Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret information processing method, device and system

An information processing method and technology of an information processing device, which are applied in the directions of security communication devices, security devices, transmission systems, etc., can solve problems such as leakage, modification, and loss of user property.

Inactive Publication Date: 2017-11-17
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the cloud server is maliciously attacked by illegal elements, the secret information will be destroyed, changed or leaked, which may cause users to be unable to use the Internet for shopping, entertainment and other activities normally, and even use the secret information to steal bank cards for payment. loss of property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret information processing method, device and system
  • Secret information processing method, device and system
  • Secret information processing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0057] see figure 1 , the embodiment of the present invention discloses a method for processing secret information, which is applied to a data storage system;

[0058] The treatment methods include:

[0059] S101. Receive a data storage request and secret information sent by a client, where the data storage request includes the client identifier;

[0060] In the embodiment of the present application, the execution subject of the solution may be a data storag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secret information processing method, device and system. The secret information processing method is applied to a data storage system and comprises steps of: receiving a data storage request and secret information required to be stored which are sent by a client; generating a master key and a data key of the client based on a client identifier in the data storage request, encrypting the data key by using the master key, returning the encrypted data key to the client, encrypting the secret information by using the data key, and storing the obtained encrypted secret information while deleting the data key. Thus, even if the encrypted secret information is invalidly acquired, the encrypted secret information cannot be decrypted via the data key because of the absence of the data key. Since the data key obtained from the client is encrypted by the master key of the client, the secret information cannot be decrypted even if the data key encrypted by the client is intercepted. As a result, dual protection is formed, encrypted storage of the secret information is achieved and data security is improved.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, in particular to a secret information processing method, device and system. Background technique [0002] In recent years, more and more people are accustomed to using the Internet for shopping, entertainment and other activities. [0003] In the process of using the Internet, users often use important information, such as the signature of the website API interface, the user's password, the certificate of the application, etc. We call these data secret information. These secret information are usually stored in the data storage system of the target accessed by the user, such as a cloud server. [0004] With the continuous development of the Internet, network security issues are becoming more and more prominent. If the cloud server is maliciously attacked by illegal elements, the secret information will be destroyed, changed or leaked, which may cause users to be unable to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04W12/02
CPCH04L9/0894H04L63/0428H04W12/02
Inventor 翁迟迟李劼杰
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products