Private data-based network security sharing method and communication terminal

A private data and communication terminal technology, which is applied in the field of private data-based network security sharing methods and communication terminals, can solve the problems of many technologies, no solutions, and various types

Active Publication Date: 2012-10-31
SUNINFO INFORMATION TECH
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many and various types of implementation technologies using this method, and there is still no complete solution
[0008] In summ

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private data-based network security sharing method and communication terminal
  • Private data-based network security sharing method and communication terminal
  • Private data-based network security sharing method and communication terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037] figure 1 It is a schematic diagram of the structure of the communication terminal of the present invention, the communication terminal 100 is connected to the server 200, and the communication terminal 100 can be a computer, a mobile phone, a PDA (Personal Digital Assistant, a personal digital assistant), a tablet computer, etc., and the The communication terminal 100 includes a virtual disk module 10, a file storage module 20, a data writing module 30 and a data reading module 40, wherein:

[0038] The virtual disk module 10 is used to virtualize a certain file into a virtual disk file.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the technical field of computer network safety, and provides a private data-based network security sharing method and a communication terminal. The private data-based network security sharing method comprises the following steps of: virtualizing a document to a virtual disk document; storing the virtual disk document to a server through a preset drive and a protocol; transmitting encrypted private data to the server through a network after the private data is automatically encrypted on the communication terminal, and then writing the encrypted private data into the virtual disk document; reading the encrypted private data from the virtual disk document of the server, and transmitting the encrypted private data to the communication terminal through a network, and then transmitting the decrypted private data to an application after automatically decrypted. Therefore, the invention realizes a private data network sharing three-dimensional protection system, ensures storage safety and network transmission safety of private data during network sharing, is convenient and easy, comprehensive and efficient, and realizes real-time synchronization of shared data.

Description

technical field [0001] The invention relates to the technical field of computer network security, and is used for security protection of private data in network sharing, in particular to a network security sharing method based on private data and a communication terminal. Background technique [0002] With the rapid development of computer and information technology, especially network technology, data information has become the most critical resource of the whole society. Enterprises and institutions need to share and access more and more data information, which is becoming more and more important. Therefore, how to ensure the information security of private data in network sharing has become a major problem to be solved urgently. At present, in order to protect the security of private data based on network sharing, the following two methods are mainly adopted: one is to encrypt the data. Encryption algorithms are used to encrypt data for storage and transmission, making i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/56H04L9/32
Inventor 曾洪宁
Owner SUNINFO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products