Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data management method and related device

A data management and program technology, applied in the field of data management, can solve the problems of easy to crack the encryption space storage method, affecting the security of data encryption, etc.

Active Publication Date: 2021-01-12
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the storage method of encrypted space is easy to be cracked, and due to the complexity of the network environment, malicious code can easily bypass password protection, affecting the security of data encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data management method and related device
  • A data management method and related device
  • A data management method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The embodiment of the present application provides a data management method and a related device, which can be applied to a system or program including a data management function in a terminal device, by obtaining verification information; and processing the verification information according to preset rules to generate An encryption key, wherein the encryption key is used for comparison in the trusted execution environment with the target key stored in the trusted execution environment to obtain a result identifier, and the result identifier is used to indicate the encryption key and the target key Whether it matches, the preset rule is set according to at least one dimension of the encryption feature, the encryption feature includes device feature information or user feature information; then obtain the result identifier from the trusted execution environment; when the result identifier indicates that the encryption key matches the target key When , the target data is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data management method and a related device, which can be applied to a cloud file storage process. Verification information is obtained; the verification information is processed according to a preset rule to generate an encryption key, and the encryption key is used for being compared with a target key in a trusted execution environment to obtain a result identifier; then the result identifier is obtained from the trusted execution environment; and when the result identifier indicates that the encryption key is matched with the target key, target data is encrypted based on the target key to obtain encrypted data. Due to the fact that the target key is only stored in the trusted execution environment, direct invasion of malicious codes is avoided, the output content of the trusted execution environment is the result identifier, the influence of the authority management process on data safety is avoided, and the safety of data management is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a data management method and related devices. Background technique [0002] With the development of Internet technology, more and more data content appears in people's lives, and the corresponding personal mobile devices store a large amount of important private data of users. Once the user's mobile phone is lost, or the lock screen password is cracked, personal Important data will be leaked. Therefore, it is necessary to separately encrypt and store the important data of the user on the personal device. However, since the application scenario of important data encryption storage is to protect the security of important private data even when other people physically touch the mobile phone and can unlock the screen. Therefore, a stronger local encryption scheme on mobile devices needs to be designed. [0003] Generally, the data content is stored in the form of an en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6245G06F21/64
Inventor 张向前刘惠明
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products