Data protecting method and device
A data protection and key data technology, applied in the field of data security, can solve problems such as inability to guarantee the security of key data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0074] Among many technologies for protecting key data, encrypted storage of key data is the most widely used technology. By encrypting and storing key data, data security can be greatly improved and it is difficult for attackers to obtain private data. However, this method has limitations: purely encrypted storage cannot fundamentally solve the security problem of key data. Since key data also needs to be used in the program, the key for encrypting key data will also be stored in memory, exposing In front of the attacker, at the same time, if there are many accesses to key data, the encryption and decryption operations will also cause a large performance loss. In addition, the threat model of the above methods does not consider the malicious operating system. How to prevent the theft of key data in the application under the threat model of the malicious operating system is also a problem worth exploring.
[0075] In the cloud computing platform, the services provided by many...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


