CN113111398A - Data security storage method and device for preventing illegal stealing - Google Patents
Data security storage method and device for preventing illegal stealing Download PDFInfo
- Publication number
- CN113111398A CN113111398A CN202110418365.6A CN202110418365A CN113111398A CN 113111398 A CN113111398 A CN 113111398A CN 202110418365 A CN202110418365 A CN 202110418365A CN 113111398 A CN113111398 A CN 113111398A
- Authority
- CN
- China
- Prior art keywords
- data
- volatile memory
- key
- memory
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a data security storage method and a device for preventing illegal stealing, wherein the method comprises the following steps: acquiring encrypted data stored in an internal memory on computing equipment and comprising a hard disk; writing the encrypted data to a volatile memory, which may be an external memory of the computing device; decrypting the encrypted data in the volatile memory by using the secret key stored in the volatile memory to obtain decrypted data; receiving a data acquisition request for reading the decrypted data; judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request; if illegal, a power-down command is sent. By the method and the device, the problem that the decrypted data are stored in the internal memory possibly to cause insecurity in the prior art is solved, and the data security is improved.
Description
Technical Field
The present application relates to the field of security, and in particular, to a method and an apparatus for securely storing data that is protected from being illegally stolen.
Background
Currently, data security is very important, especially for some security technologies.
In the prior art, an encryption mode is generally adopted for data security, and the processing mode omits a problem: when encrypted data is decrypted, there is still a possibility of leakage of such decrypted data.
For example, in a computing device, the decrypted data is now placed in a hard disk, and after the work is finished, the worker may forget to delete the decrypted data from the computing device, and at this time, the decrypted data may be leaked.
Disclosure of Invention
The embodiment of the application provides a data security storage method and device for preventing illegal stealing, and at least solves the problem that the decrypted data is stored in a hard disk possibly to cause insecurity in the prior art.
According to one aspect of the application, a data security storage method for preventing illegal stealing is provided, which comprises the following steps: acquiring encrypted data stored in a hard disk on computing equipment, wherein the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory; writing the encrypted data to a volatile memory; decrypting the encrypted data in the volatile memory using a key stored in the volatile memory to obtain decrypted data, wherein the decrypted data is stored in the volatile memory; receiving a data acquisition request for reading the decrypted data; judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request; and if the data is illegal, sending a power-off command, wherein the power-off command is used for indicating the volatile memory to be powered off, and all data stored in the volatile memory after the volatile memory is powered off is lost.
Further, before decrypting the encrypted data using the key, the method further comprises: obtaining the secret key; and storing the acquired secret key in the volatile memory.
Further, obtaining the key comprises: after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network; receiving the key from the key server via the virtual local area network.
Further, the non-volatile memory is an internal memory of the computing device; the volatile memory is an external memory and is connected with the computing equipment when in use.
According to another aspect of the present application, there is also provided a data security storage apparatus for preventing illegal theft, comprising: the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring encrypted data stored in a hard disk on computing equipment, the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory; a write module for writing the encrypted data to a volatile memory; the decryption module is used for decrypting the encrypted data in the volatile memory by using a secret key stored in the volatile memory to obtain decrypted data, wherein the decrypted data are stored in the volatile memory; a receiving module, configured to receive a data acquisition request for reading the decrypted data; the sending module is used for judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request; and the command module is used for sending a power-off command if the data is illegal, wherein the power-off command is used for indicating the power-off of the volatile memory, and all data stored in the volatile memory after the power-off of the volatile memory is lost.
Further, the obtaining module is further configured to obtain the secret key, and store the obtained secret key in the volatile memory.
Further, the obtaining module is configured to obtain the secret key by: after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network; receiving the key from the key server via the virtual local area network.
Further, the non-volatile memory is an internal memory of the computing device; the volatile memory is an external memory and is connected with the computing equipment when in use.
According to another aspect of the present application, there is also provided a memory for storing software for performing the above-described method.
According to another aspect of the application, there is also provided a memory for executing software for performing the above method.
In the embodiment of the application, encrypted data stored in a hard disk on computing equipment is acquired, wherein the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory; writing the encrypted data to a volatile memory; decrypting the encrypted data in the volatile memory using a key stored in the volatile memory to obtain decrypted data, wherein the decrypted data is stored in the volatile memory; receiving a data acquisition request for reading the decrypted data; judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request; and if the data is illegal, sending a power-off command, wherein the power-off command is used for indicating the volatile memory to be powered off, and all data stored in the volatile memory after the volatile memory is powered off is lost. By the method and the device, the problem that the decrypted data are stored in the hard disk possibly to cause insecurity in the prior art is solved, and the data security is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
FIG. 1 is a flow chart of a method for securely storing data that is protected from illegal theft according to an embodiment of the present application;
fig. 2 is a block diagram of a data security storage device protected from illegal theft according to an embodiment of the present application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
In the present embodiment, a data security storage method for preventing illegal theft is provided, and fig. 1 is a flowchart of a data security storage method for preventing illegal theft according to an embodiment of the present application, as shown in fig. 1, the method includes the following steps:
step S102, acquiring encrypted data stored in a hard disk on computing equipment, wherein the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory; the nonvolatile memory is arranged in the computing equipment and is an internal memory thereof;
step S104, writing the encrypted data into a volatile memory, wherein the volatile memory is an external memory and is connected with the computing equipment when in use;
step S106, decrypting the encrypted data in the volatile memory by using the secret key stored in the volatile memory to obtain decrypted data, wherein the decrypted data is stored in the volatile memory;
step S108, receiving a data acquisition request for reading the decrypted data;
step S110, judging whether the data acquisition request is legal, and if so, sending corresponding decrypted data according to the data acquisition request;
as an optional implementation manner, a permission request is sent to a permission server, where the permission of the permission request is used to indicate the permission to read the data in the volatile memory, and the permission server sends a permission list in response to the permission request, where the permission list is a process name, and a process in the permission list can read the data in the volatile memory. And judging whether the name of the process for reading the data from the volatile memory is in the authority list or not, and if not, judging that the data read at this time is illegal.
As another optional implementation, the data content that the data acquisition request desires to acquire may be acquired, and the identification information of the data content is recorded, and then the identification information and the name of the process that reads the data are sent to the authority server, and the authority server determines the reason for illegally acquiring the data according to the identification information of the data content and the name of the process that reads the data.
And step S112, if the data is illegal, sending a power-off command, wherein the power-off command is used for indicating the power-off of the volatile memory, and all data stored in the volatile memory after the power-off of the volatile memory is lost.
As an optional implementation manner, after the power-off command is sent, the time of sending the power-off command is recorded, the reason why the data acquisition request is judged to be illegal is recorded, and the time and the reason of sending the power-off command are sent to an administrator.
The above-described method steps may be implemented by software installed in a computing device. As an optional implementation, the volatile memory further includes a data interface for data interaction. The volatile memory is detachably connected to the computing device and provided with a first power supply interface, a mobile power supply can be used for supplying power to the volatile memory through the first power supply interface, the volatile memory device is also provided with a second power supply interface, the second power supply interface is used for being connected with the computing device, the volatile memory is supplied with power through the computing device, the volatile memory further comprises a processor, the processor is connected to a controllable switch, and the controllable switch is used for simultaneously controlling the power-off and power-on of the first power supply interface and the second power supply interface. The controllable switch returns to a connected state after each power-on, in which the volatile memory is powered on. The processor is used for receiving a power-off command and controlling the controllable switch to be powered off according to the power-off command.
In the above optional embodiment, the mobile power supply is connected to the first power supply interface to supply power, and then the volatile memory is connected to the key server, where the connection may be a physical connection, the data interface is connected to the key server, the key is copied to the volatile memory, the first power supply interface power supply is kept continuously powered, the data interface is disconnected, and then the mobile power supply and the volatile storage device are moved to the computing device to connect the data interface to the computing device.
By the steps, the problem that the decrypted data are stored in the hard disk possibly to cause insecurity in the prior art is solved, and the data security is improved.
Preferably, before decrypting the encrypted data using the key, the method further comprises: obtaining the secret key; and storing the acquired secret key in the volatile memory.
Preferably, obtaining the key comprises: after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network; receiving the key from the key server via the virtual local area network.
As an optional implementation manner, a unique identifier of the volatile memory is obtained, where the unique identifier is used to uniquely identify the volatile memory, the key obtaining request carries the unique identifier, after receiving the key obtaining request, the key server reads the unique identifier from the key obtaining request, and when the unique identifier is in a preconfigured white list, the key is sent. Such a handling is more secure.
Preferably, the key has a length of 2048 bits.
In this embodiment, an electronic device is provided, comprising a memory in which a computer program is stored and a processor configured to run the computer program to perform the method in the above embodiments.
The electronic device may further include a device or system formed by software modules, where the modules in the device or system correspond to the steps in the foregoing embodiments, for example, in this embodiment, the device or system formed by the software modules may be referred to as a data security storage device for preventing illegal theft, as shown in fig. 2, the device includes: the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring encrypted data stored in a hard disk on computing equipment, the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory; a write module for writing the encrypted data to a volatile memory; the decryption module is used for decrypting the encrypted data in the volatile memory by using a secret key stored in the volatile memory to obtain decrypted data, wherein the decrypted data are stored in the volatile memory; a receiving module, configured to receive a data acquisition request for reading the decrypted data; the sending module is used for judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request; and the command module is used for sending a power-off command if the data is illegal, wherein the power-off command is used for indicating the power-off of the volatile memory, and all data stored in the volatile memory after the power-off of the volatile memory is lost.
Preferably, the obtaining module is further configured to obtain the secret key, and store the obtained secret key in the volatile memory.
Preferably, the obtaining module is configured to obtain the secret key by: after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network; receiving the key from the key server via the virtual local area network.
Preferably, the key has a length of 2048 bits.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (10)
1. A data security storage method for preventing illegal stealing is characterized by comprising the following steps:
acquiring encrypted data stored in a hard disk on computing equipment, wherein the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory;
writing the encrypted data to a volatile memory;
decrypting the encrypted data in the volatile memory using a key stored in the volatile memory to obtain decrypted data, wherein the decrypted data is stored in the volatile memory;
receiving a data acquisition request for reading the decrypted data;
judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request;
and if the data is illegal, sending a power-off command, wherein the power-off command is used for indicating the volatile memory to be powered off, and all data stored in the volatile memory after the volatile memory is powered off is lost.
2. The method of claim 1, wherein prior to decrypting the encrypted data using the key, the method further comprises:
obtaining the secret key;
and storing the acquired secret key in the volatile memory.
3. The method of claim 2, wherein obtaining the key comprises:
after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network;
receiving the key from the key server via the virtual local area network.
4. The method of any of claims 1-3, wherein the non-volatile memory is an internal memory of a computing device; the volatile memory is an external memory and is connected with the computing equipment when in use.
5. A data security storage device protected from unauthorized theft, comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring encrypted data stored in a hard disk on computing equipment, the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory;
a write module for writing the encrypted data to a volatile memory;
the decryption module is used for decrypting the encrypted data in the volatile memory by using a secret key stored in the volatile memory to obtain decrypted data, wherein the decrypted data are stored in the volatile memory;
a receiving module, configured to receive a data acquisition request for reading the decrypted data;
the sending module is used for judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request;
and the command module is used for sending a power-off command if the data is illegal, wherein the power-off command is used for indicating the power-off of the volatile memory, and all data stored in the volatile memory after the power-off of the volatile memory is lost.
6. The apparatus of claim 5, wherein the obtaining module is further configured to obtain the key and store the obtained key in the volatile memory.
7. The apparatus of claim 6, wherein the obtaining module is configured to obtain the key by:
after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network;
receiving the key from the key server via the virtual local area network.
8. The apparatus of any of claims 5-7, wherein the non-volatile memory is an internal memory of a computing device; the volatile memory is an external memory and is connected with the computing equipment when in use.
9. Memory for storing software for performing the method of any one of claims 1 to 4.
10. Memory for executing software for performing the method of any one of claims 1 to 4.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110418365.6A CN113111398A (en) | 2021-04-19 | 2021-04-19 | Data security storage method and device for preventing illegal stealing |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110418365.6A CN113111398A (en) | 2021-04-19 | 2021-04-19 | Data security storage method and device for preventing illegal stealing |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN113111398A true CN113111398A (en) | 2021-07-13 |
Family
ID=76718347
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202110418365.6A Pending CN113111398A (en) | 2021-04-19 | 2021-04-19 | Data security storage method and device for preventing illegal stealing |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN113111398A (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114510753A (en) * | 2022-04-20 | 2022-05-17 | 浙江地芯引力科技有限公司 | Memory data protection method and device, electronic equipment and storage medium |
| CN115776389A (en) * | 2022-11-01 | 2023-03-10 | 龙应斌 | Anti-theft data access security method and system based on trusted authentication link |
| US11706022B1 (en) | 2022-04-25 | 2023-07-18 | Nanhu Laboratory | Method for trusted data decryption based on privacy-preserving computation |
Citations (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101329657A (en) * | 2007-06-19 | 2008-12-24 | 瑞达信息安全产业股份有限公司 | System and method for safe sharing dynamic memory of multi-application space |
| US20120311346A1 (en) * | 2011-06-06 | 2012-12-06 | Cleversafe, Inc. | Securing a data segment for storage |
| CN103198263A (en) * | 2012-10-26 | 2013-07-10 | 马国强 | Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key |
| CN104680079A (en) * | 2015-02-04 | 2015-06-03 | 上海信息安全工程技术研究中心 | Electronic document security management system and electronic document security management method |
| CN105376242A (en) * | 2015-11-26 | 2016-03-02 | 上海斐讯数据通信技术有限公司 | Cloud terminal data access authentication method, cloud terminal data access authentication system and cloud terminal management system |
| US20160203086A1 (en) * | 2015-01-12 | 2016-07-14 | Phison Electronics Corp. | Data protection method, memory control circuit unit and memory storage device |
| CN107566113A (en) * | 2017-09-29 | 2018-01-09 | 郑州云海信息技术有限公司 | The symmetrical encipher-decipher methods of 3DES, system and computer-readable recording medium |
| CN109255225A (en) * | 2018-09-18 | 2019-01-22 | 鸿秦(北京)科技有限公司 | Hard disc data security control apparatus based on dual-identity authentication |
| CN109923548A (en) * | 2016-10-11 | 2019-06-21 | 佰倬信息科技有限责任公司 | Method, system and the computer program product that encryption data realizes data protection are accessed by supervisory process |
| CN210984285U (en) * | 2020-02-10 | 2020-07-10 | 北京睿云信安科技有限公司 | Mobile storage device easy to destroy data quickly |
| CN111666577A (en) * | 2020-06-07 | 2020-09-15 | 厦门亿联网络技术股份有限公司 | Data decryption method, device, equipment and storage medium |
| CN111832057A (en) * | 2020-08-20 | 2020-10-27 | 杭州银核存储区块链有限公司 | Self-destruction method for U disk file |
| CN111967025A (en) * | 2020-07-19 | 2020-11-20 | 苏州浪潮智能科技有限公司 | Method, device, equipment and storage medium for encrypting and protecting server starting option |
| CN112231716A (en) * | 2019-07-15 | 2021-01-15 | 珠海艾派克微电子有限公司 | Data anti-theft device and anti-theft method |
-
2021
- 2021-04-19 CN CN202110418365.6A patent/CN113111398A/en active Pending
Patent Citations (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101329657A (en) * | 2007-06-19 | 2008-12-24 | 瑞达信息安全产业股份有限公司 | System and method for safe sharing dynamic memory of multi-application space |
| US20120311346A1 (en) * | 2011-06-06 | 2012-12-06 | Cleversafe, Inc. | Securing a data segment for storage |
| CN103198263A (en) * | 2012-10-26 | 2013-07-10 | 马国强 | Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key |
| US20160203086A1 (en) * | 2015-01-12 | 2016-07-14 | Phison Electronics Corp. | Data protection method, memory control circuit unit and memory storage device |
| CN104680079A (en) * | 2015-02-04 | 2015-06-03 | 上海信息安全工程技术研究中心 | Electronic document security management system and electronic document security management method |
| CN105376242A (en) * | 2015-11-26 | 2016-03-02 | 上海斐讯数据通信技术有限公司 | Cloud terminal data access authentication method, cloud terminal data access authentication system and cloud terminal management system |
| CN109923548A (en) * | 2016-10-11 | 2019-06-21 | 佰倬信息科技有限责任公司 | Method, system and the computer program product that encryption data realizes data protection are accessed by supervisory process |
| CN107566113A (en) * | 2017-09-29 | 2018-01-09 | 郑州云海信息技术有限公司 | The symmetrical encipher-decipher methods of 3DES, system and computer-readable recording medium |
| CN109255225A (en) * | 2018-09-18 | 2019-01-22 | 鸿秦(北京)科技有限公司 | Hard disc data security control apparatus based on dual-identity authentication |
| CN112231716A (en) * | 2019-07-15 | 2021-01-15 | 珠海艾派克微电子有限公司 | Data anti-theft device and anti-theft method |
| CN210984285U (en) * | 2020-02-10 | 2020-07-10 | 北京睿云信安科技有限公司 | Mobile storage device easy to destroy data quickly |
| CN111666577A (en) * | 2020-06-07 | 2020-09-15 | 厦门亿联网络技术股份有限公司 | Data decryption method, device, equipment and storage medium |
| CN111967025A (en) * | 2020-07-19 | 2020-11-20 | 苏州浪潮智能科技有限公司 | Method, device, equipment and storage medium for encrypting and protecting server starting option |
| CN111832057A (en) * | 2020-08-20 | 2020-10-27 | 杭州银核存储区块链有限公司 | Self-destruction method for U disk file |
Non-Patent Citations (1)
| Title |
|---|
| 裴华艳 等: "基于可信计算的多租户隐私数据保护", 《计算机系统应用》 * |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114510753A (en) * | 2022-04-20 | 2022-05-17 | 浙江地芯引力科技有限公司 | Memory data protection method and device, electronic equipment and storage medium |
| CN114510753B (en) * | 2022-04-20 | 2023-04-07 | 浙江地芯引力科技有限公司 | Memory data protection method and device, electronic equipment and storage medium |
| US11706022B1 (en) | 2022-04-25 | 2023-07-18 | Nanhu Laboratory | Method for trusted data decryption based on privacy-preserving computation |
| NL2033980A (en) | 2022-04-25 | 2023-11-07 | Nanhu Laboratory | New method for trusted data decryption based on privacy-preserving computation |
| CN115776389A (en) * | 2022-11-01 | 2023-03-10 | 龙应斌 | Anti-theft data access security method and system based on trusted authentication link |
| CN115776389B (en) * | 2022-11-01 | 2023-11-07 | 龙应斌 | Anti-theft data security access method and system based on trusted authentication link |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP3312024B2 (en) | Storage medium, revocation information updating method and apparatus | |
| CN113111398A (en) | Data security storage method and device for preventing illegal stealing | |
| CN107508801B (en) | Method and device for preventing file from being tampered | |
| EP1067447A2 (en) | Storage medium and contents protection method using the storage medium | |
| US20130067242A1 (en) | Managing self-encrypting drives in decentralized environments | |
| CN104318176B (en) | Data management method and device for terminal and terminal | |
| CN102799803A (en) | Secure removable media and method for managing the same | |
| CN103268455A (en) | Method and device for accessing data | |
| CN110188555A (en) | A kind of hard disk data protection method, system and associated component | |
| CN101739361A (en) | Access control method, access control device and terminal device | |
| CN109064596B (en) | Password management method and device and electronic equipment | |
| US20100205460A1 (en) | Encryption method for digital data memory card and assembly for performing the same | |
| JP2007522707A (en) | Backup and restoration of DRM security data | |
| CN103530581A (en) | Hard disk encrypting method and operation system | |
| CN104216693B (en) | A kind of method and device that device identification is provided | |
| CN118839359A (en) | Data storage management method of solid state disk | |
| CN103177224A (en) | Method and device for data protection of external memory card of terminal | |
| CN111049657B (en) | A kind of CAN bus network equipment node access authority management method and system | |
| CN109344656B (en) | Database data encryption/decryption method, device and equipment | |
| US20090119744A1 (en) | Device component roll back protection scheme | |
| CN103440465A (en) | Mobile storage medium safety control method | |
| KR100547556B1 (en) | Secure kernel system supporting encrypted file system | |
| KR101405915B1 (en) | Method for storing encrypted data and method for reading encrypted data | |
| CN114329649B (en) | Key protection method, usage method, and key management system for encrypted hard disk | |
| US20070056040A1 (en) | Data carrier belonging to an authorized domain |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210713 |
|
| RJ01 | Rejection of invention patent application after publication |