Data security protection method and related device
A data security and data technology, applied in the field of communication, can solve problems such as leakage, achieve the effect of improving speed and avoiding network congestion
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0101] The terminology used in the embodiment of the present invention is only used to explain specific embodiments of the present invention, and is not intended to limit the present invention.
[0102] The following describes a process in which a user uses a terminal to backup and download personal data in the cloud in a conventional solution.
[0103] The terminal encrypts the user's personal data according to the user's secret key, and then the terminal uploads the encrypted user's personal data to the storage server for backup. There is no user's secret key in the storage server, so the encrypted personal data of the user cannot be accessed. Vendors that provide decryption services deploy independent decryption servers, which are responsible for obtaining keys from user terminals and storing them in a key library. When the user needs to download the user's personal data that has been backed up in the cloud, the decryption server is responsible for the user's personal data obta...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap