A data protection method and device
A data protection and data technology, applied in the field of information security, can solve the problems of user key leakage, user loss, user privacy theft, etc., and achieve the effect of efficient, convenient and safe backup
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] Various embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
[0024] figure 1 It is an exemplary flow chart of a data protection method according to an embodiment of the present invention. The data protection method in the embodiment of the present invention is applied to the server.
[0025] Such as figure 1 As shown, the data protection method of the embodiment of the present invention includes:
[0026] Backup phase:
[0027] S11. Receive the first encrypted data and the buddy list from the terminal device, wherein the buddy list includes contact information of N buddies, and the first encrypted data includes N subdata that use the public key pairs of the N buddies to form the first storage data Sub-data ciphertext obtained by encrypting respectively;
[0028] S12. Store each sub-data ciphertext in association with the contact information of the friend corresponding to the public key used for encryp...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com