Unlock instant, AI-driven research and patent intelligence for your innovation.

A data confidential storage method and client

A data security, client-side technology, applied in the network field, can solve the problems of unrecoverable encrypted volumes and overall unavailability, and achieve the effect of strong data recovery capability, shared delivery, and improved recovery capability.

Active Publication Date: 2017-09-08
ZHEJIANG TMALL TECH CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In terms of data recovery, the current solution can repair the situation where one of the headers is damaged. If both the header and the backup header are damaged, an external source header needs to be imported for recovery. At this time, if the header is not backed up in time, the encrypted volume cannot be restored. recover
If the data area is damaged, there is basically no way to restore sensitive data, that is, damage to key locations will lead to overall unavailability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data confidential storage method and client
  • A data confidential storage method and client
  • A data confidential storage method and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] Embodiment 1, a data security storage method, such as figure 1 shown, including:

[0081] S101. After the encrypted volume file is created or the user password of the encrypted volume file is changed, the plaintext information of the abstract of the encrypted volume file is exported;

[0082] S102, using the user password and different salt values ​​to generate at least three digest keys;

[0083] S103, encrypt the plaintext information of the derived digest with different digest keys respectively, and obtain at least three encrypted digests;

[0084] S104. Replace the local digest and the backup digest of the encrypted volume file with the two encrypted digests respectively; synchronize the third encrypted digest to the cloud as the digest of the encrypted volume file in the cloud.

[0085] In this embodiment, since the cloud digest is encrypted locally with the user password, the digest cannot be decrypted in the cloud, and thus the data in the encrypted volume file...

Embodiment 2

[0179] Embodiment 2, a client, such as Figure 9 shown, including:

[0180] The export module 91 is used to export the plaintext information of the digest of the encrypted volume file after creating the encrypted volume file or after changing the user password of the encrypted volume file;

[0181] a key generation module 92 for generating at least three digest keys by using a user password and different salt values;

[0182] Encryption module 93, for encrypting the plaintext information of the derived digest with different digest keys respectively, to obtain at least three encrypted digests;

[0183] The updating module 94 is configured to replace the local digest and the backup digest of the encrypted volume file with two encrypted digests respectively; and synchronize the third encrypted digest to the cloud as the digest of the encrypted volume file in the cloud.

[0184] In an alternative solution of this embodiment, the client may further include:

[0185] The calculat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a data confidential storage method and a client; the method includes: after creating an encrypted volume file or changing the user password of the encrypted volume file, exporting the plain text information of the summary of the encrypted volume file; using the user password and Generate at least three digest keys with different salt values; encrypt the plaintext information of the derived digests with different digest keys respectively to obtain at least three encrypted digests; replace the local encrypted volume file with two encrypted digests Digest and Backup Digest; Synchronize the third encrypted digest to the cloud as the digest of the encrypted volume file in the cloud. This application can effectively protect and securely synchronize sensitive data of users.

Description

technical field [0001] The invention relates to the field of networks, and in particular, to a method for storing data confidentially and a client. Background technique [0002] With the rapid development of informatization today, data security has been paid more and more attention; how to protect the sensitive data that users need to keep secret has become a research focus in data storage. [0003] The current protection of sensitive data is mainly based on TrueCrypt technology, an open source storage security solution used to create and maintain a real-time encrypted volume. The entire file system of the encrypted volume is encrypted and can only be opened by the user after entering the correct password. The general operation steps are as follows: [0004] First, after installing the program and driver, create a file as a content container. When the user password is entered correctly, the driver can load this file into a drive letter, and the user can perform file operat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 王含章
Owner ZHEJIANG TMALL TECH CO LTD