A data security protection method and related equipment

A data security and data technology, applied in the field of communication, can solve problems such as leakage, achieve the effect of improving security and solving online play

Active Publication Date: 2021-12-21
PETAL CLOUD TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, there is a risk of leakage when the user transmits personal data to the cloud through the terminal, and when the personal data is stored in the cloud server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security protection method and related equipment
  • A data security protection method and related equipment
  • A data security protection method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0101] The terms used in the embodiments of the present invention are only used to explain specific examples of the present invention, and are not intended to limit the present invention.

[0102] The following describes a process in which a user backs up and downloads personal data in the cloud through a terminal in a conventional solution.

[0103] The terminal encrypts the user's personal data according to the user's private key, and then the terminal uploads the encrypted user's personal data to the storage server for backup. There is no user's private key in the storage server, so the encrypted personal data of the user cannot be accessed. Manufacturers that provide decryption services deploy independent decryption servers, which are responsible for obtaining keys from user terminals and storing them in the keystore. When the user needs to download the user's personal data that has been backed up in the cloud, the decryption server is responsible for obtaining the user's...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data security protection method and related equipment. The method includes: the first terminal sends first ciphertext information to the key server; the first ciphertext information is obtained by the first terminal encrypting the first password according to the public key from the key server; the first terminal receives The second ciphertext information sent by the secret key server; the second ciphertext information is that after the secret key server decrypts the first ciphertext information according to the private key corresponding to the public key to obtain the first password, the secret key server uses the first password obtained by encrypting the second password; the first terminal decrypts the second ciphertext information according to the first password to obtain the second password; the first terminal sends the data encrypted by the second password to the storage server. By implementing the above embodiments, the security of the user's personal data in the cloud backup process can be improved, and the risk of data leakage can be avoided.

Description

technical field [0001] The invention relates to data transmission technology in the communication field, in particular to a data security protection method and related equipment. Background technique [0002] Cloud backup is to back up the user's personal data, such as contacts, text messages, pictures, videos, etc., to the network through cloud storage. As cloud backup technology becomes more and more mature, more and more users like to back up personal data in mobile phones to the cloud. In this way, users can not only free up a large amount of mobile phone storage space, but also download from the cloud anytime and anywhere when they need to use these personal data. [0003] Since most of the personal data in the user's mobile phone involves personal privacy, we need to have higher protection requirements for the user's personal data, so as to prevent the user's personal data from being stolen and causing damage to the user's interests. However, in the prior art, there ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L63/0478H04L63/0815H04L63/083H04L65/60H04L67/1097H04L65/61
Inventor 刘红林李高峰
Owner PETAL CLOUD TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products