Unlock instant, AI-driven research and patent intelligence for your innovation.

Network-based data self-destruction method

A data and network technology, applied in the field of information security, can solve problems such as user privacy security and hidden dangers, and achieve the effects of improving security, realizing regularization and flattening, and protecting integrity and effectiveness.

Active Publication Date: 2014-05-07
HOHAI UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After these data copies are out of the user's control, it may cause security risks to the user's privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network-based data self-destruction method
  • Network-based data self-destruction method
  • Network-based data self-destruction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Create a web service application that includes the following modules:

[0030] The data monitoring module is used to monitor all records in the database in real time and destroy expired records;

[0031] The data storage module is used to store user-input data slices and hashes into the database management system, add data self-destruct timestamps, and generate data self-destruct format links;

[0032] The data extraction module is used for extracting data from the database management system according to the input data self-destructing format link.

[0033] It is compiled using Microsoft Visual Studio.Net 2005 platform in x86 architecture computer system, and published through Internet Information Service service middleware. Use IBM x51 as web server.

[0034] When a user uses an x86 architecture miniature personal computer to input user data to the network server, the web service application program deployed on the network server invokes the storage module, receives ...

Embodiment 2

[0045] The user uses a browser supporting the hypertext transfer protocol to input user data through the server-side web interface, and the user data is "Across the great wall we can reach every corner in the world.". After the user data is submitted to the web server, the web server calls the data storage module on the web service for processing, fragments the user data according to the fragment size of 2048, and uses the fifth version of the message digest algorithm to hash the corresponding hash of each fragment value, and add a data self-destruct timestamp 2010-11-19 13:11:23 to the fragmented data, store it in the database management system, and mix it with other records. Finally, a request string is returned to the user's browser with a link in a data self-destructing format.

[0046] The user fills the request string with the link in the data self-destruct format into the HTML code segment of the user email and sends it.

[0047] After the receiver receives the data co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network-based data self-destruction method, and belongs to a data protection technology in the field of information security. The method comprises the following steps of: fragmenting user data according to preset fragmentation length; calculating a hash value of each fragment by using a unilateral hash function respectively; adding a data self-destruction time stamp into each fragment; storing in a database management system; and generating and returning a link in a data self-destruction format to a user. Meanwhile, all records are circularly queried by a network server through a database management system interface; and if the self-destruction time stamp of a record is earlier than the current system time, the record of which the self-destruction time stamp is earlier than the current system time is deleted. The method has the effect and benefit of realizing on-time self-destruction of the user data stored in a network through data hash, so that the privacy and the timeliness of the user data are guaranteed.

Description

technical field [0001] The invention provides a network-based data self-destruct method, which belongs to the data protection technology in the field of information security. Background technique [0002] The development of network technology provides great convenience for data transmission and storage. In contrast, due to the complexity of the network topology and the distribution of network servers, the deletion of data on the network has become a difficult problem. [0003] During the network transmission of user data, due to artificial settings or server policies, some copies will inevitably be generated. After these data copies are out of the user's control, they may pose a security risk to the user's privacy. To solve this problem, the traditional method is to encrypt user data on the network, such as Microsoft's DRM technology and Sony's Magic Gate technology. However, with the rapid development of computer computing power, the success rate of brute force cracking ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08G06F17/30
Inventor 傅晓王志坚许峰王宇
Owner HOHAI UNIV