CN114244551B - Data application protection method, equipment and wild external painting verification method - Google Patents

Data application protection method, equipment and wild external painting verification method Download PDF

Info

Publication number
CN114244551B
CN114244551B CN202111148176.8A CN202111148176A CN114244551B CN 114244551 B CN114244551 B CN 114244551B CN 202111148176 A CN202111148176 A CN 202111148176A CN 114244551 B CN114244551 B CN 114244551B
Authority
CN
China
Prior art keywords
data
terminal equipment
server
encrypted data
control module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111148176.8A
Other languages
Chinese (zh)
Other versions
CN114244551A (en
Inventor
刘达
李忠伟
谢然
赵栋梁
房龙
曹鹏
李德元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Topographic Survey Team Of Ministry Of Natural Resources
Original Assignee
Third Topographic Survey Team Of Ministry Of Natural Resources
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Topographic Survey Team Of Ministry Of Natural Resources filed Critical Third Topographic Survey Team Of Ministry Of Natural Resources
Priority to CN202111148176.8A priority Critical patent/CN114244551B/en
Publication of CN114244551A publication Critical patent/CN114244551A/en
Application granted granted Critical
Publication of CN114244551B publication Critical patent/CN114244551B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The invention belongs to the technical field of data transmission, in particular to a data application protection method, a data application protection device and a wild sketch checking method, wherein the data application protection method encrypts data through a data encryption module to generate encrypted data and a secret key, the encrypted data is stored in a server, the secret key is distributed to terminal equipment, and the security of the data stored on a network server is improved; the server extracts relevant encrypted data according to the first control instruction and transmits the relevant encrypted data back to the synchronous control module, the synchronous control module transmits the extracted encrypted data and the second control instruction to corresponding terminal equipment in a simplex communication mode, the terminal equipment can decrypt the encrypted data, and the terminal equipment is isolated from the Internet, so that the risk of data leakage is avoided; in addition, the terminal equipment acquires data from the server, so that a large amount of data does not need to be stored, and the storage pressure of the terminal equipment is reduced.

Description

Data application protection method, equipment and wild external painting verification method
Technical Field
The invention belongs to the technical field of data transmission, and particularly relates to a data application protection method, data application protection equipment and a wild external painting verification method.
Background
With the rapid development of computer technology and various electronic products, the contradiction between data application and protection is becoming apparent, and particularly, how to ensure the safe viewing of data with higher security level and larger data volume in terminal equipment is a problem which is solved by the continuous force in the industry. The terminal is used for safely checking the data, and the two main problems are presented: firstly, if data is stored in the terminal equipment, the terminal equipment can be contacted with different users, and the terminal equipment is connected with a network, so that the data security is reduced; secondly, the terminal has limited storage capacity, and secret data with large data volume is difficult to be checked through the terminal equipment.
In the prior art, chinese patent document with publication number CN110502602a describes a data storage method, which obtains text data to be stored through a terminal, assigns a key name to the text data, and encrypts the key name and the text data according to a first preset encryption algorithm and a second preset encryption algorithm, respectively, so that although the data security is improved, in the decryption process, two decryption is required, so that the operand is increased, the data reading efficiency is reduced, and the local memory for data storage in the patent document has limited data storage capacity. The Chinese patent document with the publication number of CN112134943A describes an Internet of things cloud storage system and a method, wherein the system comprises an Internet of things cloud storage terminal, a cloud storage service terminal, a device management end and an access host, can improve data storage capacity, and ensures network transmission safety by providing a private network channel for data transmission, but improves the safety of data transmission by the private network channel, increases network communication burden, reduces network communication capacity and efficiency, and has high construction technical requirements on a communication network.
Disclosure of Invention
The invention aims to provide a data application protection method, equipment and a wild external painting verification method, which solve the technical problems of low security in the use process of secret-related data and high communication technical requirements for transmitting the secret-related data in the prior art.
To solve the above technical problem, a first aspect of the present invention is:
there is provided a data application protection method comprising:
encrypting the data to generate encrypted data and a secret key;
storing the encrypted data in a server, and distributing the secret key to terminal equipment isolated from the Internet;
setting a synchronous control module and giving the synchronous control module a certain authority so as to extract encrypted data from the server;
the synchronous control module sends a first control instruction to the server, and the server extracts relevant encrypted data according to the first control instruction and transmits the extracted encrypted data back to the synchronous control module;
the synchronous control module sends the encrypted data returned from the server to corresponding terminal equipment in a simplex communication mode;
the synchronous control module sends a second control instruction to the terminal equipment in a simplex communication mode, and the terminal equipment decrypts and uses the received encrypted data according to the second control instruction and a locally stored secret key.
Preferably, the first control instruction and the second control instruction include touch control, zooming and translation of the screen display content.
The second aspect of the invention is:
there is provided a data application protection apparatus including:
the data encryption module is used for encrypting the data and generating encrypted data and a secret key;
a server, wherein the encrypted data is stored in the server;
the secret key is distributed to the terminal equipment, and the terminal equipment is isolated from the Internet;
the synchronous control module is used for receiving a first control instruction of a user with authority, and when the synchronous control module receives the first control instruction, the synchronous control module sends the first control instruction to the server; the server extracts relevant encrypted data according to the first control instruction and transmits the extracted encrypted data back to the synchronous control module;
the synchronous control module is used for transmitting the encrypted data returned from the server to the corresponding terminal equipment through the simplex communication module;
the synchronous control module sends a second control instruction to the terminal equipment through the simplex communication module, and the terminal equipment decrypts and uses the received encrypted data according to the received second control instruction and the locally stored secret key.
Preferably, the server is a network server or a cloud server.
Preferably, the terminal device is a desktop computer, a tablet computer or a mobile phone.
Preferably, the synchronous control module comprises an input unit and a network transmission unit, and the input unit comprises a touch screen, a keyboard or/and a mouse.
A third aspect of the invention is:
the method for checking the wild external painting comprises the following steps:
encrypting the secret-related electronic map to generate an encrypted electronic map and a secret key;
storing the encrypted electronic map in a server, and distributing the secret key to terminal equipment carried by a wild sketch checker, wherein the terminal equipment is isolated from the Internet;
the method comprises the steps that a wild sketch checker carries a handheld sketch device and gives authority to the handheld sketch device, so that the wild sketch checker can send a first control instruction to the server through the handheld sketch device, and an encrypted electronic map is downloaded in a certain range;
the hand-held type transfers and draws the device and sends the encrypting electronic map that downloads to the said terminal equipment through simplex communication module, and the said hand-held type transfers and draws the device and sends the second to control the order to the said terminal equipment, the said terminal equipment decrypts and uses the encrypting electronic map received according to the second received and controlled order and key stored locally.
Compared with the prior art, the invention has the beneficial effects that:
1. the data application protection method encrypts data through the data encryption module to generate encrypted data and a secret key, stores the encrypted data in the server, distributes the secret key to the terminal equipment, separates the encrypted data from the secret key, and improves the security of the data stored in the network server.
2. Because the terminal equipment acquires data from the server through the synchronous control module, the terminal equipment is isolated from the Internet, and the terminal equipment is controlled through the synchronous control module, the risk of data leakage is avoided.
3. Because the terminal equipment acquires the data from the server, the terminal equipment does not need to store a large amount of data, and therefore the storage pressure of the terminal equipment is reduced.
4. The data application protection method mainly enhances the data security by changing the data transmission mode, and does not increase the difficulty of network construction.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a flowchart illustrating an embodiment of a data application protection method according to the present invention.
Fig. 2 is a block diagram of an embodiment of the data application protection apparatus of the present invention.
FIG. 3 is a flowchart of an embodiment of the out-of-field sketch verification method of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
A data application protection method is disclosed in FIG. 1.
As shown in fig. 1, the data application protection method includes the steps of:
step 101, encrypting the data to generate encrypted data and a secret key.
In this step, a separate encryption module is used.
Step 102, storing the encrypted data in a server, and distributing the key to the terminal equipment.
The server is a network server, and the terminal equipment is terminal equipment which has a decryption function and is isolated from the Internet.
Step 103, setting a synchronous control module and giving the synchronous control module a certain authority to extract the encrypted data from the server.
The synchronous control module has an instruction input function and a communication function, and the first control instruction comprises touch control, scaling and translation of the display content of the screen of the server, namely the synchronous control module can control the server, and control of a data extraction range, a data scaling and data selection is realized through the first control instruction, so that the server can extract encrypted data in the instruction range according to the first control instruction.
Step 104, the synchronous control module sends a first control instruction to the server, and the server extracts relevant encrypted data according to the first control instruction and transmits the extracted encrypted data back to the synchronous control module.
Step 105, the synchronous control module sends the encrypted data returned from the server to the corresponding terminal equipment through a simplex communication mode.
Step 106, the synchronous control module sends a second control instruction to the terminal equipment in a simplex communication mode, and the terminal equipment decrypts and uses the received encrypted data according to the second control instruction and the locally stored secret key.
The second control instruction comprises touch control, zooming and translation of the screen display content on the terminal equipment, namely the terminal equipment can be controlled through the synchronous control module.
The terminal equipment is controlled to decrypt and use the acquired encrypted data through the second control instruction, remote control can be realized, and a simplex communication mode is adopted, so that the terminal equipment can only receive the data of the synchronous control module, the data cannot be sent outwards, and a holder of the terminal equipment cannot copy or transfer the decrypted data in the terminal equipment, thereby preventing data leakage on the terminal equipment and ensuring data safety.
A data application protection device, please refer to fig. 2.
As shown in fig. 2, the data application protection device includes a data encryption module 201, a server 202, a terminal device 203, a synchronous control module 204, and a simplex communication module 205, where the data encryption module 201 is communicatively connected with the server 202 and the terminal device 203, or encrypted data and a secret key generated by the data encryption module 201 are restored to the server 202 and the terminal device 203 through a mobile storage device; the synchronous control module 204 is in communication connection with the server 202, and the synchronous control module 204 is in communication connection with the terminal device 203 through the simplex communication module 205.
The server 202 is a web server or a cloud server; the terminal device 203 is a desktop computer, a tablet computer, a mobile phone or a handheld electronic device capable of communication and having a display function; the synchronous control module 204 includes an input unit and a network transmission unit, wherein the input unit includes a touch screen, a keyboard, and a mouse, the input unit is used for inputting control instruction information, and then the control instruction information can be sent to a server or a terminal device through the network transmission unit, and the network transmission unit is a wired communication module or a wireless communication module.
The function modules of the data application protection device have the following functions:
the data encryption module 201 is configured to encrypt data to generate encrypted data and a key. The data encryption module 201 is a computer with an encryption function, and can encrypt data to generate encrypted data and a key.
The server 202 is configured to receive the encrypted data transmitted from the stored data encryption module 201.
The terminal device 203 receives the key transmitted from the stored data encryption module 201, and there may be a plurality of terminal devices 203, and the terminal device 203 further has a data decryption function and a data viewing function, for example, viewing data through a display screen.
The synchronous control module 204 is configured to receive a control instruction of a user having authority, and when the synchronous control module 204 receives the first control instruction, the synchronous control module 204 sends the first control instruction to the server 202, and the server 202 extracts relevant encrypted data according to the first control instruction and returns the extracted encrypted data to the synchronous control module 204. The synchronous control module 204 can control the server 202, for example, the first control instruction can be input through a start position of the mouse, a position after the mouse moves, and various key value instructions, and operations such as data selection, scaling, data extraction range and the like are implemented in the server 202.
The simplex communication module 205 is configured to implement simplex communication, the synchronous control module 204 sends the encrypted data returned from the server 202 to the corresponding terminal device 203 through the simplex communication module 204, and the synchronous control module 204 is capable of sending a second control instruction to the terminal device 203, where the terminal device 203 decrypts and displays the received encrypted data according to the received second control instruction and the locally stored secret key.
In the decryption process, the synchronous control module 204 can control the terminal device 203, and realize decryption and display of the obtained encrypted data according to the locally stored secret key.
Since the encrypted data in the terminal device is decrypted and used by the independent synchronous control module 204, remote control can be performed, and a simplex communication mode is adopted, the terminal device 203 can only receive the data of the synchronous control module, and cannot send data outwards, and the holder of the terminal device 203 cannot copy or externally transfer the decrypted data in the terminal device 203, so that data leakage on the terminal device 203 is prevented, and data security is ensured.
A method for checking a wild sketch is disclosed in FIG. 3.
As shown in fig. 3, the method for checking the wild sketch includes the following steps:
step 301, encrypting the secret-related electronic map to generate an encrypted electronic map and a secret key.
The confidential electronic map corresponds to confidential data, and the encryption of the confidential electronic map is completed by a special and independent computer.
Step 302, storing the encrypted electronic map in a server, and distributing the secret key to terminal equipment carried by the out-of-field survey and drawing checker.
The transfer and drawing checker is responsible for the field transfer and drawing check, the terminal equipment has the functions of decrypting and displaying the encrypted secret electronic map, the terminal equipment is isolated from the Internet, and the secret key is transferred to the terminal equipment through the mobile storage equipment. The terminal device may be a tablet computer, a mobile phone or a desktop computer isolated from the internet.
Step 303, the wild exterior verification checker carries the handheld verification device, and grants permission to the handheld verification device, so that the wild exterior verification checker can send a first control instruction to the server through the handheld verification device, and the encrypted electronic map is downloaded in a certain range.
The hand-held painting device has a function of communicating with a server, and can be a mobile phone, a computer or other electronic equipment with a communication function and a display function.
Step 304, the hand-held painting device sends the downloaded encrypted electronic map to the terminal device through the simplex communication module, and the hand-held painting device sends a second control instruction to the terminal device, and the terminal device decrypts and uses the received encrypted electronic map according to the received second control instruction and the locally stored secret key.
The method can be directly used for the wild sketch verification of the secret-related electronic map, the encrypted secret-related map is issued to a network server, a user with authority downloads data in a relevant range on the server through a handheld sketch device, the data are transmitted to terminal equipment for decryption and display in a simplex communication mode, and the field sketch verification is carried out.
It should be noted that in this document, terms such as "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (7)

1. A method of protecting data applications, comprising:
encrypting the data to generate encrypted data and a secret key;
storing the encrypted data in a server, and distributing the secret key to terminal equipment isolated from the Internet;
setting a synchronous control module and giving the synchronous control module a certain authority so as to extract encrypted data from the server;
the synchronous control module sends a first control instruction to the server, and the server extracts relevant encrypted data according to the first control instruction and transmits the extracted encrypted data back to the synchronous control module;
the synchronous control module sends the encrypted data returned from the server to corresponding terminal equipment in a simplex communication mode;
the synchronous control module sends a second control instruction to the terminal equipment in a simplex communication mode, and the terminal equipment decrypts and uses the received encrypted data according to the second control instruction and a locally stored secret key.
2. The data application protection method of claim 1, wherein: the first control instruction and the second control instruction comprise touch control, zooming and translation of screen display content.
3. A data application protection apparatus, comprising:
the data encryption module is used for encrypting the data and generating encrypted data and a secret key;
a server, wherein the encrypted data is stored in the server;
the secret key is distributed to the terminal equipment, and the terminal equipment is isolated from the Internet;
the synchronous control module is used for receiving a first control instruction of a user with authority, and when the synchronous control module receives the first control instruction, the synchronous control module sends the first control instruction to the server; the server extracts relevant encrypted data according to the first control instruction and transmits the extracted encrypted data back to the synchronous control module;
the synchronous control module is used for transmitting the encrypted data returned from the server to the corresponding terminal equipment through the simplex communication module;
the synchronous control module sends a second control instruction to the terminal equipment through the simplex communication module, and the terminal equipment decrypts and uses the received encrypted data according to the received second control instruction and the locally stored secret key.
4. A data application protection method according to claim 3, characterized in that: the server is a network server or a cloud server.
5. A data application protection device according to claim 3, characterized in that: the terminal equipment is a desktop computer, a tablet computer or a mobile phone.
6. A data application protection device according to claim 3, characterized in that: the synchronous control module comprises an input unit and a network transmission unit, wherein the input unit comprises a touch screen, a keyboard or/and a mouse.
7. The method for checking the wild external painting is characterized by comprising the following steps of:
encrypting the secret-related electronic map to generate an encrypted electronic map and a secret key;
storing the encrypted electronic map in a server, and distributing the secret key to terminal equipment carried by a wild sketch checker, wherein the terminal equipment is isolated from the Internet;
the method comprises the steps that a wild sketch checker carries a handheld sketch device and gives authority to the handheld sketch device, so that the wild sketch checker can send a first control instruction to the server through the handheld sketch device, and an encrypted electronic map is downloaded in a certain range;
the hand-held type transfers and draws the device and sends the encrypting electronic map that downloads to the said terminal equipment through simplex communication module, and the said hand-held type transfers and draws the device and sends the second to control the order to the said terminal equipment, the said terminal equipment decrypts and uses the encrypting electronic map received according to the second received and controlled order and key stored locally.
CN202111148176.8A 2021-09-28 2021-09-28 Data application protection method, equipment and wild external painting verification method Active CN114244551B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111148176.8A CN114244551B (en) 2021-09-28 2021-09-28 Data application protection method, equipment and wild external painting verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111148176.8A CN114244551B (en) 2021-09-28 2021-09-28 Data application protection method, equipment and wild external painting verification method

Publications (2)

Publication Number Publication Date
CN114244551A CN114244551A (en) 2022-03-25
CN114244551B true CN114244551B (en) 2024-01-30

Family

ID=80743020

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111148176.8A Active CN114244551B (en) 2021-09-28 2021-09-28 Data application protection method, equipment and wild external painting verification method

Country Status (1)

Country Link
CN (1) CN114244551B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202918377U (en) * 2012-08-22 2013-05-01 北京子衿晨风科技有限公司 Wired encryption communication system
CN103945182A (en) * 2014-04-04 2014-07-23 国家测绘地理信息局第三地形测量队 Wearable geographic information processing work station and information collection method
KR20160102948A (en) * 2016-08-22 2016-08-31 김주한 2-channel authentication system and method for a financial transfer
CN109087415A (en) * 2018-07-17 2018-12-25 珠海格力电器股份有限公司 A kind of method and apparatus of the data transmission based on cloud
CN109951513A (en) * 2019-01-11 2019-06-28 如般量子科技有限公司 Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card
CN110138749A (en) * 2019-04-23 2019-08-16 华为技术有限公司 Data security protection method and related equipment
CN110598429A (en) * 2019-08-30 2019-12-20 百富计算机技术(深圳)有限公司 Data encryption storage and reading method, terminal equipment and storage medium
CN112235301A (en) * 2020-10-14 2021-01-15 北京金山云网络技术有限公司 Method and device for verifying access authority and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202918377U (en) * 2012-08-22 2013-05-01 北京子衿晨风科技有限公司 Wired encryption communication system
CN103945182A (en) * 2014-04-04 2014-07-23 国家测绘地理信息局第三地形测量队 Wearable geographic information processing work station and information collection method
KR20160102948A (en) * 2016-08-22 2016-08-31 김주한 2-channel authentication system and method for a financial transfer
CN109087415A (en) * 2018-07-17 2018-12-25 珠海格力电器股份有限公司 A kind of method and apparatus of the data transmission based on cloud
CN109951513A (en) * 2019-01-11 2019-06-28 如般量子科技有限公司 Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card
CN110138749A (en) * 2019-04-23 2019-08-16 华为技术有限公司 Data security protection method and related equipment
CN110598429A (en) * 2019-08-30 2019-12-20 百富计算机技术(深圳)有限公司 Data encryption storage and reading method, terminal equipment and storage medium
CN112235301A (en) * 2020-10-14 2021-01-15 北京金山云网络技术有限公司 Method and device for verifying access authority and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于密钥分离与加密策略的云存储加密方案;王斌;杨鹏;杨青;;电信网技术(第09期);全文 *

Also Published As

Publication number Publication date
CN114244551A (en) 2022-03-25

Similar Documents

Publication Publication Date Title
KR101776635B1 (en) Apparatus for performing on behalf an electronic signature for client terminal and operating method thereof
CN103457727A (en) Method, device and system for processing media data
JP2011527804A (en) Information transmission using virtual input layout
USRE47324E1 (en) Data encryption systems and methods
CN103220295A (en) Document encryption and decryption method, device and system
CN103259651A (en) Encryption and decryption method and system of terminal data
CN107124409B (en) Access authentication method and device
CN109936546B (en) Data encryption storage method and device and computing equipment
CN105101183A (en) Method and system for protecting private contents at mobile terminal
CN103795780A (en) Cloud storage data protection method and device
CN102819704A (en) Document copyright protection method for intelligent terminal
CN106712938B (en) Quantum whiteboard communication method and system
CN108509799A (en) A kind of template document acquisition methods, apparatus and system
US9473471B2 (en) Method, apparatus and system for performing proxy transformation
KR101374594B1 (en) Security system and the method for cloud storage
KR20160100078A (en) Client Terminal for Supporting Banking Service, Authentication Server, Method and Application for User Terminal
CN114244551B (en) Data application protection method, equipment and wild external painting verification method
CN110022207A (en) Key management and the method and apparatus for handling data
JP4028849B2 (en) Communication system, portable terminal, and program
CN112636916A (en) Data processing method, data processing device, storage medium and electronic equipment
KR20210008303A (en) Secure interaction system and communication display device
CN116150776A (en) Privacy sharing method and system for sharing information
CN110063089A (en) Content transmission network including mobile device
CN108027850B (en) Electronic system and method for managing digital content related to art
WO2020079629A1 (en) A computer implemented method and system for securitisation of data captured in a web page or application executing on a remote mobile computing device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant