Method and system for protecting data
A technology for protecting data and data, applied in the field of data security, can solve the problems of excessive specialization and high hardware cost, achieve low professional requirements, low hardware cost, reduce the workload of system implementation and deployment and the impact on human resources required effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0022] The embodiment of the present invention provides a method for protecting data, see figure 1 , including:
[0023] 11: Extract the environment information of the equipment in the security environment (referred to as the security environment information for short), and acquire the environment factor according to the security environment information.
[0024] The above devices are the devices where the data to be protected resides.
[0025] 12: Encrypt the sensitive data in the device by using the security environment factor, and destroy the environment factor after confirming that the encryption is successful.
[0026] The above-mentioned security environment can be the working environment when the equipment is installed for the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com