[go: up one dir, main page]

CN113111398A - Data security storage method and device for preventing illegal stealing - Google Patents

Data security storage method and device for preventing illegal stealing Download PDF

Info

Publication number
CN113111398A
CN113111398A CN202110418365.6A CN202110418365A CN113111398A CN 113111398 A CN113111398 A CN 113111398A CN 202110418365 A CN202110418365 A CN 202110418365A CN 113111398 A CN113111398 A CN 113111398A
Authority
CN
China
Prior art keywords
data
volatile memory
key
memory
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110418365.6A
Other languages
Chinese (zh)
Inventor
龙应斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110418365.6A priority Critical patent/CN113111398A/en
Publication of CN113111398A publication Critical patent/CN113111398A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data security storage method and a device for preventing illegal stealing, wherein the method comprises the following steps: acquiring encrypted data stored in an internal memory on computing equipment and comprising a hard disk; writing the encrypted data to a volatile memory, which may be an external memory of the computing device; decrypting the encrypted data in the volatile memory by using the secret key stored in the volatile memory to obtain decrypted data; receiving a data acquisition request for reading the decrypted data; judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request; if illegal, a power-down command is sent. By the method and the device, the problem that the decrypted data are stored in the internal memory possibly to cause insecurity in the prior art is solved, and the data security is improved.

Description

Data security storage method and device for preventing illegal stealing
Technical Field
The present application relates to the field of security, and in particular, to a method and an apparatus for securely storing data that is protected from being illegally stolen.
Background
Currently, data security is very important, especially for some security technologies.
In the prior art, an encryption mode is generally adopted for data security, and the processing mode omits a problem: when encrypted data is decrypted, there is still a possibility of leakage of such decrypted data.
For example, in a computing device, the decrypted data is now placed in a hard disk, and after the work is finished, the worker may forget to delete the decrypted data from the computing device, and at this time, the decrypted data may be leaked.
Disclosure of Invention
The embodiment of the application provides a data security storage method and device for preventing illegal stealing, and at least solves the problem that the decrypted data is stored in a hard disk possibly to cause insecurity in the prior art.
According to one aspect of the application, a data security storage method for preventing illegal stealing is provided, which comprises the following steps: acquiring encrypted data stored in a hard disk on computing equipment, wherein the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory; writing the encrypted data to a volatile memory; decrypting the encrypted data in the volatile memory using a key stored in the volatile memory to obtain decrypted data, wherein the decrypted data is stored in the volatile memory; receiving a data acquisition request for reading the decrypted data; judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request; and if the data is illegal, sending a power-off command, wherein the power-off command is used for indicating the volatile memory to be powered off, and all data stored in the volatile memory after the volatile memory is powered off is lost.
Further, before decrypting the encrypted data using the key, the method further comprises: obtaining the secret key; and storing the acquired secret key in the volatile memory.
Further, obtaining the key comprises: after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network; receiving the key from the key server via the virtual local area network.
Further, the non-volatile memory is an internal memory of the computing device; the volatile memory is an external memory and is connected with the computing equipment when in use.
According to another aspect of the present application, there is also provided a data security storage apparatus for preventing illegal theft, comprising: the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring encrypted data stored in a hard disk on computing equipment, the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory; a write module for writing the encrypted data to a volatile memory; the decryption module is used for decrypting the encrypted data in the volatile memory by using a secret key stored in the volatile memory to obtain decrypted data, wherein the decrypted data are stored in the volatile memory; a receiving module, configured to receive a data acquisition request for reading the decrypted data; the sending module is used for judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request; and the command module is used for sending a power-off command if the data is illegal, wherein the power-off command is used for indicating the power-off of the volatile memory, and all data stored in the volatile memory after the power-off of the volatile memory is lost.
Further, the obtaining module is further configured to obtain the secret key, and store the obtained secret key in the volatile memory.
Further, the obtaining module is configured to obtain the secret key by: after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network; receiving the key from the key server via the virtual local area network.
Further, the non-volatile memory is an internal memory of the computing device; the volatile memory is an external memory and is connected with the computing equipment when in use.
According to another aspect of the present application, there is also provided a memory for storing software for performing the above-described method.
According to another aspect of the application, there is also provided a memory for executing software for performing the above method.
In the embodiment of the application, encrypted data stored in a hard disk on computing equipment is acquired, wherein the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory; writing the encrypted data to a volatile memory; decrypting the encrypted data in the volatile memory using a key stored in the volatile memory to obtain decrypted data, wherein the decrypted data is stored in the volatile memory; receiving a data acquisition request for reading the decrypted data; judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request; and if the data is illegal, sending a power-off command, wherein the power-off command is used for indicating the volatile memory to be powered off, and all data stored in the volatile memory after the volatile memory is powered off is lost. By the method and the device, the problem that the decrypted data are stored in the hard disk possibly to cause insecurity in the prior art is solved, and the data security is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
FIG. 1 is a flow chart of a method for securely storing data that is protected from illegal theft according to an embodiment of the present application;
fig. 2 is a block diagram of a data security storage device protected from illegal theft according to an embodiment of the present application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
In the present embodiment, a data security storage method for preventing illegal theft is provided, and fig. 1 is a flowchart of a data security storage method for preventing illegal theft according to an embodiment of the present application, as shown in fig. 1, the method includes the following steps:
step S102, acquiring encrypted data stored in a hard disk on computing equipment, wherein the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory; the nonvolatile memory is arranged in the computing equipment and is an internal memory thereof;
step S104, writing the encrypted data into a volatile memory, wherein the volatile memory is an external memory and is connected with the computing equipment when in use;
step S106, decrypting the encrypted data in the volatile memory by using the secret key stored in the volatile memory to obtain decrypted data, wherein the decrypted data is stored in the volatile memory;
step S108, receiving a data acquisition request for reading the decrypted data;
step S110, judging whether the data acquisition request is legal, and if so, sending corresponding decrypted data according to the data acquisition request;
as an optional implementation manner, a permission request is sent to a permission server, where the permission of the permission request is used to indicate the permission to read the data in the volatile memory, and the permission server sends a permission list in response to the permission request, where the permission list is a process name, and a process in the permission list can read the data in the volatile memory. And judging whether the name of the process for reading the data from the volatile memory is in the authority list or not, and if not, judging that the data read at this time is illegal.
As another optional implementation, the data content that the data acquisition request desires to acquire may be acquired, and the identification information of the data content is recorded, and then the identification information and the name of the process that reads the data are sent to the authority server, and the authority server determines the reason for illegally acquiring the data according to the identification information of the data content and the name of the process that reads the data.
And step S112, if the data is illegal, sending a power-off command, wherein the power-off command is used for indicating the power-off of the volatile memory, and all data stored in the volatile memory after the power-off of the volatile memory is lost.
As an optional implementation manner, after the power-off command is sent, the time of sending the power-off command is recorded, the reason why the data acquisition request is judged to be illegal is recorded, and the time and the reason of sending the power-off command are sent to an administrator.
The above-described method steps may be implemented by software installed in a computing device. As an optional implementation, the volatile memory further includes a data interface for data interaction. The volatile memory is detachably connected to the computing device and provided with a first power supply interface, a mobile power supply can be used for supplying power to the volatile memory through the first power supply interface, the volatile memory device is also provided with a second power supply interface, the second power supply interface is used for being connected with the computing device, the volatile memory is supplied with power through the computing device, the volatile memory further comprises a processor, the processor is connected to a controllable switch, and the controllable switch is used for simultaneously controlling the power-off and power-on of the first power supply interface and the second power supply interface. The controllable switch returns to a connected state after each power-on, in which the volatile memory is powered on. The processor is used for receiving a power-off command and controlling the controllable switch to be powered off according to the power-off command.
In the above optional embodiment, the mobile power supply is connected to the first power supply interface to supply power, and then the volatile memory is connected to the key server, where the connection may be a physical connection, the data interface is connected to the key server, the key is copied to the volatile memory, the first power supply interface power supply is kept continuously powered, the data interface is disconnected, and then the mobile power supply and the volatile storage device are moved to the computing device to connect the data interface to the computing device.
By the steps, the problem that the decrypted data are stored in the hard disk possibly to cause insecurity in the prior art is solved, and the data security is improved.
Preferably, before decrypting the encrypted data using the key, the method further comprises: obtaining the secret key; and storing the acquired secret key in the volatile memory.
Preferably, obtaining the key comprises: after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network; receiving the key from the key server via the virtual local area network.
As an optional implementation manner, a unique identifier of the volatile memory is obtained, where the unique identifier is used to uniquely identify the volatile memory, the key obtaining request carries the unique identifier, after receiving the key obtaining request, the key server reads the unique identifier from the key obtaining request, and when the unique identifier is in a preconfigured white list, the key is sent. Such a handling is more secure.
Preferably, the key has a length of 2048 bits.
In this embodiment, an electronic device is provided, comprising a memory in which a computer program is stored and a processor configured to run the computer program to perform the method in the above embodiments.
The electronic device may further include a device or system formed by software modules, where the modules in the device or system correspond to the steps in the foregoing embodiments, for example, in this embodiment, the device or system formed by the software modules may be referred to as a data security storage device for preventing illegal theft, as shown in fig. 2, the device includes: the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring encrypted data stored in a hard disk on computing equipment, the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory; a write module for writing the encrypted data to a volatile memory; the decryption module is used for decrypting the encrypted data in the volatile memory by using a secret key stored in the volatile memory to obtain decrypted data, wherein the decrypted data are stored in the volatile memory; a receiving module, configured to receive a data acquisition request for reading the decrypted data; the sending module is used for judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request; and the command module is used for sending a power-off command if the data is illegal, wherein the power-off command is used for indicating the power-off of the volatile memory, and all data stored in the volatile memory after the power-off of the volatile memory is lost.
Preferably, the obtaining module is further configured to obtain the secret key, and store the obtained secret key in the volatile memory.
Preferably, the obtaining module is configured to obtain the secret key by: after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network; receiving the key from the key server via the virtual local area network.
Preferably, the key has a length of 2048 bits.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A data security storage method for preventing illegal stealing is characterized by comprising the following steps:
acquiring encrypted data stored in a hard disk on computing equipment, wherein the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory;
writing the encrypted data to a volatile memory;
decrypting the encrypted data in the volatile memory using a key stored in the volatile memory to obtain decrypted data, wherein the decrypted data is stored in the volatile memory;
receiving a data acquisition request for reading the decrypted data;
judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request;
and if the data is illegal, sending a power-off command, wherein the power-off command is used for indicating the volatile memory to be powered off, and all data stored in the volatile memory after the volatile memory is powered off is lost.
2. The method of claim 1, wherein prior to decrypting the encrypted data using the key, the method further comprises:
obtaining the secret key;
and storing the acquired secret key in the volatile memory.
3. The method of claim 2, wherein obtaining the key comprises:
after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network;
receiving the key from the key server via the virtual local area network.
4. The method of any of claims 1-3, wherein the non-volatile memory is an internal memory of a computing device; the volatile memory is an external memory and is connected with the computing equipment when in use.
5. A data security storage device protected from unauthorized theft, comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring encrypted data stored in a hard disk on computing equipment, the data stored in the hard disk are all encrypted data, and the hard disk is a nonvolatile memory;
a write module for writing the encrypted data to a volatile memory;
the decryption module is used for decrypting the encrypted data in the volatile memory by using a secret key stored in the volatile memory to obtain decrypted data, wherein the decrypted data are stored in the volatile memory;
a receiving module, configured to receive a data acquisition request for reading the decrypted data;
the sending module is used for judging whether the data acquisition request is legal or not, and if so, sending corresponding decrypted data according to the data acquisition request;
and the command module is used for sending a power-off command if the data is illegal, wherein the power-off command is used for indicating the power-off of the volatile memory, and all data stored in the volatile memory after the power-off of the volatile memory is lost.
6. The apparatus of claim 5, wherein the obtaining module is further configured to obtain the key and store the obtained key in the volatile memory.
7. The apparatus of claim 6, wherein the obtaining module is configured to obtain the key by:
after the volatile memory is powered on, sending a key acquisition request to a key server through a virtual local area network;
receiving the key from the key server via the virtual local area network.
8. The apparatus of any of claims 5-7, wherein the non-volatile memory is an internal memory of a computing device; the volatile memory is an external memory and is connected with the computing equipment when in use.
9. Memory for storing software for performing the method of any one of claims 1 to 4.
10. Memory for executing software for performing the method of any one of claims 1 to 4.
CN202110418365.6A 2021-04-19 2021-04-19 Data security storage method and device for preventing illegal stealing Pending CN113111398A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110418365.6A CN113111398A (en) 2021-04-19 2021-04-19 Data security storage method and device for preventing illegal stealing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110418365.6A CN113111398A (en) 2021-04-19 2021-04-19 Data security storage method and device for preventing illegal stealing

Publications (1)

Publication Number Publication Date
CN113111398A true CN113111398A (en) 2021-07-13

Family

ID=76718347

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110418365.6A Pending CN113111398A (en) 2021-04-19 2021-04-19 Data security storage method and device for preventing illegal stealing

Country Status (1)

Country Link
CN (1) CN113111398A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114510753A (en) * 2022-04-20 2022-05-17 浙江地芯引力科技有限公司 Memory data protection method and device, electronic equipment and storage medium
CN115776389A (en) * 2022-11-01 2023-03-10 龙应斌 Anti-theft data access security method and system based on trusted authentication link
US11706022B1 (en) 2022-04-25 2023-07-18 Nanhu Laboratory Method for trusted data decryption based on privacy-preserving computation

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101329657A (en) * 2007-06-19 2008-12-24 瑞达信息安全产业股份有限公司 System and method for safe sharing dynamic memory of multi-application space
US20120311346A1 (en) * 2011-06-06 2012-12-06 Cleversafe, Inc. Securing a data segment for storage
CN103198263A (en) * 2012-10-26 2013-07-10 马国强 Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key
CN104680079A (en) * 2015-02-04 2015-06-03 上海信息安全工程技术研究中心 Electronic document security management system and electronic document security management method
CN105376242A (en) * 2015-11-26 2016-03-02 上海斐讯数据通信技术有限公司 Cloud terminal data access authentication method, cloud terminal data access authentication system and cloud terminal management system
US20160203086A1 (en) * 2015-01-12 2016-07-14 Phison Electronics Corp. Data protection method, memory control circuit unit and memory storage device
CN107566113A (en) * 2017-09-29 2018-01-09 郑州云海信息技术有限公司 The symmetrical encipher-decipher methods of 3DES, system and computer-readable recording medium
CN109255225A (en) * 2018-09-18 2019-01-22 鸿秦(北京)科技有限公司 Hard disc data security control apparatus based on dual-identity authentication
CN109923548A (en) * 2016-10-11 2019-06-21 佰倬信息科技有限责任公司 Method, system and the computer program product that encryption data realizes data protection are accessed by supervisory process
CN210984285U (en) * 2020-02-10 2020-07-10 北京睿云信安科技有限公司 Mobile storage device easy to destroy data quickly
CN111666577A (en) * 2020-06-07 2020-09-15 厦门亿联网络技术股份有限公司 Data decryption method, device, equipment and storage medium
CN111832057A (en) * 2020-08-20 2020-10-27 杭州银核存储区块链有限公司 Self-destruction method for U disk file
CN111967025A (en) * 2020-07-19 2020-11-20 苏州浪潮智能科技有限公司 Method, device, equipment and storage medium for encrypting and protecting server starting option
CN112231716A (en) * 2019-07-15 2021-01-15 珠海艾派克微电子有限公司 Data anti-theft device and anti-theft method

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101329657A (en) * 2007-06-19 2008-12-24 瑞达信息安全产业股份有限公司 System and method for safe sharing dynamic memory of multi-application space
US20120311346A1 (en) * 2011-06-06 2012-12-06 Cleversafe, Inc. Securing a data segment for storage
CN103198263A (en) * 2012-10-26 2013-07-10 马国强 Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key
US20160203086A1 (en) * 2015-01-12 2016-07-14 Phison Electronics Corp. Data protection method, memory control circuit unit and memory storage device
CN104680079A (en) * 2015-02-04 2015-06-03 上海信息安全工程技术研究中心 Electronic document security management system and electronic document security management method
CN105376242A (en) * 2015-11-26 2016-03-02 上海斐讯数据通信技术有限公司 Cloud terminal data access authentication method, cloud terminal data access authentication system and cloud terminal management system
CN109923548A (en) * 2016-10-11 2019-06-21 佰倬信息科技有限责任公司 Method, system and the computer program product that encryption data realizes data protection are accessed by supervisory process
CN107566113A (en) * 2017-09-29 2018-01-09 郑州云海信息技术有限公司 The symmetrical encipher-decipher methods of 3DES, system and computer-readable recording medium
CN109255225A (en) * 2018-09-18 2019-01-22 鸿秦(北京)科技有限公司 Hard disc data security control apparatus based on dual-identity authentication
CN112231716A (en) * 2019-07-15 2021-01-15 珠海艾派克微电子有限公司 Data anti-theft device and anti-theft method
CN210984285U (en) * 2020-02-10 2020-07-10 北京睿云信安科技有限公司 Mobile storage device easy to destroy data quickly
CN111666577A (en) * 2020-06-07 2020-09-15 厦门亿联网络技术股份有限公司 Data decryption method, device, equipment and storage medium
CN111967025A (en) * 2020-07-19 2020-11-20 苏州浪潮智能科技有限公司 Method, device, equipment and storage medium for encrypting and protecting server starting option
CN111832057A (en) * 2020-08-20 2020-10-27 杭州银核存储区块链有限公司 Self-destruction method for U disk file

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
裴华艳 等: "基于可信计算的多租户隐私数据保护", 《计算机系统应用》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114510753A (en) * 2022-04-20 2022-05-17 浙江地芯引力科技有限公司 Memory data protection method and device, electronic equipment and storage medium
CN114510753B (en) * 2022-04-20 2023-04-07 浙江地芯引力科技有限公司 Memory data protection method and device, electronic equipment and storage medium
US11706022B1 (en) 2022-04-25 2023-07-18 Nanhu Laboratory Method for trusted data decryption based on privacy-preserving computation
NL2033980A (en) 2022-04-25 2023-11-07 Nanhu Laboratory New method for trusted data decryption based on privacy-preserving computation
CN115776389A (en) * 2022-11-01 2023-03-10 龙应斌 Anti-theft data access security method and system based on trusted authentication link
CN115776389B (en) * 2022-11-01 2023-11-07 龙应斌 Anti-theft data security access method and system based on trusted authentication link

Similar Documents

Publication Publication Date Title
JP3312024B2 (en) Storage medium, revocation information updating method and apparatus
CN113111398A (en) Data security storage method and device for preventing illegal stealing
CN107508801B (en) Method and device for preventing file from being tampered
EP1067447A2 (en) Storage medium and contents protection method using the storage medium
US20130067242A1 (en) Managing self-encrypting drives in decentralized environments
CN104318176B (en) Data management method and device for terminal and terminal
CN102799803A (en) Secure removable media and method for managing the same
CN103268455A (en) Method and device for accessing data
CN110188555A (en) A kind of hard disk data protection method, system and associated component
CN101739361A (en) Access control method, access control device and terminal device
CN109064596B (en) Password management method and device and electronic equipment
US20100205460A1 (en) Encryption method for digital data memory card and assembly for performing the same
JP2007522707A (en) Backup and restoration of DRM security data
CN103530581A (en) Hard disk encrypting method and operation system
CN104216693B (en) A kind of method and device that device identification is provided
CN118839359A (en) Data storage management method of solid state disk
CN103177224A (en) Method and device for data protection of external memory card of terminal
CN111049657B (en) A kind of CAN bus network equipment node access authority management method and system
CN109344656B (en) Database data encryption/decryption method, device and equipment
US20090119744A1 (en) Device component roll back protection scheme
CN103440465A (en) Mobile storage medium safety control method
KR100547556B1 (en) Secure kernel system supporting encrypted file system
KR101405915B1 (en) Method for storing encrypted data and method for reading encrypted data
CN114329649B (en) Key protection method, usage method, and key management system for encrypted hard disk
US20070056040A1 (en) Data carrier belonging to an authorized domain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210713

RJ01 Rejection of invention patent application after publication