Data protection method and device, data recovery method and device

A data protection and data technology, applied in the computer field, can solve problems such as data unrecoverable

Active Publication Date: 2018-12-18
BEIJING SENSESHIELD TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, when using a personal key to encrypt data and store it in the cloud, once the personal key is cracked or lost, the data will be unrecoverable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and device, data recovery method and device
  • Data protection method and device, data recovery method and device
  • Data protection method and device, data recovery method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Various embodiments of the present invention will be described in detail below with reference to the specification.

[0029] figure 1 It is a schematic flowchart of an embodiment of the data protection method of the present invention.

[0030] Such as figure 1 As shown, the data protection method of this embodiment includes:

[0031] S101. Determine a plurality of sub-data constituting the first data to be stored;

[0032] In the embodiment of the present invention, the first data to be stored may be composed of multiple sub-data, for example, after the multiple sub-data are generated, the multiple sub-data are combined to obtain the first data to be stored. As an example, the first data to be stored may be a character string with a predetermined structure, which is composed of multiple fields, and the substring in each field is a subdata; the first data to be stored may be a set of files, in which Each file is a piece of sub-data; the first data to be stored may al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data protection method, comprising the steps of determining a plurality of pieces of sub-data forming first to-be-stored data and encrypting at least one piece of sub-data inthe plurality of pieces of sub-data through utilization of a public key of a contact person; and at least storing the encrypted sub-data to a server as first encrypted data and sending a correlationmessage to the server, wherein the correlation message is used for indicating the fact of carrying out correlated storage on the contact information of the contact person and the encrypted sub-data. The invention also discloses a data protection device. Through application of the data protection scheme provided by the invention, the security level of the data can be effectively improved.

Description

technical field [0001] The invention relates to the computer field, in particular to a data protection method and device, and a data recovery method and device. Background technique [0002] The Internet has brought convenience and efficiency to people's lives and business operations, but it has also greatly increased the risk of data security. In recent years, various data security incidents have occurred frequently. Data security has become an issue that people pay close attention to, involving private sensitive data, technology, financial, military and other confidential data. [0003] At present, there are many schemes for encrypting and protecting important data, such as encrypting and obfuscating data, adopting higher security information security devices (such as dongles), hard disk encryption, etc. This increases the security and increases the difficulty of cracking, but it is not foolproof. For example, when using a personal key to encrypt data and store it in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L63/0478H04L67/1097
Inventor 孙吉平念龙龙
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products