Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data security storage method and device, storage medium and terminal

A data security storage and data technology, applied in the computer field, can solve the problems of user privacy data leakage, key leakage, etc.

Inactive Publication Date: 2020-06-05
重庆特斯联智慧科技股份有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The key information of this encryption algorithm is generally stored in the code or application configuration file, and there is a risk that the attacker can easily analyze the encryption method in reverse and steal the key information. It will also lead to the risk of uncontrollable key leakage
Therefore, the current face data encryption protection method increases the possibility of user privacy data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security storage method and device, storage medium and terminal
  • Data security storage method and device, storage medium and terminal
  • Data security storage method and device, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The following description and drawings illustrate specific embodiments of the invention sufficiently to enable those skilled in the art to practice them.

[0072] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0073] When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0074] In the descriptio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security storage method, a data security storage device, a storage medium and a terminal. The data security storage method comprises the steps of: acquiring target filedata; acquiring a preset algorithm key when an operation instruction input for a target file is received; and encrypting and decrypting the target file data based on the preset algorithm key. Therefore, by adopting the embodiment of the data security storage method and the data security storage device, leakage of private data of the terminal can be prevented.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a data security storage method, device, storage medium and terminal. Background technique [0002] With the continuous development of the Internet of Things, big data, and artificial intelligence technology, smart access products based on face recognition technology are widely used in various smart scenarios, such as: smart communities, smart buildings, smart travel, etc. , or fingerprint access control system is more convenient, efficient and safe. However, many terminal intelligent terminals store a large number of face pictures or face model data. In order to protect the security of user privacy data, it is necessary to take effective encryption protection measures to prevent the leakage of terminal privacy data. [0003] Currently, in face data encryption protection methods, face recognition applications use standard encryption algorithms (such as: AES, DES algorit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 程先伟李学庆
Owner 重庆特斯联智慧科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products