A data processing method and a related apparatus

A data processing device and data processing technology, applied in the field of data processing, can solve the problems of no data protection and low data security, and achieve the effect of improving security and realizing encryption protection

Inactive Publication Date: 2019-01-04
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, when using non-volatile memory to write and read data, usually no encryption processing is performed, such writing and reading do not have any protective effect on data, and the security of data is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method and a related apparatus
  • A data processing method and a related apparatus
  • A data processing method and a related apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0043] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein can be practiced in sequences other than those illustrated or descri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data processing method. The method is applied to a trusted platform control module TPCM. The method comprises the following steps: when receiving a data read-write instruction, obtaining a password to be matched; judging whether the password to be matched is consistent with a preset password according to the data reading and writing instruction; if the password to be matched coincides with the preset password, the target data being read and written in the TPCM according to the data read / write instruction. The embodiment of the invention also discloses a data processing device. The embodiment of the invention provides a method, which realizes the encryption protection of data and improves the security of data.

Description

technical field [0001] The present invention relates to the field of data security, in particular to a data processing method and a related device. Background technique [0002] Trusted platform control module (trusted platform control module, TPCM) can also be called a trusted chip, which is a branch of trusted computing research field, proposed by Academician Shen Changxiang. At present, TPCM is in its infancy in our country, and there is no large-scale application. TPCM is the core control module of the trusted computing platform, which physically provides three trust roots for trusted applications: trusted measurement root, trusted storage root and trusted reporting root. Based on this, the trusted measurement function, trusted storage function and trusted reporting function of the trusted computing platform are extended. The TPCM idea is based on cryptographic algorithms, encrypts data in the system, authenticates users who access the system, and establishes a trust c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 程学超
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products