CN113347001B - Data protection method, server, system, equipment and medium - Google Patents
Data protection method, server, system, equipment and medium Download PDFInfo
- Publication number
- CN113347001B CN113347001B CN202110602078.0A CN202110602078A CN113347001B CN 113347001 B CN113347001 B CN 113347001B CN 202110602078 A CN202110602078 A CN 202110602078A CN 113347001 B CN113347001 B CN 113347001B
- Authority
- CN
- China
- Prior art keywords
- encryption
- upgrade package
- secret key
- server
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a data protection method, a server, a system, equipment and a medium, wherein the method is applied to the server and comprises the following steps: responding to a downloading request of a client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download an upgrade package; processing the time stamp through a preset initial value to obtain an encryption parameter; encrypting the preset secret key through the encryption parameters to obtain a new secret key; encrypting the upgrade package through the new key to obtain an encrypted upgrade package; the encryption upgrade package is sent to the client, so that the technical problems that the existing upgrade package is easy to steal and tamper and has low safety are solved.
Description
Technical Field
The present disclosure relates to the field of data security technologies, and in particular, to a data protection method, a server, a system, a device, and a medium.
Background
The upgrade package of the existing chip firmware and the like is generally stored in a server, and the upgrade package is downloaded locally by accessing the server to perform the upgrade. The upgrade package of the current version in the server is usually unchanged in the current upgrade process, the upgrade package of the current version downloaded each time is the same, and an attacker can obtain the content of the current upgrade by comparing the current upgrade package with the last upgrade package, so that data is stolen or tampered, and the data security is lower.
Disclosure of Invention
The application provides a data protection method, a server, a system, equipment and a medium, which are used for solving the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety.
In view of this, a first aspect of the present application provides a data protection method, applied to a server, including:
responding to a downloading request of a client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download an upgrade package;
processing the time stamp through a preset initial value to obtain an encryption parameter;
encrypting the preset secret key through the encryption parameters to obtain a new secret key;
encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
and sending the encryption upgrading packet to the client.
Optionally, the processing the timestamp through a preset initial value to obtain an encryption parameter includes:
and performing exclusive OR operation on the preset initial value and the timestamp to obtain the encryption parameter.
Optionally, the encrypting the upgrade package by the new key to obtain an encrypted upgrade package includes:
and performing exclusive-or operation on the new secret key and the upgrade package, and performing encryption processing on the upgrade package subjected to exclusive-or operation through the preset secret key to obtain an encrypted upgrade package.
Optionally, the encrypting the upgrade package by the new key to obtain an encrypted upgrade package includes:
partitioning the upgrade package to obtain N data blocks, wherein N is an integer greater than 1;
when the i=1 encryption is carried out, carrying out exclusive or operation on the new secret key and the i data block in the N data blocks, and carrying out encryption processing on the i data block after the exclusive or operation through the preset secret key to obtain the i encrypted data block;
when the ith=i+1 encryption is performed, performing exclusive-or operation on the ith-1 encrypted data block and the ith data block in the N data blocks, and performing encryption processing on the ith data block after the exclusive-or operation through the preset secret key to obtain the ith encrypted data block;
and (3) performing iterative encryption until i=N, and obtaining an encryption upgrade package, wherein the encryption upgrade package comprises N encryption data blocks.
Optionally, the method further comprises:
when the server does not receive the downloading request within the target time period, the current time is taken as a time stamp every preset time, and encryption processing is carried out on the upgrade package in the server based on the time stamp.
A second aspect of the present application provides a server, comprising:
the response unit is used for responding to a downloading request of the client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download the upgrade package;
the processing unit is used for processing the time stamp through a preset initial value to obtain an encryption parameter;
the first encryption unit is used for encrypting the preset secret key through the encryption parameters to obtain a new secret key;
the second encryption unit is used for encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
and the sending unit is used for sending the encryption upgrading packet to the client.
Optionally, the method further comprises:
and the third encryption unit is used for taking the current time as a time stamp every preset time when the server does not receive the downloading request in the target time period, and carrying out encryption processing on the upgrade package in the server based on the time stamp.
A third aspect of the present application provides a data protection system comprising: a client and the server of any one of the second aspects;
the client is in communication connection with the server.
A fourth aspect of the present application provides a data protection device, the device comprising a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the data protection method according to any one of the first aspects according to instructions in the program code.
A fifth aspect of the present application provides a computer readable storage medium for storing program code for performing the data protection method of any one of the first aspects.
From the above technical scheme, the application has the following advantages:
the application provides a data protection method, which is applied to a server and comprises the following steps: responding to a downloading request of a client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download an upgrade package; processing the time stamp through a preset initial value to obtain an encryption parameter; the preset secret key is encrypted through encryption parameters to obtain a new secret key; encrypting the upgrade package through the new key to obtain an encrypted upgrade package; and sending the encrypted upgrade package to the client.
In the method, when the server receives the downloading request of the client, the current downloading time is used as a time stamp to encrypt the upgrade package, so that different encrypted upgrade packages are obtained at different downloading times, an attacker is prevented from obtaining the upgrade content of the upgrade package through simple comparison, and the data security is improved; and the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the encrypted upgrade package is not easy to crack, the safety of data is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety are solved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive faculty for a person skilled in the art.
Fig. 1 is a schematic flow chart of a data protection method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
The application provides a data protection method, a server, a system, equipment and a medium, which are used for solving the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety.
In order to make the present application solution better understood by those skilled in the art, the following description will clearly and completely describe the technical solution in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
According to the embodiment of the application, the upgrade package of the same version is considered to be fixed in the server, when a certain firmware is repeatedly upgraded, the upgrade package downloaded each time is the same (the version is unchanged), and when the upgrade package of the next version is released, an attacker can easily obtain places where the firmware of the previous version is modified and the firmware of the current version is modified by comparing the upgrade package of the previous version with the upgrade package of the firmware of the current version, so that the firmware security is not high.
In order to improve the problem that the upgrade package is easy to be stolen and tampered and has lower security, referring to fig. 1, an embodiment of the present application provides a data protection method, which is applied to a server, and includes:
When a client initiates a downloading request for downloading an upgrade package to a server, the server acquires the current downloading time as a time stamp, wherein the current downloading time is the time when the client receives the downloading request or the time when the client initiates the downloading request.
The preset initial value is a fixed value stored in the server in advance, and the timestamp is processed through the preset initial value to disturb the timestamp, so that the encryption parameter is obtained. Specifically, the preset initial value and the time stamp are subjected to exclusive OR operation to obtain the encryption parameter. It will be appreciated that other processing schemes may be employed.
The preset key is a fixed value stored in advance in the server. The server can input the preset secret key and the encryption parameters into the existing encryption tool to carry out encryption processing to obtain a new secret key.
According to the embodiment of the application, the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, so that the encrypted upgrade package obtained by directly encrypting the upgrade package through the time stamp is prevented from being easily cracked, the cracking difficulty of the encrypted upgrade package is improved, and the data safety of the upgrade package is ensured.
In one embodiment, the entire upgrade package may be encrypted by using a new key to obtain an encrypted upgrade package, which specifically includes:
and performing exclusive-or operation on the new key and the upgrade package, and performing encryption processing on the upgrade package after the exclusive-or operation through a preset key to obtain an encrypted upgrade package.
In another embodiment, after the upgrade packet is subjected to the blocking processing, each data block may be subjected to the encryption processing, specifically:
partitioning the upgrade package to obtain N data blocks, wherein N is an integer greater than 1;
when the ith=1 encryption, carrying out exclusive or operation on the new secret key and the ith data block in the N data blocks, and carrying out encryption processing on the ith data block after the exclusive or operation through a preset secret key to obtain the ith encrypted data block;
when the ith=i+1 encryption is performed, performing exclusive-or operation on the ith-1 encrypted data block and the ith data block in the N data blocks, and performing encryption processing on the ith data block after the exclusive-or operation through a preset secret key to obtain the ith encrypted data block;
and (3) performing iterative encryption until i=N, and obtaining an encryption upgrade package, wherein the encryption upgrade package comprises N encryption data blocks.
Supposing that the upgrade package is divided into 3 data blocks in sequence, and encrypting the first data block through a new secret key and a preset secret key to obtain a first encrypted data block; then the first encrypted data block is used as a new secret key, and the second encrypted data block is encrypted by combining with a preset secret key to obtain a second encrypted data block; and taking the second encrypted data block as a new key, carrying out encryption processing on the third encrypted data block by combining the preset key to obtain a third encrypted data block, and combining the first, second and third encrypted data blocks to obtain an encryption upgrading packet.
The server sends the encrypted upgrade package obtained after encryption to the client, so that the encrypted upgrade package obtained when the client downloads the upgrade package of the same version at different times is different, and the content of the upgrade package obtained after decryption of the encrypted upgrade package is the same.
Further, when the server does not receive the download request within the target time period, the current time is taken as a time stamp every preset time, and encryption processing is performed on the upgrade package in the server based on the time stamp.
When the server does not receive the downloading request of the client in the target time period, the time stamp can be acquired at regular time to encrypt the upgrade package in the server, for example, the server can acquire the current time once at intervals of 5 hours as the time stamp to encrypt the upgrade package, so that the upgrade package is prevented from always keeping the data unchanged, and the security is improved.
In the embodiment of the application, when the server receives the downloading request of the client, the current downloading time is used as the time stamp to encrypt the upgrade package, so that different encrypted upgrade packages are obtained at different downloading times, an attacker is prevented from obtaining the upgrade content of the upgrade package through simple comparison, and the data security is improved; and the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the encrypted upgrade package is not easy to crack, the safety of data is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety are solved.
The foregoing is one embodiment of a data protection method provided in the present application, and the following is one embodiment of a server provided in the present application.
Referring to fig. 2, a server provided in an embodiment of the present application includes:
the response unit is used for responding to a downloading request of the client, taking the current downloading time as a time stamp, and the downloading request is used for requesting to download the upgrade package;
the processing unit is used for processing the time stamp through a preset initial value to obtain an encryption parameter;
the first encryption unit is used for carrying out encryption processing on the preset secret key through encryption parameters to obtain a new secret key;
the second encryption unit is used for encrypting the upgrade package through the new key to obtain an encrypted upgrade package;
and the sending unit is used for sending the encryption upgrading packet to the client.
As a further refinement, the processing unit is specifically configured to:
and performing exclusive OR operation on the preset initial value and the time stamp to obtain the encryption parameter.
As a further improvement, the second encryption unit is specifically configured to:
and performing exclusive-or operation on the new key and the upgrade package, and performing encryption processing on the upgrade package after the exclusive-or operation through a preset key to obtain an encrypted upgrade package.
As a further improvement, the second encryption unit is specifically configured to:
partitioning the upgrade package to obtain N data blocks, wherein N is an integer greater than 1;
when the ith=1 encryption, carrying out exclusive or operation on the new secret key and the ith data block in the N data blocks, and carrying out encryption processing on the ith data block after the exclusive or operation through a preset secret key to obtain the ith encrypted data block;
when the ith=i+1 encryption is performed, performing exclusive-or operation on the ith-1 encrypted data block and the ith data block in the N data blocks, and performing encryption processing on the ith data block after the exclusive-or operation through a preset secret key to obtain the ith encrypted data block;
and (3) performing iterative encryption until i=N, and obtaining an encryption upgrade package, wherein the encryption upgrade package comprises N encryption data blocks.
As a further improvement, the server further includes:
and the third encryption unit is used for taking the current time as a time stamp every preset time when the server does not receive the downloading request within the target time period, and carrying out encryption processing on the upgrade package in the server based on the time stamp.
In the embodiment of the application, when the server receives the downloading request of the client, the current downloading time is used as the time stamp to encrypt the upgrade package, so that different encrypted upgrade packages are obtained at different downloading times, an attacker is prevented from obtaining the upgrade content of the upgrade package through simple comparison, and the data security is improved; and the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the encrypted upgrade package is not easy to crack, the safety of data is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety are solved.
The foregoing is one embodiment of a server provided herein, and the following is one embodiment of a data protection system provided herein.
The embodiment of the application provides a data protection system, which comprises: a client and a server in the foregoing server embodiment;
the client is communicatively connected to the server.
It is understood that the number of clients may be plural.
In the embodiment of the application, when the server receives the downloading request of the client, the current downloading time is used as the time stamp to encrypt the upgrade package, so that different encrypted upgrade packages are obtained at different downloading times, an attacker is prevented from obtaining the upgrade content of the upgrade package through simple comparison, and the data security is improved; and the time stamp is processed through the preset initial value to obtain the encryption parameter, the preset secret key is encrypted through the encryption parameter to obtain the new secret key, and the upgrade package is encrypted through the new secret key, so that the encrypted upgrade package is not easy to crack, the safety of data is further improved, and the technical problems that the existing upgrade package is easy to steal and tamper and has lower safety are solved.
The embodiment of the application also provides data protection equipment, which comprises a processor and a memory;
the memory is used for storing the program codes and transmitting the program codes to the processor;
the processor is configured to execute the data protection method in the foregoing method embodiment according to the instructions in the program code.
The embodiment of the application also provides a computer readable storage medium, which is used for storing program codes, and the program codes are used for executing the data protection method in the embodiment of the method.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
The terms "first," "second," "third," "fourth," and the like in the description of the present application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be capable of operation in sequences other than those illustrated or described herein, for example. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that in this application, "at least one" means one or more, and "a plurality" means two or more. "and/or" for describing the association relationship of the association object, the representation may have three relationships, for example, "a and/or B" may represent: only a, only B and both a and B are present, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b or c may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions to execute all or part of the steps of the methods described in the embodiments of the present application by a computer device (which may be a personal computer, a server, or a network device, etc.). And the aforementioned storage medium includes: u disk, mobile hard disk, read-Only Memory (ROM), random access Memory (RandomAccess Memory, RAM), magnetic disk or optical disk, etc.
The above embodiments are merely for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.
Claims (6)
1. A data protection method, applied to a server, comprising:
responding to a downloading request of a client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download an upgrade package, and the current downloading time is the time when the server receives the downloading request;
processing the timestamp through a preset initial value to obtain an encryption parameter, wherein the preset initial value is a fixed value stored in the server in advance;
encrypting the preset secret key through the encryption parameters to obtain a new secret key;
encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
sending the encryption upgrade package to the client;
when the server does not receive a downloading request within a target time period, taking the current time as a time stamp every preset time, and carrying out encryption processing on an upgrade package in the server based on the time stamp;
the step of encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package comprises the following steps:
performing exclusive-or operation on the new secret key and the upgrade package, and performing encryption processing on the upgrade package after the exclusive-or operation through the preset secret key to obtain an encrypted upgrade package;
or, partitioning the upgrade package to obtain N data blocks, wherein N is an integer greater than 1;
when the i=1 encryption is carried out, carrying out exclusive or operation on the new secret key and the i data block in the N data blocks, and carrying out encryption processing on the i data block after the exclusive or operation through the preset secret key to obtain the i encrypted data block;
when the ith=i+1 encryption is performed, performing exclusive-or operation on the ith-1 encrypted data block and the ith data block in the N data blocks, and performing encryption processing on the ith data block after the exclusive-or operation through the preset secret key to obtain the ith encrypted data block;
and (3) performing iterative encryption until i=N, and obtaining an encryption upgrade package, wherein the encryption upgrade package comprises N encryption data blocks.
2. The method according to claim 1, wherein the processing the timestamp by a preset initial value to obtain an encryption parameter includes:
and performing exclusive OR operation on the preset initial value and the timestamp to obtain the encryption parameter.
3. A server, comprising:
the response unit is used for responding to a downloading request of the client, taking the current downloading time as a time stamp, wherein the downloading request is used for requesting to download the upgrade package, and the current downloading time is the time when the server receives the downloading request;
the processing unit is used for processing the time stamp through a preset initial value to obtain an encryption parameter, wherein the preset initial value is a fixed value stored in the server in advance;
the first encryption unit is used for encrypting the preset secret key through the encryption parameters to obtain a new secret key;
the second encryption unit is used for encrypting the upgrade package through the new secret key to obtain an encrypted upgrade package;
the sending unit is used for sending the encryption upgrading packet to the client;
a third encryption unit, configured to, when the server does not receive the download request within the target time period, use the current time as a time stamp every preset time, and perform encryption processing on the upgrade package in the server based on the time stamp;
the second encryption unit is specifically configured to:
performing exclusive-or operation on the new secret key and the upgrade package, and performing encryption processing on the upgrade package after the exclusive-or operation through the preset secret key to obtain an encrypted upgrade package;
or, partitioning the upgrade package to obtain N data blocks, wherein N is an integer greater than 1;
when the i=1 encryption is carried out, carrying out exclusive or operation on the new secret key and the i data block in the N data blocks, and carrying out encryption processing on the i data block after the exclusive or operation through the preset secret key to obtain the i encrypted data block;
when the ith=i+1 encryption is performed, performing exclusive-or operation on the ith-1 encrypted data block and the ith data block in the N data blocks, and performing encryption processing on the ith data block after the exclusive-or operation through the preset secret key to obtain the ith encrypted data block;
and (3) performing iterative encryption until i=N, and obtaining an encryption upgrade package, wherein the encryption upgrade package comprises N encryption data blocks.
4. A data protection system, comprising: a client and the server of claim 3;
the client is in communication connection with the server.
5. A data protection device, the device comprising a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the data protection method of any of claims 1-2 according to instructions in the program code.
6. A computer readable storage medium, characterized in that the computer readable storage medium is for storing a program code for performing the data protection method of any one of claims 1-2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110602078.0A CN113347001B (en) | 2021-05-31 | 2021-05-31 | Data protection method, server, system, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110602078.0A CN113347001B (en) | 2021-05-31 | 2021-05-31 | Data protection method, server, system, equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113347001A CN113347001A (en) | 2021-09-03 |
CN113347001B true CN113347001B (en) | 2023-04-28 |
Family
ID=77473178
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110602078.0A Active CN113347001B (en) | 2021-05-31 | 2021-05-31 | Data protection method, server, system, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113347001B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110098937A (en) * | 2019-04-16 | 2019-08-06 | 西安前观测控技术有限公司 | A kind of data block associated Encryption Algorithm based on timestamp |
CN110768787A (en) * | 2018-07-27 | 2020-02-07 | 中国移动通信集团吉林有限公司 | Data encryption and decryption method and device |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2197144A1 (en) * | 2008-12-15 | 2010-06-16 | Thomson Licensing | Methods and devices for a chained encryption mode |
US20120117385A1 (en) * | 2010-11-09 | 2012-05-10 | International Business Machines Corporation | Method and apparatus for data encryption |
WO2015192206A1 (en) * | 2014-06-16 | 2015-12-23 | Polyvalor, Limited Partnership | Methods for securing an application and data |
US20170331795A1 (en) * | 2016-05-13 | 2017-11-16 | Ford Global Technologies, Llc | Vehicle data encryption |
CN112182512A (en) * | 2020-09-01 | 2021-01-05 | 北京幻想纵横网络技术有限公司 | Information processing method, device and storage medium |
CN112287366A (en) * | 2020-10-29 | 2021-01-29 | 平安信托有限责任公司 | Data encryption method and device, computer equipment and storage medium |
-
2021
- 2021-05-31 CN CN202110602078.0A patent/CN113347001B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110768787A (en) * | 2018-07-27 | 2020-02-07 | 中国移动通信集团吉林有限公司 | Data encryption and decryption method and device |
CN110098937A (en) * | 2019-04-16 | 2019-08-06 | 西安前观测控技术有限公司 | A kind of data block associated Encryption Algorithm based on timestamp |
Also Published As
Publication number | Publication date |
---|---|
CN113347001A (en) | 2021-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110324143B (en) | Data transmission method, electronic device and storage medium | |
CN105915332B (en) | A kind of encryption of cloud storage and deduplication method and its system | |
EP3321837B1 (en) | Method, apparatus and system for deviceidentification | |
CN107038383B (en) | Data processing method and device | |
CN104052742A (en) | Internet of things communication protocol capable of being encrypted dynamically | |
US20130185569A1 (en) | Data protection system and method based on cloud storage | |
CN109862099B (en) | Upgrade checking method, device, terminal and system | |
CN103248650A (en) | Document download method and system | |
US20190379533A1 (en) | Methods and systems for secure data transmission | |
CN111131282B (en) | Request encryption method and device, electronic equipment and storage medium | |
CN110221990B (en) | Data storage method and device, storage medium and computer equipment | |
CN110175475B (en) | Smart card data processing method and device and computer readable storage medium | |
CN103905557A (en) | Data storage method and device used for cloud environment and downloading method and device | |
US20180013551A1 (en) | Apparatus for obfuscating and restoring program execution code and method thereof | |
CN113347001B (en) | Data protection method, server, system, equipment and medium | |
CN111585998B (en) | Audit data secure transmission method and system | |
CN105100030B (en) | Access control method, system and device | |
CN115118504B (en) | Knowledge base updating method and device, electronic equipment and storage medium | |
CN113542187A (en) | File uploading and downloading method and device, computer device and medium | |
CN109936448A (en) | A kind of data transmission method and device | |
CN115567200A (en) | http interface anti-brush method, system and related device | |
CN112153046B (en) | Data encryption and data decryption method, related equipment and storage medium | |
CN115310057A (en) | Encryption and decryption method, device, equipment and storage medium for preventing inverse compilation | |
CN110855434B (en) | Key processing method, device, terminal equipment and storage medium | |
CN111523128A (en) | Information protection method, system, electronic device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 510663 Room 202, building G10, South China new material innovation park, 31 Kefeng Road, Guangzhou high tech Industrial Development Zone, Guangdong Province Patentee after: Guangzhou Zhongnuo Microelectronics Co.,Ltd. Address before: 510663 Room 202, building G10, South China new material innovation park, 31 Kefeng Road, Guangzhou high tech Industrial Development Zone, Guangdong Province Patentee before: GUANGZHOU ZHONO ELECTRONIC TECHNOLOGY Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder |