Network-based data self-destruction method
A data and network technology, applied in the field of information security, can solve problems such as user privacy security and hidden dangers, and achieve the effects of improving security, realizing regularization and flattening, and protecting integrity and effectiveness.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] Create a web service application that includes the following modules:
[0030] The data monitoring module is used to monitor all records in the database in real time and destroy expired records;
[0031] The data storage module is used to store user-input data slices and hashes into the database management system, add data self-destruct timestamps, and generate data self-destruct format links;
[0032] The data extraction module is used for extracting data from the database management system according to the input data self-destructing format link.
[0033] It is compiled using Microsoft Visual Studio.Net 2005 platform in x86 architecture computer system, and published through Internet Information Service service middleware. Use IBM x51 as web server.
[0034] When a user uses an x86 architecture miniature personal computer to input user data to the network server, the web service application program deployed on the network server invokes the storage module, receives ...
Embodiment 2
[0045] The user uses a browser supporting the hypertext transfer protocol to input user data through the server-side web interface, and the user data is "Across the great wall we can reach every corner in the world.". After the user data is submitted to the web server, the web server calls the data storage module on the web service for processing, fragments the user data according to the fragment size of 2048, and uses the fifth version of the message digest algorithm to hash the corresponding hash of each fragment value, and add a data self-destruct timestamp 2010-11-19 13:11:23 to the fragmented data, store it in the database management system, and mix it with other records. Finally, a request string is returned to the user's browser with a link in a data self-destructing format.
[0046] The user fills the request string with the link in the data self-destruct format into the HTML code segment of the user email and sends it.
[0047] After the receiver receives the data co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 