CN105100087A - Management method, management server and system for SQL (Structured Query Language) database - Google Patents

Management method, management server and system for SQL (Structured Query Language) database Download PDF

Info

Publication number
CN105100087A
CN105100087A CN201510397748.4A CN201510397748A CN105100087A CN 105100087 A CN105100087 A CN 105100087A CN 201510397748 A CN201510397748 A CN 201510397748A CN 105100087 A CN105100087 A CN 105100087A
Authority
CN
China
Prior art keywords
data
data file
described data
sql database
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510397748.4A
Other languages
Chinese (zh)
Inventor
陈瞬浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI WIWIDE NETWORK TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI WIWIDE NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI WIWIDE NETWORK TECHNOLOGY Co Ltd filed Critical SHANGHAI WIWIDE NETWORK TECHNOLOGY Co Ltd
Priority to CN201510397748.4A priority Critical patent/CN105100087A/en
Publication of CN105100087A publication Critical patent/CN105100087A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Abstract

The invention discloses a management method, management server and system for an SQL (Structured Query Language) database. The method comprises the following steps: receiving data transmitted by a client; acquiring a matched data file according to the data; storing the data in the data file; and encrypting the data file in which the data is stored. Through application of the method, the security of an SQL database management system can be enhanced.

Description

The management method of SQL database, management server and system
Technical field
The present invention relates to database technical field, be specifically related to a kind of management method of SQL database, management server and system.
Background technology
Data base management system is generally used for foundation, operation and maintenance database, carries out unified management and control, to ensure fail safe and the integrality of database to database.User can by the data in data base management system accessing database, and the administrative staff of database also can carry out the maintenance work of database by data base management system.
At present, SQL database management system generally includes client and management server.User can write data by described client in database.Described management server, after the data receiving user's input, by described data according to certain rale store in the data file, and manages described data file.
But the fail safe of current SQL database management system is lower.
Summary of the invention
The problem that the present invention solves is the fail safe how improving SQL database management system.
For solving the problem, the embodiment of the present invention provides a kind of management method of SQL database, and described method comprises:
Receive the data that client sends;
According to the data file that described data acquisition mates;
Described data are stored in described data file;
The data file storing described data is encrypted.
Alternatively, described data file of mating according to described data acquisition comprises following wherein a kind of:
The data file of coupling is set up according to described data;
The data file corresponding according to described data acquisition.
Alternatively, the data that described reception client sends are received by the mode of human-computer interaction interface or receive in the mode of remote control.
Alternatively, described method also comprises:
Receive the request of the acquisition data that described client sends;
The data file corresponding according to the acquisition request of described acquisition data;
Described data file is decrypted;
Data file after deciphering is sent to described client.
Alternatively, the described data file to storing described data is encrypted and comprises:
Described data are classified, sorted data are stored in a data file respectively.
Alternatively, the described data file to storing described data is encrypted, and comprises following wherein a kind of:
Partial document data with described Data Matching is encrypted;
Entire data files with described data file matches is encrypted.
The embodiment of the present invention additionally provides a kind of management server of SQL database, and the management server of described SQL database comprises:
First receiving element, is suitable for the data receiving client transmission;
Matching unit, is suitable for the data file of mating according to described data acquisition;
Memory cell, is suitable for described data to be stored in described data file;
Ciphering unit, is suitable for being encrypted described data file.
Alternatively, described matching unit comprises following wherein a kind of:
First coupling subelement, is suitable for the data file setting up coupling according to described data;
Second coupling subelement, is suitable for the data file corresponding according to described data acquisition.
Alternatively, the data that described receiving element receives are received by the mode of human-computer interaction interface or receive in the mode of remote control.
Alternatively, the management server of described SQL database also comprises:
Second receiving element, is suitable for the request receiving the acquisition data that described client sends;
Acquiring unit, is suitable for the data file corresponding according to the acquisition request of described acquisition data;
Decryption unit, the described data file be suitable for described acquiring unit gets is decrypted;
Transmitting element, is suitable for the data file after by deciphering and is sent to described client.
Alternatively, described memory cell comprises:
Classification subelement, is suitable for classifying to described data;
First storing sub-units, is suitable for sorted data to be stored in respectively in a data file.
Alternatively, described memory cell comprises following wherein a kind of:
Second storing sub-units, is suitable for being encrypted the partial document data with described Data Matching;
3rd storing sub-units, is suitable for being encrypted the entire data files with described data file matches.
The embodiment of the present invention additionally provides a kind of management system of SQL database, and the management system of described SQL database comprises the management server of the SQL database of above-mentioned any one.
Compared with prior art, technical scheme of the present invention has the following advantages:
By after the data receiving client transmission, the data file corresponding to described data is encrypted, and assailant can be made after stealing described data file cannot to obtain corresponding data, improves the fail safe of described SQL database management system.
Accompanying drawing explanation
Fig. 1 is the structural representation of a kind of SQL database management system in the embodiment of the present invention;
Fig. 2 is a kind of SQL database management method flow chart in the embodiment of the present invention;
Fig. 3 is another kind of SQL database management method flow chart in the embodiment of the present invention;
Fig. 4 is the structural representation of a kind of SQL database management server in the embodiment of the present invention;
Fig. 5 is the structural representation of another kind of SQL database management server in the embodiment of the present invention.
Embodiment
At present, increase income in the use procedure of data management system at MySQL etc., assailant often can by attacking the management server of described data management system, steal the data file in database, and then steal the data stored in described data file, the fail safe of described data management system is lower.
For the problems referred to above, The embodiment provides a kind of management method of SQL database, described method can after the data receiving client transmission, the data file corresponding to described data is encrypted, therefore, assailant can be made after stealing described data file cannot to obtain corresponding data, improve the fail safe of described SQL database management system.
For enabling above-mentioned purpose of the present invention, feature and advantage more become apparent, and are described in detail specific embodiments of the invention below in conjunction with accompanying drawing.
As shown in Figure 1, a kind of SQL database management system is embodiments provided.Described SQL database management system can comprise client 11 and management server 12.
User can input data by described client 11, and the data that user inputs are sent to management server 12 by client 11, are managed described data by management server 12.User can also produce by described client 11 request obtaining data.Client 11 receives after user obtains the request of data, described request can be sent to management server 12, be processed, and return corresponding data file by management server 12 pairs of described requests.
Particularly, described data, after the data receiving client 11 transmission, first according to the data file that described data acquisition mates, then can be stored in described data file, and are encrypted described data file by described management server 12.That is, the data file that described management server 12 manages is the data file of encrypted form.
Described management server 12, after the request receiving the acquisition data that described client sends, first can obtain corresponding data file according to described request, then be decrypted described data file, and the data file after deciphering is sent to described client 11.That is, the data file that described management server 12 is sent to described client 11 is the data file after deciphering.
In concrete enforcement, user can input data in several ways or produce the request obtaining data.Such as, user can pass through between the human-computer interaction interface input of described client 11, input data or produce the request obtaining data, also can be inputted the request of data or generation acquisition data to described client 11 by the mode of remote control.
Receive the request of the acquisition data that client 11 sends at described management server 12 after, from stored data file, obtain the data file corresponding with described data, and be sent to client 11 after described data file being decrypted.Therefore, for user, be no matter the process that the data of its input are encrypted, or the process to the decrypt data that it obtains, process by management server 12, described data base management system will be used to have an impact to user.
It should be noted that, between described client 11 with described management server 12, the mode of wired connection can be adopted to communicate, the mode of wireless connections also can be adopted to communicate.Wherein, the method for described wireless connections can comprise WiFi, bluetooth, the communication such as infrared.Specifically regardless of the connected mode between described 11 and described management server 12, be not all construed as limiting the invention, and all within protection scope of the present invention.
In concrete enforcement, described client 11 can include but not limited to hand-held terminal device, laptop device, network PC, minicom, mainframe computer etc.
Described management server 12 can be the private server of a platform independent, also can other be provided to serve simultaneously, such as can open up one piece of special memory block and memory field on other servers, to provide management service.Which kind of certainly, no matter be the management server adopting mode, directly can be connected with client 11 and the database storing described data file.
As shown in Figure 2, embodiments of the invention additionally provide a kind of management method of SQL database.Below in conjunction with the SQL database management system shown in Fig. 1, the management method of described SQL database is described in detail:
Described method can comprise the steps:
Step 21, receives the data that client sends.
Such as, in the SQL database management system shown in Fig. 1, user can input data by described client 11, and then by described client 11, the data that user inputs is sent to described management server 12.Wherein, the data that described client 11 sends can be that the mode inputted by human-computer interaction interface is inputted, and also can be inputted by the mode of remote control.
Step 22, according to the data file that described data acquisition mates.
Described management server 12 is after the data receiving client 11 transmission, first can judge whether be stored in the data file corresponding with described data in described data base management system, if have, then directly described data are stored in corresponding data file, if nothing, then first set up the data file with described Data Matching, more described data are stored in newly-built data file.
Wherein, the data that described client 11 sends can an only corresponding data file, also can corresponding multiple data file, specifically can arrange according to the matched rule between described data file and data.That is, described management server 12, after getting described data, according to the matched rule preset, can obtain a data file with described Data Matching, also can obtain the multiple data files with described Data Matching.
Described data are stored in described data file by step 23.
Described management server 12 in the described data file described data stored, stores described data with the form of data file after obtaining the data file with described Data Matching.
In concrete enforcement, described management server 12 is after obtaining the multiple data files with described Data Matching, and described data can be classified, every class data are stored in independent data file respectively.Such as, when the data that client 11 sends are multimedia message, the word segment of described multimedia message can be stored in a data file, Picture section is stored in another data file.
Step 24, is encrypted the data file storing described data.
In concrete enforcement, multiple encryption algorithms can be adopted to be encrypted described data file.In order to improve the fail safe of described data file further, rivest, shamir, adelman can be used to be encrypted, the cryptographic algorithm that namely PKI is corresponding with private key.Such as, described cryptographic algorithm can be AES64 cryptographic algorithm.
When adopting cryptographic algorithm to be encrypted described data file, can be encrypted described data file immediately after getting described acquisition data, also can be encrypted again before described data file is sent to client.Each cryptographic operation can only be encrypted a data file, also can be encrypted multiple data file simultaneously.The mode be encrypted each data file can be identical, also can be different.
When the data file with described Data Matching is multiple, only can be encrypted the partial document data with described Data Matching, also can the entire data files with described Data Matching be encrypted.Such as, when the data that client 11 sends are multimedia message, can only be encrypted the data file of the word segment storing described multimedia message, also can be encrypted the data file of the Picture section storing described multimedia message, can also be encrypted the data file of the data file of word segment and the Picture section of the described multimedia message of storage that store described multimedia message simultaneously.
And for example, in MySQL database management system, after the data that user inputs are sent to MySQL management server by MySQL client, MySQL management server searches the .myd file corresponding with described data from the .myd file self stored, or be the .myd file of the newly-built coupling of described data, and adopt AES64 cryptographic algorithm to be encrypted described .myd file, store described data by described .myd file.
Under normal circumstances .myd file comprises file header and data segment portion.Each .myd file can store multiple data, and when described data being stored in obtained .myd file, described data segment portion stores corresponding data with the form of list structure.
When described .myd file is encrypted, can be encrypted the entirety of described .myd file, namely the file header of described .myd file and data segment portion are encrypted simultaneously.Like this, assailant is when stealing described .myd file, and the data that can not be stored to it by described .myd file theft, can not by the array format of described .myd file theft to described data.
In concrete enforcement, as shown in Figure 3, in order to the use of convenient user, described method can also comprise step 31 to 34.Below in conjunction with the SQL database management system shown in Fig. 1, step 31 is described in detail to 34:
Step 31, receives the request of the acquisition data that described client sends.
In concrete enforcement, the request of the acquisition data that described client 11 sends can be that the mode inputted by human-computer interaction interface is produced, and also can be produced by the mode of remote control.Such as described, the request obtaining data can be the request etc. of inquiry or Update Table.
Step 32, the data file corresponding according to the acquisition request of described acquisition data.
After receiving the request of described acquisition data, first described request is resolved, then the data file corresponding according to the acquisition request after resolving.
Such as, in MySQL database management system, after the data that user inputs are sent to MySQL management server by MySQL client, MySQL management server searches .myd file corresponding to the request that obtains data with described user from the .myd file self stored.
Step 33, is decrypted described data file.
In concrete enforcement, the algorithm be decrypted described data file is corresponding with the algorithm be encrypted described data file.Such as, when the algorithm be encrypted described data file is AES64 cryptographic algorithm, the algorithm be decrypted described data file is AES64 decipherment algorithm.
Step 34, is sent to described client by the data file after deciphering.
When being wired connection between described client 11 and described management server 12, by the cable both connecting, described data file is sent to described client 11.Time between described client 11 and described management server 12 for wireless connections, by the wireless network both connecting, described data file is sent to described client 11.
Be understandable that, SQL database management system shown in Fig. 1 does not form the restriction to the management method of SQL database described in the embodiment of the present invention, described SQL database management method can also be applicable to other SQL database management systems, as long as described communication system comprises the communication equipment shown in Fig. 1, and data management can be carried out according to SQL database management method described in embodiments of the invention.
By being encrypted described data file, assailant can being made when stealing described data file, any information about described data in described data file cannot be got, comprise the information such as and the array format of data in described data file own.And only to the mode that the data in data file are encrypted, although assailant cannot get the information of data in described data file itself, other information except described data itself can be got.Like this, assailant can recover described data itself by described other information except described data itself.Therefore, relative to only to the mode that the data in data file are encrypted, described data file is encrypted the fail safe of described data base management system can be made higher.
In order to make those skilled in the art understand better and realize the present invention, device corresponding to the management method of above-mentioned database is below described in detail.
As shown in Figure 4, The embodiment provides a kind of management server 40 of SQL database, described management server 40 can comprise: the first receiving element 41, matching unit 42, memory cell 43 and ciphering unit 44.
Particularly, described first receiving element 41 is suitable for the data receiving client transmission.Described matching unit 42 is suitable for the data file of mating according to described data acquisition.Described memory cell 43 is suitable for described data to be stored in described data file.Described ciphering unit 44 is suitable for being encrypted described data file.
Wherein, the data that described receiving element 41 receives can be received by the mode of human-computer interaction interface, also can be received by the mode of remote control.
In concrete enforcement, described matching unit can comprise: the first coupling subelement (not shown) or the second coupling subelement (not shown).Wherein, described first coupling subelement is suitable for the data file setting up coupling according to described data, and described second coupling subelement is suitable for the data file corresponding according to described data acquisition.
In one embodiment of this invention, described memory cell 43 can comprise: classification subelement (not shown) and the first storing sub-units (not shown).Wherein, described classification subelement is suitable for classifying to described data.Described first storing sub-units is suitable for sorted data to be stored in respectively in a data file.
In another embodiment of the invention, described memory cell can comprise: the second storing sub-units (not shown) and the 3rd storing sub-units (not shown).Wherein, described second storing sub-units is suitable for being encrypted the partial document data with described Data Matching.Described 3rd storing sub-units is suitable for being encrypted the entire data files with described data file matches.
In concrete enforcement, described ciphering unit 44 can adopt multiple encryption algorithms to be encrypted described data file.In order to improve the fail safe of described data file further, rivest, shamir, adelman can be used to be encrypted, the cryptographic algorithm that namely PKI is corresponding with private key.Such as, described cryptographic algorithm can be AES64 cryptographic algorithm.
In concrete enforcement, as shown in Figure 5, described management server 50 can also comprise: the second receiving element 51, acquiring unit 52, decryption unit 53 and transmitting element 54.
Wherein, described second receiving element 51 is suitable for the request receiving the acquisition data that described client sends.Described acquiring unit 52 is suitable for the data file corresponding with described data according to the acquisition request of described acquisition data.The described data file that described decryption unit 53 is suitable for described acquiring unit gets is decrypted. and described transmitting element 54 is suitable for described data file to be sent to described client.
It should be noted that, in concrete enforcement, the algorithm be decrypted described data file is corresponding with the algorithm be encrypted described data file, and those skilled in the art can be decrypted described data file according to the algorithm be encrypted described data file.Such as, when the algorithm be encrypted described data file is AES64 cryptographic algorithm, the algorithm be decrypted described data file is AES64 decipherment algorithm.
As shown in the above, management server in the embodiment of the present invention, after the data receiving client transmission, can be encrypted the data file at described data place, after the request receiving the acquisition data that client sends, client can also be sent to after the data file deciphering corresponding to obtained data, therefore, described management server when not affecting user and using, can improve the fail safe of data base management system.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is that the hardware that can carry out instruction relevant by program has come, this program can be stored in a computer-readable recording medium, and storage medium can comprise: ROM, RAM, disk or CD etc.
Although the present invention discloses as above, the present invention is not defined in this.Any those skilled in the art, without departing from the spirit and scope of the present invention, all can make various changes or modifications, and therefore protection scope of the present invention should be as the criterion with claim limited range.

Claims (13)

1. a management method for SQL database, is characterized in that, comprising:
Receive the data that client sends;
According to the data file that described data acquisition mates;
Described data are stored in described data file;
The data file storing described data is encrypted.
2. the management method of SQL database as claimed in claim 1, is characterized in that, described data file of mating according to described data acquisition comprises following wherein a kind of:
The data file of coupling is set up according to described data;
The data file corresponding according to described data acquisition.
3. the management method of SQL database as claimed in claim 1, is characterized in that, the data that described reception client sends are received by the mode of human-computer interaction interface or receive in the mode of remote control.
4. the management method of SQL database as claimed in claim 1, is characterized in that, also comprise:
Receive the request of the acquisition data that described client sends;
The data file corresponding according to the acquisition request of described acquisition data;
Described data file is decrypted;
Data file after deciphering is sent to described client.
5. the management method of SQL database as claimed in claim 1, is characterized in that, the described data file to storing described data is encrypted and comprises:
Described data are classified, sorted data are stored in a data file respectively.
6. the management method of SQL database as claimed in claim 1, is characterized in that, the described data file to storing described data is encrypted, and comprises following wherein a kind of:
Partial document data with described Data Matching is encrypted;
Entire data files with described data file matches is encrypted.
7. a management server for SQL database, is characterized in that, comprises;
First receiving element, is suitable for the data receiving client transmission;
Matching unit, is suitable for the data file of mating according to described data acquisition;
Memory cell, is suitable for described data to be stored in described data file;
Ciphering unit, is suitable for being encrypted described data file.
8. the management server of SQL database as claimed in claim 7, is characterized in that, described matching unit comprises following wherein a kind of:
First coupling subelement, is suitable for the data file setting up coupling according to described data;
Second coupling subelement, is suitable for the data file corresponding according to described data acquisition.
9. the management server of SQL database as claimed in claim 7, is characterized in that, the data that described receiving element receives are received by the mode of human-computer interaction interface or receive in the mode of remote control.
10. the management server of SQL database as claimed in claim 7, is characterized in that, also comprise:
Second receiving element, is suitable for the request receiving the acquisition data that described client sends;
Acquiring unit, is suitable for the data file corresponding according to the acquisition request of described acquisition data;
Decryption unit, the described data file be suitable for described acquiring unit gets is decrypted;
Transmitting element, is suitable for the data file after by deciphering and is sent to described client.
The management server of 11. SQL database as claimed in claim 7, it is characterized in that, described memory cell comprises:
Classification subelement, is suitable for classifying to described data;
First storing sub-units, is suitable for sorted data to be stored in respectively in a data file.
The management server of 12. SQL database as claimed in claim 7, is characterized in that, described memory cell comprises following wherein a kind of:
Second storing sub-units, is suitable for being encrypted the partial document data with described Data Matching;
3rd storing sub-units, is suitable for being encrypted the entire data files with described data file matches.
The management system of 13. 1 kinds of SQL database, is characterized in that, comprising: client, and the management server of SQL database as described in any one of claim 7 to 12.
CN201510397748.4A 2015-07-08 2015-07-08 Management method, management server and system for SQL (Structured Query Language) database Pending CN105100087A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510397748.4A CN105100087A (en) 2015-07-08 2015-07-08 Management method, management server and system for SQL (Structured Query Language) database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510397748.4A CN105100087A (en) 2015-07-08 2015-07-08 Management method, management server and system for SQL (Structured Query Language) database

Publications (1)

Publication Number Publication Date
CN105100087A true CN105100087A (en) 2015-11-25

Family

ID=54579634

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510397748.4A Pending CN105100087A (en) 2015-07-08 2015-07-08 Management method, management server and system for SQL (Structured Query Language) database

Country Status (1)

Country Link
CN (1) CN105100087A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101587479A (en) * 2008-06-26 2009-11-25 北京人大金仓信息技术股份有限公司 Database management system kernel oriented data encryption/decryption system and method thereof
CN101753539A (en) * 2008-12-01 2010-06-23 北京大学 Network data storage method and server

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101587479A (en) * 2008-06-26 2009-11-25 北京人大金仓信息技术股份有限公司 Database management system kernel oriented data encryption/decryption system and method thereof
CN101753539A (en) * 2008-12-01 2010-06-23 北京大学 Network data storage method and server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李爱英等: "文件型数据库加密技术分析", 《网络与信息》 *

Similar Documents

Publication Publication Date Title
US10972908B2 (en) Wireless network connection method, apparatus, and system
CN110049016B (en) Data query method, device, system, equipment and storage medium of block chain
US9485096B2 (en) Encryption / decryption of data with non-persistent, non-shared passkey
US8239679B2 (en) Authentication method, client, server and system
US20140281520A1 (en) Secure cloud data sharing
US8195961B2 (en) Removable storage device and associated methodology of data encryption
CN106790156B (en) Intelligent device binding method and device
CN106487763B (en) Data access method based on cloud computing platform and user terminal
CN105205898A (en) Electronic code permission management system for intelligent lock
CN105656624A (en) Client side, server and data transmission method and system
US9374360B2 (en) System and method for single-sign-on in virtual desktop infrastructure environment
EP3598714A1 (en) Method, device, and system for encrypting secret key
US20130185569A1 (en) Data protection system and method based on cloud storage
JP2011527804A (en) Information transmission using virtual input layout
CN105184935A (en) Bluetooth intelligent lock system capable of sharing passwords by WeChat
JP4917116B2 (en) Data encryption system, communication device, and data encryption method
CN103973651A (en) Account password identification setting and inquiring method and device based on salt password bank
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
CN103051641A (en) Method and system for updating multiple-client key, and information security transmission method
CN110708291B (en) Data authorization access method, device, medium and electronic equipment in distributed network
EP2942899B1 (en) Information processing method, trust server and cloud server
CN115118419A (en) Data transmission method of security chip, security chip device, equipment and medium
CN110955909B (en) Personal data protection method and block link point
US20230052300A1 (en) Methods and systems for data processing, and storage medium
US20130262600A1 (en) Image processing apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151125

WD01 Invention patent application deemed withdrawn after publication