A (en) * 2020-09-01 2021-01-05 北京幻想纵横网络技术有限公司 Information processing method, device and storage medium
CN112287366A (en) * 2020-10-29 2021-01-29 平安信托有限责任公司 Data encryption method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113347001B (en) 2023-04-28

Similar Documents

Publication Publication Date Title
CN105915332B (en) A kind of encryption of cloud storage and deduplication method and its system
CN108241517B (en) Software upgrading method, client and electronic equipment
CN109194625B (en) Client application protection method and device based on cloud server and storage medium
CN102281300B (en) Digital rights management license distribution method and system, server and terminal
CN104052742A (en) Internet of things communication protocol capable of being encrypted dynamically
CN111143869B (en) Application package processing method and device, electronic equipment and storage medium
US8959659B2 (en) Software authorization system and method
CN103248650A (en) Document download method and system
CN105871805A (en) Anti-stealing-link method and device
CN110493251B (en) Data processing method and device, electronic equipment and storage medium
CN109408486B (en) File distribution method and system, distribution server and file generation device
CN112291201A (en) Service request transmission method and device and electronic equipment
CN108431819B (en) Method and system for protecting client access to service of DRM agent of video player
CN108141353A (en) The method and apparatus of cryptographic algorithm upgrading
CN113347001B (en) Data protection method, server, system, equipment and medium
CN110619194B (en) Upgrade package encryption and decryption methods and devices
CN105100030B (en) Access control method, system and device
CN111143629A (en) Data storage, processing and acquisition method based on identification recognition and related device thereof
CN107395616B (en) Method and system for safely processing data file
CN113821820B (en) Method, device, medium and equipment for encrypting and decrypting resources in splitting mode
CN109271800A (en) A kind of document handling method and device
CN115310057A (en) Encryption and decryption method, device, equipment and storage medium for preventing inverse compilation
CN115567200A (en) http interface anti-brush method, system and related device
CN110175475B (en) Smart card data processing method and device and computer readable storage medium
CN111523128A (en) Information protection method, system, electronic device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 510663 Room 202, building G10, South China new material innovation park, 31 Kefeng Road, Guangzhou high tech Industrial Development Zone, Guangdong Province

Patentee after: Guangzhou Zhongnuo Microelectronics Co.,Ltd.

Address before: 510663 Room 202, building G10, South China new material innovation park, 31 Kefeng Road, Guangzhou high tech Industrial Development Zone, Guangdong Province

Patentee before: GUANGZHOU ZHONO ELECTRONIC TECHNOLOGY Co.,Ltd.