Data security protection method and related device

A data security and data technology, applied in the field of communication, can solve problems such as leakage, achieve the effect of improving speed and avoiding network congestion

Active Publication Date: 2019-08-16
PETAL CLOUD TECH CO LTD
View PDF10 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, there is a risk of leakage when the user transmits personal data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method and related device
  • Data security protection method and related device
  • Data security protection method and related device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0101] The terminology used in the embodiment of the present invention is only used to explain specific embodiments of the present invention, and is not intended to limit the present invention.

[0102] The following describes a process in which a user uses a terminal to backup and download personal data in the cloud in a conventional solution.

[0103] The terminal encrypts the user's personal data according to the user's secret key, and then the terminal uploads the encrypted user's personal data to the storage server for backup. There is no user's secret key in the storage server, so the encrypted personal data of the user cannot be accessed. Vendors that provide decryption services deploy independent decryption servers, which are responsible for obtaining keys from user terminals and storing them in a key library. When the user needs to download the user's personal data that has been backed up in the cloud, the decryption server is responsible for the user's personal data obta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data security protection method and a related device. The method comprises the steps that a first terminal sends the first ciphertext information to a secret key server, wherein the first ciphertext information is obtained by encrypting a first password by the first terminal according to a public key from the secret key server; the first terminal receives the second ciphertext information sent by the secret key server, wherein the second ciphertext information is obtained by encrypting a second password of the key server according to the first password after the key server decrypts the first ciphertext information according to the private key corresponding to the public key to obtain the first password; the first terminal decrypts the second ciphertext information according to the first password to obtain a second password; and the first terminal sends the data encrypted by the second password to a storage server. Through the implementation of the embodiment, the security of the personal data of the user during the cloud backup process can be improved, and the data leakage risk is avoided.

Description

technical field [0001] The invention relates to data transmission technology in the communication field, in particular to a data security protection method and related equipment. Background technique [0002] Cloud backup is to back up the user's personal data, such as contacts, text messages, pictures, videos, etc., to the network through cloud storage. As cloud backup technology becomes more and more mature, more and more users like to back up personal data in mobile phones to the cloud. In this way, users can not only free up a large amount of mobile phone storage space, but also download from the cloud anytime and anywhere when they need to use these personal data. [0003] Since most of the personal data in the user's mobile phone involves personal privacy, we need to have higher protection requirements for the user's personal data, so as to prevent the user's personal data from being stolen and causing damage to the user's interests. However, in the prior art, there ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L63/0478H04L63/0815H04L63/083H04L65/60H04L67/1097H04L65/61
Inventor 刘红林李高峰
Owner PETAL CLOUD TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products