Method and system for protecting data

A technology for protecting data and data, applied in the field of data security, can solve the problems of excessive specialization and high hardware cost, achieve low professional requirements, low hardware cost, reduce the workload of system implementation and deployment and the impact on human resources required effect

Active Publication Date: 2012-08-01
GOERTEK INC
View PDF8 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a method and system for protecting data to solve the problems of high hardware cost and strong specialization in existing solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting data
  • Method and system for protecting data
  • Method and system for protecting data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0022] The embodiment of the present invention provides a method for protecting data, see figure 1 , including:

[0023] 11: Extract the environment information of the equipment in the security environment (referred to as the security environment information for short), and acquire the environment factor according to the security environment information.

[0024] The above devices are the devices where the data to be protected resides.

[0025] 12: Encrypt the sensitive data in the device by using the security environment factor, and destroy the environment factor after confirming that the encryption is successful.

[0026] The above-mentioned security environment can be the working environment when the equipment is installed for the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for protecting data. The method for protecting the data, which is provided by the embodiment of the invention, comprises the steps that in primary initialization process of equipment where data are located, environmental factors are obtained according to the environmental information of the equipment in a security environment; sensitive data in the equipment are encrypted by utilizing the environmental factors in the security environment, and after the encryption determinately succeeds, the environmental factors are destroyed; each time the equipment is started, environmental factors are obtained according to the environmental information of the equipment in the current environment, then the encrypted sensitive data in the equipment are decrypted by utilizing the environmental factors in the current environment; and if the decryption succeeds, the access of the data in the equipment is allowed, and if the decryption fails, the access of the data in the equipment is denied. The hardware cost needed by the scheme is low, and the risk of data leakage can be greatly reduced.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method and system for protecting data. Background technique [0002] With the popularization of information carrier equipment, more and more automatic control and information processing systems adopt embedded architecture, and social organizations such as individuals and enterprises rely more and more on information carrier equipment. Embedded devices are a commonly used information carrier device. The popularity of embedded devices improves social production efficiency and facilitates production control on the one hand. On the other hand, it also raises security protection requirements for various information records in the system. specific requirements. [0003] In recent years, the research and development of many information security vendors on data protection technology is mainly limited to how to protect the data security of embedded devices in the network, such as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/00G06F21/60
CPCH04L29/06G06F21/6209H04L9/001H04L9/0866H04L63/0428H04W12/02G06F2221/2107H04W12/65H04W12/63G06F21/6218
Inventor 姜斌斌
Owner GOERTEK INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products