Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and apparatus for data processing

A data processing and data grouping technology, applied in the field of data security, can solve problems such as increasing complexity and system cost, and achieve the effect of improving safe access

Inactive Publication Date: 2018-07-20
MEDIATEK INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the development of new technologies for secure hacking of computer systems and data storage systems (e.g., remote attacks), there is a continuing need for effective methods to improve data security without increasing complexity and / or system cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for data processing
  • Method and apparatus for data processing
  • Method and apparatus for data processing

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0028] image 3 A schematic diagram of an exemplary device 300 according to an embodiment of the invention is shown. The device 300 can perform various functions to implement schemes, techniques, processes and methods related to anti-rollback of secure data versions, including the above operation 100 and operation 200 and the process 400 and process 500 described below. Device 300 may be part of an electronic device, which may be a portable or mobile device, a wearable device, a wireless communication device, or a computing device. For example, apparatus 300 may be implemented in a smartphone, smart watch, smart bracelet, smart necklace, personal digital assistant, or computing device such as a tablet, laptop, laptop, desktop, or server. Optionally, the device 300 may be implemented in the form of one or more integrated circuit chips, such as but not limited to one or more single-core processors, one or more multi-core processors, or one or more complex instruction set comput...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and an apparatus for data processing. The method comprises: performing first comparison on a locally stored version number of a set of data with a remotely stored version number of the set of data; according to a positive result of the first comparison, reading data file, the data file containing the set of data and the version number of the set of data; performing second comparison on the locally stored version number with a version number of the set of data included in the data file; and accessing the set of data according to a positive result of the second comparison. The method and the apparatus for data processing can effectively improve secure access of security data.

Description

technical field [0001] The present invention relates generally to data security, and more particularly to a technique for preventing rollback attacks (rollback) on some secure data versions by remote attacks. Background technique [0002] Unless otherwise stated, the approaches described in this section are not antecedents to the claims listed above and are not admitted to be antecedents by their incorporation in this section. Data security generally refers to the protection of data, such as databases and / or data files, from destructive forces and unwanted actions by unauthorized users. For example, a remote attack targeting one or more computers looking for a weak point in the computer's security software or network to gain access to the computer or system is a malicious act. The main reasons for remote attacks are to illegally browse or obtain secure data, introduce viruses or other malware, and / or cause damage to the targeted computer or network. Various data security t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/72
CPCG06F21/6227G06F21/72G06F21/645G06F2221/033G06F2221/2151G06F21/64
Inventor 高拉·阿罗拉
Owner MEDIATEK INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More