Method and system for realizing data security protection
A data security and legal technology, applied in the field of data security, can solve problems such as stealing application program files, hackers are easy to intrude, etc., and achieve the effect of improving security and ensuring reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] The current client uses the configured encryption key A to encrypt the source code, and sends a source code upload request to the access gateway, and the access gateway receives the source code upload request, and performs Identity verification, when it is determined that the user name and password input by the current client are correct, return the permission response message of the source code upload request to the current client, and the current client receives the upload permission After replying to the message, upload the encrypted source code to the version control server, and the version control server uses the configured decryption key A' to decrypt the encrypted source code and save it.
[0043] Here, the maximum number of times that the current client is allowed to input the user name and password within a specified period can also be set in the access gateway, for example, the specified period is one day, and the maximum number of times allowed to be input is ...
Embodiment 2
[0048] When the current client wants to download the source code (application file) stored in the version control server, the current client sends a source code download request to the access gateway, and the access gateway receives the source code download request , performing identity verification on the current client, and when it is determined that the user name and password input by the current client are correct, returning an allow response message of the source code download request to the current client, and notifying the The version control server transmits the source code stored in the version control server to the current client. The version control server encrypts the source code with the configured encryption key A, and then transmits it to the current client, and the current client uses the configured decryption key A' to decrypt the encrypted source code, and displays the decrypted after the source code.
[0049] Here, the maximum number of times that the clien...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 