Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for realizing data security protection

A data security and legal technology, applied in the field of data security, can solve problems such as stealing application program files, hackers are easy to intrude, etc., and achieve the effect of improving security and ensuring reliability

Inactive Publication Date: 2015-03-18
ZICT TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. Hackers can easily invade the version control server and steal all application files on the version control server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing data security protection
  • Method and system for realizing data security protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] The current client uses the configured encryption key A to encrypt the source code, and sends a source code upload request to the access gateway, and the access gateway receives the source code upload request, and performs Identity verification, when it is determined that the user name and password input by the current client are correct, return the permission response message of the source code upload request to the current client, and the current client receives the upload permission After replying to the message, upload the encrypted source code to the version control server, and the version control server uses the configured decryption key A' to decrypt the encrypted source code and save it.

[0043] Here, the maximum number of times that the current client is allowed to input the user name and password within a specified period can also be set in the access gateway, for example, the specified period is one day, and the maximum number of times allowed to be input is ...

Embodiment 2

[0048] When the current client wants to download the source code (application file) stored in the version control server, the current client sends a source code download request to the access gateway, and the access gateway receives the source code download request , performing identity verification on the current client, and when it is determined that the user name and password input by the current client are correct, returning an allow response message of the source code download request to the current client, and notifying the The version control server transmits the source code stored in the version control server to the current client. The version control server encrypts the source code with the configured encryption key A, and then transmits it to the current client, and the current client uses the configured decryption key A' to decrypt the encrypted source code, and displays the decrypted after the source code.

[0049] Here, the maximum number of times that the clien...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing data security protection. The method comprises the steps that an access gateway is added between a client side and a version control server; the client side encrypts a source code by a configured encryption key; after receiving a source code uploading request from the client side, the access gateway performs authentication on the client side; if the client side passes authentication, the client side is allowed to upload the encrypted source code to the version control server; and the version control server decodes the encrypted source code uploaded by the client side by a configured decryption key. Furthermore, the invention also discloses a system for realizing data security protection. Through adoption of the system and the method, data transmission safety is improved, and data application reliability is guaranteed.

Description

technical field [0001] The invention relates to data security technology, in particular to a method and system for realizing data security protection. Background technique [0002] In an enterprise with independent research and development capabilities, the development of an engineering project often requires multiple R&D personnel. After each developer implements the part he is responsible for, he needs to upload the source code of the implemented project to the version control server. The source codes of the projects completed by the multiple R&D personnel are integrated by the version control server to generate an application program that can meet the requirements of the project. [0003] However, when the source code of the project is transmitted from the client to the version control server, or when the source code from the version control server is downloaded to the client for use by the R&D personnel, it is in plain text, and no security protection is adopted for the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/0428H04L63/08
Inventor 张亮
Owner ZICT TECH CO LTD