Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for protecting data

A technology for protecting data and databases, applied in the computer field, can solve problems such as leakage of core confidential data

Active Publication Date: 2021-09-10
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, directly deploying the core confidential data to the server of the service user will face the risk of core confidential data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting data
  • Method and device for protecting data
  • Method and device for protecting data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0031] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0032] figure 1 An exemplary system architecture 100 is shown to which embodiments of the method for protecting data or the apparatus for protecting data of the present application can be applied.

[0033] Such as figure 1 As shown, the system architecture 100 may include ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for protecting data. A specific embodiment of the method comprises the following steps: collecting a binary file and confidential data of a service; encrypting the confidential data by using the secret key to generate encrypted confidential data; dividing the secret key into a first secret key fragment and a second secret key fragment; embedding the identifier of the key and the first key fragment into a binary file to generate an embedded binary file, and sending the identifier of the key and the second key fragment to a database of a service provider for storage; and sending the embedded binary file and the encrypted confidential data to a server of a user of the service for deployment. According to the confidential data protection method based on safe multi-party calculation, the confidential data of the service can be effectively protected.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technologies, and in particular to methods and devices for protecting data. Background technique [0002] At present, when the service provider provides external services, in some cases, due to the network environment restrictions of the service user, the service provider may be required to deploy the service offline to the server of the service user. Therefore, the service provider will package and deploy the binary file of the service and some core confidential data to the server of the service user. In this way, the user of the service can use the service through the binary file and core confidential data provided by the service provider without connecting to the external network. The provider of the service hopes that the core secret data can only be used by the binary files deployed by itself. However, directly deploying the core confidential data to the server of the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F2221/2107
Inventor 蒋精华洪爵杨柳何恺
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products