Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data protection method and device

A data protection and data technology, applied in the field of information security, can solve the problems of user key leakage, user loss, user privacy theft, etc., and achieve the effect of efficient, convenient and safe backup

Active Publication Date: 2021-01-08
北京纬百科技有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the user key is stored on the server, if the server is attacked or the information is leaked, the user key will be leaked, the user privacy will be stolen, and the user will suffer losses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data protection method and device
  • A data protection method and device
  • A data protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Various embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0024] figure 1 It is an exemplary flow chart of a data protection method according to an embodiment of the present invention. The data protection method in the embodiment of the present invention is applied to the server.

[0025] Such as figure 1 As shown, the data protection method of the embodiment of the present invention includes:

[0026] Backup phase:

[0027] S11. Receive the first encrypted data and the buddy list from the terminal device, wherein the buddy list includes contact information of N buddies, and the first encrypted data includes N subdata that use the public key pairs of the N buddies to form the first storage data Sub-data ciphertext obtained by encrypting respectively;

[0028] S12. Store each sub-data ciphertext in association with the contact information of the friend corresponding to the public key used for encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data protection method and device, which are applied to a server. The method comprises the following steps: a backup stage: receiving first encrypted data and a friend list from a terminal device, the friend list comprising contact information of N friends, the first encrypted data comprising sub-data ciphertexts obtained by respectively encrypting N sub-data forming first storage data by using public keys of the N friends; storing each sub-data ciphertext in association with the contact information of the friends corresponding to the public key usedfor encryption of the sub-data ciphertext; and a recovery stage: when receiving a recovery request for the first encrypted data from the terminal device, sending the sub-data ciphertext to L friendsin the N friends according to the associated contact information, so that the server or the terminal device recovers the first storage data according to the sub-data returned by the M friends in the Lfriends, L < = N and M < = L. Through the scheme provided by the embodiment of the invention, the data can be efficiently, conveniently and safely backed up.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data protection method and device. Background technique [0002] At present, related applications involving user privacy, such as banking and e-mail, all need to use user keys to encrypt and protect user data to prevent third parties from obtaining user privacy and causing security incidents. [0003] In order to prevent users from losing their mobile phones or other secure smart devices, resulting in unrecoverable user-related data, various applications will back up user keys on the server to prevent unrecoverable user keys. [0004] However, when the user key is stored on the server, if the server is attacked or the information is leaked, the user key will be leaked, and user privacy will be stolen, causing losses to the user. Contents of the invention [0005] In view of this, an embodiment of the present invention proposes a data protection method and device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
Inventor 孙吉平杨磊
Owner 北京纬百科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products