CN113347001B - Data protection method, server, system, equipment and medium - Google Patents

Data protection method, server, system, equipment and medium Download PDF

Info

Publication number
CN113347001B
CN113347001B CN202110602078.0A CN202110602078A CN113347001B CN 113347001 B CN113347001 B CN 113347001B CN 202110602078 A CN202110602078 A CN 202110602078A CN 113347001 B CN113347001 B CN 113347001B
Authority
CN
China
Prior art keywords
encryption
upgrade package
secret key
server
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110602078.0A
Other languages
Chinese (zh)
Other versions
CN113347001A (en
Inventor
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Zhongnuo Microelectronics Co ltd
Original Assignee
Guangzhou Zhono Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Zhono Electronic Technology Co ltd filed Critical Guangzhou Zhono Electronic Technology Co ltd
Priority to CN202110602078.0A priority Critical patent/CN113347001B/en
Publication of CN113347001A publication Critical patent/CN113347001A/en
Application granted granted Critical
Publication of CN113347001B publication Critical patent/CN113347001B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data protection method, a server, a system, equipment and a medium, wherein the method is applied to the server and comprises the following steps: responding to a downloading request of a client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download an upgrade package; processing the time stamp through a preset initial value to obtain an encryption parameter; encrypting the preset secret key through the encryption parameters to obtain a new secret key; encrypting the upgrade package through the new key to obtain an encrypted upgrade package; the encryption upgrade package is sent to the client, so that the technical problems that the existing upgrade package is easy to steal and tamper and has low safety are solved.

Description

Data protection method, server, system, equipment and medium
Technical Field
The present disclosure relates to the field of data security technologies, and in particular, to a data protection method, a server, a system, a device, and a medium.
Background
The upgrade package of the existing chip firmware and the like is generally stored in a server, and the upgrade package is downloaded locally by accessing the server to perform the upgrade. The upgrade package of the current version in the server is usually unchanged in the current upgrade process, the upgrade package of the current version downloaded each time is the same, and an attacker can obtain the content of the current upgrade by comparing the current upgrade package with the last upgrade package, so that data is stolen or tampered, and the data security is lower.
Disclosure of Invention
The application provides a data protection method, a server, a system, equipment and a medium, which are used for solving the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety.
In view of this, a first aspect of the present application provides a data protection method, applied to a server, including:
responding to a downloading request of a client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download an upgrade package;
processing the time stamp through a preset initial value to obtain an encryption parameter;
encrypting the preset secret key through the encryption parameters to obtain a new secret key;
encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
and sending the encryption upgrading packet to the client.
Optionally, the processing the timestamp through a preset initial value to obtain an encryption parameter includes:
and performing exclusive OR operation on the preset initial value and the timestamp to obtain the encryption parameter.
Optionally, the encrypting the upgrade package by the new key to obtain an encrypted upgrade package includes:
and performing exclusive-or operation on the new secret key and the upgrade package, and performing encryption processing on the upgrade package subjected to exclusive-or operation through the preset secret key to obtain an encrypted upgrade package.
Optionally, the encrypting the upgrade package by the new key to obtain an encrypted upgrade package includes:
partitioning the upgrade package to obtain N data blocks, wherein N is an integer greater than 1;
when the i=1 encryption is carried out, carrying out exclusive or operation on the new secret key and the i data block in the N data blocks, and carrying out encryption processing on the i data block after the exclusive or operation through the preset secret key to obtain the i encrypted data block;
when the ith=i+1 encryption is performed, performing exclusive-or operation on the ith-1 encrypted data block and the ith data block in the N data blocks, and performing encryption processing on the ith data block after the exclusive-or operation through the preset secret key to obtain the ith encrypted data block;
and (3) performing iterative encryption until i=N, and obtaining an encryption upgrade package, wherein the encryption upgrade package comprises N encryption data blocks.
Optionally, the method further comprises:
when the server does not receive the downloading request within the target time period, the current time is taken as a time stamp every preset time, and encryption processing is carried out on the upgrade package in the server based on the time stamp.
A second aspect of the present application provides a server, comprising:
the response unit is used for responding to a downloading request of the client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download the upgrade package;
the processing unit is used for processing the time stamp through a preset initial value to obtain an encryption parameter;
the first encryption unit is used for encrypting the preset secret key through the encryption parameters to obtain a new secret key;
the second encryption unit is used for encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
and the sending unit is used for sending the encryption upgrading packet to the client.
Optionally, the method further comprises:
and the third encryption unit is used for taking the current time as a time stamp every preset time when the server does not receive the downloading request in the target time period, and carrying out encryption processing on the upgrade package in the server based on the time stamp.
A third aspect of the present application provides a data protection system comprising: a client and the server of any one of the second aspects;
the client is in communication connection with the server.
A fourth aspect of the present application provides a data protection device, the device comprising a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the data protection method according to any one of the first aspects according to instructions in the program code.
A fifth aspect of the present application provides a computer readable storage medium for storing program code for performing the data protection method of any one of the first aspects.
From the above technical scheme, the application has the following advantages:
the application provides a data protection method, which is applied to a server and comprises the following steps: responding to a downloading request of a client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download an upgrade package; processing the time stamp through a preset initial value to obtain an encryption parameter; the preset secret key is encrypted through encryption parameters to obtain a new secret key; encrypting the upgrade package through the new key to obtain an encrypted upgrade package; and sending the encrypted upgrade package to the client.
In the method, when the server receives the downloading request of the client, the current downloading time is used as a time stamp to encrypt the upgrade package, so that different encrypted upgrade packages are obtained at different downloading times, an attacker is prevented from obtaining the upgrade content of the upgrade package through simple comparison, and the data security is improved; and the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the encrypted upgrade package is not easy to crack, the safety of data is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety are solved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive faculty for a person skilled in the art.
Fig. 1 is a schematic flow chart of a data protection method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
The application provides a data protection method, a server, a system, equipment and a medium, which are used for solving the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety.
In order to make the present application solution better understood by those skilled in the art, the following description will clearly and completely describe the technical solution in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
According to the embodiment of the application, the upgrade package of the same version is considered to be fixed in the server, when a certain firmware is repeatedly upgraded, the upgrade package downloaded each time is the same (the version is unchanged), and when the upgrade package of the next version is released, an attacker can easily obtain places where the firmware of the previous version is modified and the firmware of the current version is modified by comparing the upgrade package of the previous version with the upgrade package of the firmware of the current version, so that the firmware security is not high.
In order to improve the problem that the upgrade package is easy to be stolen and tampered and has lower security, referring to fig. 1, an embodiment of the present application provides a data protection method, which is applied to a server, and includes:
step 101, responding to a downloading request of a client, and taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download the upgrade package.
When a client initiates a downloading request for downloading an upgrade package to a server, the server acquires the current downloading time as a time stamp, wherein the current downloading time is the time when the client receives the downloading request or the time when the client initiates the downloading request.
Step 102, processing the time stamp through a preset initial value to obtain an encryption parameter.
The preset initial value is a fixed value stored in the server in advance, and the timestamp is processed through the preset initial value to disturb the timestamp, so that the encryption parameter is obtained. Specifically, the preset initial value and the time stamp are subjected to exclusive OR operation to obtain the encryption parameter. It will be appreciated that other processing schemes may be employed.
Step 103, encrypting the preset secret key through the encryption parameters to obtain a new secret key.
The preset key is a fixed value stored in advance in the server. The server can input the preset secret key and the encryption parameters into the existing encryption tool to carry out encryption processing to obtain a new secret key.
According to the embodiment of the application, the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, so that the encrypted upgrade package obtained by directly encrypting the upgrade package through the time stamp is prevented from being easily cracked, the cracking difficulty of the encrypted upgrade package is improved, and the data safety of the upgrade package is ensured.
Step 104, the upgrade package is encrypted through the new secret key, and the encrypted upgrade package is obtained.
In one embodiment, the entire upgrade package may be encrypted by using a new key to obtain an encrypted upgrade package, which specifically includes:
and performing exclusive-or operation on the new key and the upgrade package, and performing encryption processing on the upgrade package after the exclusive-or operation through a preset key to obtain an encrypted upgrade package.
In another embodiment, after the upgrade packet is subjected to the blocking processing, each data block may be subjected to the encryption processing, specifically:
partitioning the upgrade package to obtain N data blocks, wherein N is an integer greater than 1;
when the ith=1 encryption, carrying out exclusive or operation on the new secret key and the ith data block in the N data blocks, and carrying out encryption processing on the ith data block after the exclusive or operation through a preset secret key to obtain the ith encrypted data block;
when the ith=i+1 encryption is performed, performing exclusive-or operation on the ith-1 encrypted data block and the ith data block in the N data blocks, and performing encryption processing on the ith data block after the exclusive-or operation through a preset secret key to obtain the ith encrypted data block;
and (3) performing iterative encryption until i=N, and obtaining an encryption upgrade package, wherein the encryption upgrade package comprises N encryption data blocks.
Supposing that the upgrade package is divided into 3 data blocks in sequence, and encrypting the first data block through a new secret key and a preset secret key to obtain a first encrypted data block; then the first encrypted data block is used as a new secret key, and the second encrypted data block is encrypted by combining with a preset secret key to obtain a second encrypted data block; and taking the second encrypted data block as a new key, carrying out encryption processing on the third encrypted data block by combining the preset key to obtain a third encrypted data block, and combining the first, second and third encrypted data blocks to obtain an encryption upgrading packet.
Step 105, the encryption upgrade package is sent to the client.
The server sends the encrypted upgrade package obtained after encryption to the client, so that the encrypted upgrade package obtained when the client downloads the upgrade package of the same version at different times is different, and the content of the upgrade package obtained after decryption of the encrypted upgrade package is the same.
Further, when the server does not receive the download request within the target time period, the current time is taken as a time stamp every preset time, and encryption processing is performed on the upgrade package in the server based on the time stamp.
When the server does not receive the downloading request of the client in the target time period, the time stamp can be acquired at regular time to encrypt the upgrade package in the server, for example, the server can acquire the current time once at intervals of 5 hours as the time stamp to encrypt the upgrade package, so that the upgrade package is prevented from always keeping the data unchanged, and the security is improved.
In the embodiment of the application, when the server receives the downloading request of the client, the current downloading time is used as the time stamp to encrypt the upgrade package, so that different encrypted upgrade packages are obtained at different downloading times, an attacker is prevented from obtaining the upgrade content of the upgrade package through simple comparison, and the data security is improved; and the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the encrypted upgrade package is not easy to crack, the safety of data is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety are solved.
The foregoing is one embodiment of a data protection method provided in the present application, and the following is one embodiment of a server provided in the present application.
Referring to fig. 2, a server provided in an embodiment of the present application includes:
the response unit is used for responding to a downloading request of the client, taking the current downloading time as a time stamp, and the downloading request is used for requesting to download the upgrade package;
the processing unit is used for processing the time stamp through a preset initial value to obtain an encryption parameter;
the first encryption unit is used for carrying out encryption processing on the preset secret key through encryption parameters to obtain a new secret key;
the second encryption unit is used for encrypting the upgrade package through the new key to obtain an encrypted upgrade package;
and the sending unit is used for sending the encryption upgrading packet to the client.
As a further refinement, the processing unit is specifically configured to:
and performing exclusive OR operation on the preset initial value and the time stamp to obtain the encryption parameter.
As a further improvement, the second encryption unit is specifically configured to:
and performing exclusive-or operation on the new key and the upgrade package, and performing encryption processing on the upgrade package after the exclusive-or operation through a preset key to obtain an encrypted upgrade package.
As a further improvement, the second encryption unit is specifically configured to:
partitioning the upgrade package to obtain N data blocks, wherein N is an integer greater than 1;
when the ith=1 encryption, carrying out exclusive or operation on the new secret key and the ith data block in the N data blocks, and carrying out encryption processing on the ith data block after the exclusive or operation through a preset secret key to obtain the ith encrypted data block;
when the ith=i+1 encryption is performed, performing exclusive-or operation on the ith-1 encrypted data block and the ith data block in the N data blocks, and performing encryption processing on the ith data block after the exclusive-or operation through a preset secret key to obtain the ith encrypted data block;
and (3) performing iterative encryption until i=N, and obtaining an encryption upgrade package, wherein the encryption upgrade package comprises N encryption data blocks.
As a further improvement, the server further includes:
and the third encryption unit is used for taking the current time as a time stamp every preset time when the server does not receive the downloading request within the target time period, and carrying out encryption processing on the upgrade package in the server based on the time stamp.
In the embodiment of the application, when the server receives the downloading request of the client, the current downloading time is used as the time stamp to encrypt the upgrade package, so that different encrypted upgrade packages are obtained at different downloading times, an attacker is prevented from obtaining the upgrade content of the upgrade package through simple comparison, and the data security is improved; and the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the encrypted upgrade package is not easy to crack, the safety of data is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety are solved.
The foregoing is one embodiment of a server provided herein, and the following is one embodiment of a data protection system provided herein.
The embodiment of the application provides a data protection system, which comprises: a client and a server in the foregoing server embodiment;
the client is communicatively connected to the server.
It is understood that the number of clients may be plural.
In the embodiment of the application, when the server receives the downloading request of the client, the current downloading time is used as the time stamp to encrypt the upgrade package, so that different encrypted upgrade packages are obtained at different downloading times, an attacker is prevented from obtaining the upgrade content of the upgrade package through simple comparison, and the data security is improved; and the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the encrypted upgrade package is not easy to crack, the safety of data is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety are solved.
The embodiment of the application also provides data protection equipment, which comprises a processor and a memory;
the memory is used for storing the program codes and transmitting the program codes to the processor;
the processor is configured to execute the data protection method in the foregoing method embodiment according to the instructions in the program code.
The embodiment of the application also provides a computer readable storage medium, which is used for storing program codes, and the program codes are used for executing the data protection method in the embodiment of the method.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
The terms "first," "second," "third," "fourth," and the like in the description of the present application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be capable of operation in sequences other than those illustrated or described herein, for example. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that in this application, "at least one" means one or more, and "a plurality" means two or more. "and/or" for describing the association relationship of the association object, the representation may have three relationships, for example, "a and/or B" may represent: only a, only B and both a and B are present, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b or c may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions to execute all or part of the steps of the methods described in the embodiments of the present application by a computer device (which may be a personal computer, a server, or a network device, etc.). And the aforementioned storage medium includes: u disk, mobile hard disk, read-Only Memory (ROM), random access Memory (RandomAccess Memory, RAM), magnetic disk or optical disk, etc.
The above embodiments are merely for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (6)

1. A data protection method, applied to a server, comprising:
responding to a downloading request of a client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download an upgrade package, and the current downloading time is the time when the server receives the downloading request;
processing the timestamp through a preset initial value to obtain an encryption parameter, wherein the preset initial value is a fixed value stored in the server in advance;
encrypting the preset secret key through the encryption parameters to obtain a new secret key;
encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
sending the encryption upgrade package to the client;
when the server does not receive a downloading request within a target time period, taking the current time as a time stamp every preset time, and carrying out encryption processing on an upgrade package in the server based on the time stamp;
the step of encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package comprises the following steps:
performing exclusive-or operation on the new secret key and the upgrade package, and performing encryption processing on the upgrade package after the exclusive-or operation through the preset secret key to obtain an encrypted upgrade package;
or, partitioning the upgrade package to obtain N data blocks, wherein N is an integer greater than 1;
when the i=1 encryption is carried out, carrying out exclusive or operation on the new secret key and the i data block in the N data blocks, and carrying out encryption processing on the i data block after the exclusive or operation through the preset secret key to obtain the i encrypted data block;
when the ith=i+1 encryption is performed, performing exclusive-or operation on the ith-1 encrypted data block and the ith data block in the N data blocks, and performing encryption processing on the ith data block after the exclusive-or operation through the preset secret key to obtain the ith encrypted data block;
and (3) performing iterative encryption until i=N, and obtaining an encryption upgrade package, wherein the encryption upgrade package comprises N encryption data blocks.
2. The method according to claim 1, wherein the processing the timestamp by a preset initial value to obtain an encryption parameter includes:
and performing exclusive OR operation on the preset initial value and the timestamp to obtain the encryption parameter.
3. A server, comprising:
the response unit is used for responding to a downloading request of the client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download the upgrade package, and the current downloading time is the time when the server receives the downloading request;
the processing unit is used for processing the time stamp through a preset initial value to obtain an encryption parameter, wherein the preset initial value is a fixed value stored in the server in advance;
the first encryption unit is used for encrypting the preset secret key through the encryption parameters to obtain a new secret key;
the second encryption unit is used for encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
the sending unit is used for sending the encryption upgrading packet to the client;
a third encryption unit, configured to, when the server does not receive the download request within the target time period, use the current time as a time stamp every preset time, and perform encryption processing on the upgrade package in the server based on the time stamp;
the second encryption unit is specifically configured to:
performing exclusive-or operation on the new secret key and the upgrade package, and performing encryption processing on the upgrade package after the exclusive-or operation through the preset secret key to obtain an encrypted upgrade package;
or, partitioning the upgrade package to obtain N data blocks, wherein N is an integer greater than 1;
when the i=1 encryption is carried out, carrying out exclusive or operation on the new secret key and the i data block in the N data blocks, and carrying out encryption processing on the i data block after the exclusive or operation through the preset secret key to obtain the i encrypted data block;
when the ith=i+1 encryption is performed, performing exclusive-or operation on the ith-1 encrypted data block and the ith data block in the N data blocks, and performing encryption processing on the ith data block after the exclusive-or operation through the preset secret key to obtain the ith encrypted data block;
and (3) performing iterative encryption until i=N, and obtaining an encryption upgrade package, wherein the encryption upgrade package comprises N encryption data blocks.
4. A data protection system, comprising: a client and the server of claim 3;
the client is in communication connection with the server.
5. A data protection device, the device comprising a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the data protection method of any of claims 1-2 according to instructions in the program code.
6. A computer readable storage medium, characterized in that the computer readable storage medium is for storing a program code for performing the data protection method of any one of claims 1-2.
CN202110602078.0A 2021-05-31 2021-05-31 Data protection method, server, system, equipment and medium Active CN113347001B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110602078.0A CN113347001B (en) 2021-05-31 2021-05-31 Data protection method, server, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110602078.0A CN113347001B (en) 2021-05-31 2021-05-31 Data protection method, server, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN113347001A CN113347001A (en) 2021-09-03
CN113347001B true CN113347001B (en) 2023-04-28

Family

ID=77473178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110602078.0A Active CN113347001B (en) 2021-05-31 2021-05-31 Data protection method, server, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN113347001B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110098937A (en) * 2019-04-16 2019-08-06 西安前观测控技术有限公司 A kind of data block associated Encryption Algorithm based on timestamp
CN110768787A (en) * 2018-07-27 2020-02-07 中国移动通信集团吉林有限公司 Data encryption and decryption method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2197144A1 (en) * 2008-12-15 2010-06-16 Thomson Licensing Methods and devices for a chained encryption mode
US20120117385A1 (en) * 2010-11-09 2012-05-10 International Business Machines Corporation Method and apparatus for data encryption
WO2015192206A1 (en) * 2014-06-16 2015-12-23 Polyvalor, Limited Partnership Methods for securing an application and data
US20170331795A1 (en) * 2016-05-13 2017-11-16 Ford Global Technologies, Llc Vehicle data encryption
CN112182512A (en) * 2020-09-01 2021-01-05 北京幻想纵横网络技术有限公司 Information processing method, device and storage medium
CN112287366A (en) * 2020-10-29 2021-01-29 平安信托有限责任公司 Data encryption method and device, computer equipment and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110768787A (en) * 2018-07-27 2020-02-07 中国移动通信集团吉林有限公司 Data encryption and decryption method and device
CN110098937A (en) * 2019-04-16 2019-08-06 西安前观测控技术有限公司 A kind of data block associated Encryption Algorithm based on timestamp

Also Published As

Publication number Publication date
CN113347001A (en) 2021-09-03

Similar Documents

Publication Publication Date Title
CN110324143B (en) Data transmission method, electronic device and storage medium
CN105915332B (en) A kind of encryption of cloud storage and deduplication method and its system
EP3321837B1 (en) Method, apparatus and system for deviceidentification
CN107038383B (en) Data processing method and device
CN104052742A (en) Internet of things communication protocol capable of being encrypted dynamically
US20130185569A1 (en) Data protection system and method based on cloud storage
CN109862099B (en) Upgrade checking method, device, terminal and system
CN103248650A (en) Document download method and system
US20190379533A1 (en) Methods and systems for secure data transmission
CN111131282B (en) Request encryption method and device, electronic equipment and storage medium
CN110221990B (en) Data storage method and device, storage medium and computer equipment
CN110175475B (en) Smart card data processing method and device and computer readable storage medium
CN103905557A (en) Data storage method and device used for cloud environment and downloading method and device
US20180013551A1 (en) Apparatus for obfuscating and restoring program execution code and method thereof
CN113347001B (en) Data protection method, server, system, equipment and medium
CN111585998B (en) Audit data secure transmission method and system
CN105100030B (en) Access control method, system and device
CN115118504B (en) Knowledge base updating method and device, electronic equipment and storage medium
CN113542187A (en) File uploading and downloading method and device, computer device and medium
CN109936448A (en) A kind of data transmission method and device
CN115567200A (en) http interface anti-brush method, system and related device
CN112153046B (en) Data encryption and data decryption method, related equipment and storage medium
CN115310057A (en) Encryption and decryption method, device, equipment and storage medium for preventing inverse compilation
CN110855434B (en) Key processing method, device, terminal equipment and storage medium
CN111523128A (en) Information protection method, system, electronic device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 510663 Room 202, building G10, South China new material innovation park, 31 Kefeng Road, Guangzhou high tech Industrial Development Zone, Guangdong Province

Patentee after: Guangzhou Zhongnuo Microelectronics Co.,Ltd.

Address before: 510663 Room 202, building G10, South China new material innovation park, 31 Kefeng Road, Guangzhou high tech Industrial Development Zone, Guangdong Province

Patentee before: GUANGZHOU ZHONO ELECTRONIC TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder