Secure memory data protection method and device

A technology for storing data and protecting devices, applied in the field of information security

Active Publication Date: 2017-04-26
WUHAN DOUYU NETWORK TECH CO LTD
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For another example, when the client logs in to the server, it will enter the password information, then this password information is also stored in the memory of the client software, if it is simply stored in plain text, it can be easily obtained by HACK

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure memory data protection method and device
  • Secure memory data protection method and device
  • Secure memory data protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0042] Such as figure 1 As shown, a safe memory data protection method includes the following steps:

[0043] S101) splitting the memory data to be protected into independent byte data one by one;

[0044] The data protection algorithm of this application will disassemble the entire data into individual bytes, and each independent byte will be encrypted and stored separately;

[0045] S102) Generate some false byte data and mix in the real data split in the previous step;

[0046] This application generates some fake data to be mixed with the real data, so that it becomes more difficult to call out the real data separate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure memory data protection method and device. The method comprises the following steps: (1) splitting memory data to be protected into independent byte data one by one; (2) generating a plurality of false byte data, and mixing into split real data; (3) designing a plurality of encryption and decryption functions for encrypting the data, and numbering the functions in sequence; (4) storing each independent byte data, wherein a storage format includes the following field information; and (5) storing each independent data unit with a redistributed memory, and storing a storage address of each independent data unit into a multilevel pointer. The secure memory data protection method is designed under the consideration of data encryption from an angle of inconvenient HACK reverse analysis, so that the data can be protected more securely, and the method is easy to implement.

Description

technical field [0001] The invention relates to information security technology, in particular to a safe memory data protection method and device. Background technique [0002] At present, there will be some important data in the client software. In order to prevent HACK from easily obtaining these data, the data needs to be encrypted and protected for storage. For example, for chat software, the server will tell the client the KEY value used by an encryption algorithm, and the client will use the KEY value provided by the server to encrypt and save the chat content. After the client receives the KEY value from the server, the KEY value is stored in the memory of the client software, so if it is simply stored in the memory without encryption, it is easy to be obtained by HACK, so that HACK can Use the corresponding encryption algorithm to decrypt the chat content. For another example, when the client logs in to the server, it will input password information, then this pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/60
Inventor 周志刚
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products