[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106453273A - Cloud technology based information security management system and method - Google Patents

Cloud technology based information security management system and method Download PDF

Info

Publication number
CN106453273A
CN106453273A CN201610841380.0A CN201610841380A CN106453273A CN 106453273 A CN106453273 A CN 106453273A CN 201610841380 A CN201610841380 A CN 201610841380A CN 106453273 A CN106453273 A CN 106453273A
Authority
CN
China
Prior art keywords
information
server
key
module
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610841380.0A
Other languages
Chinese (zh)
Other versions
CN106453273B (en
Inventor
崔永波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Morebeck Semiconductor Technology Co Ltd
Original Assignee
Xi'an Morebeck Semiconductor Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Morebeck Semiconductor Technology Co Ltd filed Critical Xi'an Morebeck Semiconductor Technology Co Ltd
Priority to CN201610841380.0A priority Critical patent/CN106453273B/en
Publication of CN106453273A publication Critical patent/CN106453273A/en
Application granted granted Critical
Publication of CN106453273B publication Critical patent/CN106453273B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a cloud technology based information security management system and method. The method comprises the following steps: S100) obtaining information; recoding the obtained information and storing the information into a storage device; S200) encrypting the re-coded information and generating keys; uploading the keys to a server; establishing an one-on-one correlation relationship between the keys and the de-coded information; S300) obtaining the authority grade; according to the obtained authority grade, screening the keys; and sending the screened result to a user's terminal; S400) displaying the materials associated with the information on a display module; and S500) selecting the information; extracting by the server from the storage module the re-coded information; and deciphering in combination with the keys; sending the deciphered information to the storage module; and decoding the information. According to the invention, the keys associated with all the uploaded information are managed in different groups and specific users are authorized some fixed authorizations so as to realize safe, private and convenient communications inside an enterprise.

Description

A kind of information insurance management system based on cloud and method
Technical field
The invention belongs to the communications field, be related to technical field of information encryption, relate in particular to a kind of based on cloud Information insurance management system, and a kind of information insurance management method based on cloud.
Background technology
Cloud, is a kind of metaphor saying of network, the Internet.Cloud refers to hardware, soft in wide area network or LAN The series resource such as part, network are united, and realize calculating, storage, process and a kind of shared trustship technology of data.Cloud service It is the shared service including network, server, storage, application software, service based on cloud.Google proposes first within 2006 " concept of cloud computing, since then many transnational IT trade company google, IBM, Yahoo, Amazon, The numerous and confused addition of Microsoft leads this trend, peddles the products & services of oneself.
More and more enterprises use " high in the clouds office ", by the documents editing with office documents as core, storage, cooperation, The cloud service such as communication, mobile office, workflow, realize:Reduce job costs, the purpose of raising office efficiency.
While cloud offers convenience for enterprise, increasing important information is exposed on disclosed network environment In, be wherein no lack of some classified papers, therefore how effectively utilizes cloud bring convenient avoid important information not simultaneously Known by the external world, ensure information safety, become the severe problem that numerous enterprises instantly face.
Content of the invention
In order to solve above-mentioned technical problem, the invention provides a kind of information insurance management method based on cloud, its It is characterised by, comprise the following steps:
Step S100:Acquisition information, the information of acquisition is recompiled, and is saved in memorizer;
Step S200:Information after recompiling is encrypted and generates key, and key is uploaded onto the server;Described close Key with recompile after information set up one-to-one relationship;
Step S300:Obtain Permission Levels, according to the Permission Levels screening key obtaining, and the selection result is sent to use Family terminal;
Step S400:The data of display module display information;
Step S500:Selection information, then server extract this information after recompiling from memory module, and with close Key combines deciphering, the information after deciphering is sent to memory module, then decodes this information.
Preferably, described recompile the information of acquisition refers to by coding/decoding module, the information obtaining will be compiled Code, and generate the file format that only present system can identify.
Preferably, described acquisition information refers to process original information, or is externally introduced new information.
Preferably, also include starting authentication procedure, user terminal and service before the step of described step S100 acquisition information Device communicates to connect, and described startup authentication procedure refers to that the authentication module of user terminal carries out authentication to user.
Preferably, further comprising the steps of before obtaining Permission Levels in described step S300, user terminal sends certification Application, startup of server authentication procedure, if certification is passed through, server obtains Permission Levels.
Further, Permission Levels are divided into the authority of different stage from highest level authority to lowest level authority, described High level authority can authorize the authority of rank lower than it
Further, described upload, download and verification process all generate record in the server, and are saved in storage In unit.
In one embodiment there is disclosed a kind of information insurance management method based on cloud, comprise the following steps:
Step A1:Described user terminal obtains information, the information of acquisition is recompiled, and is saved into memorizer In;
Step A2:Information after recompiling is encrypted and is generated key by user terminal, and key is uploaded onto the server; Described key with recompile after information set up one-to-one relationship;
Step A3:The key that the reception server sends, the data of display module display information;
Step A4:Information after receiving and deciphering, then decodes this information.
In one embodiment, there is provided a kind of information insurance management method based on cloud, comprise the following steps:
Step B1:The key that described server receive user terminal sends;
Step B2:Obtain Permission Levels, according to the Permission Levels screening key obtaining, and the selection result is sent to user Terminal;
Step B3:Server extracts this information after recompiling from memory module, and is combined deciphering with key, will solve Information after close is sent to memory module.
A kind of information insurance management system based on cloud it is characterised in that:Including
User terminal, server, described user terminal is connected with server communication;
Described user terminal include processor, authentication module, import modul, coding/decoding module, memorizer, encrypting module, Display module, communication module, described processor passes through interface circuit and authentication module, import modul, coding/decoding module, storage Device, encrypting module, display module, communication module are connected and communicate;
Described server includes authentication ' unit, memory element, CPU control unit, communication unit, decryption unit, described CPU Control unit is connected with authentication ' unit, memory element, communication unit, decryption unit and is communicated by interface circuit.
Compared with conventional art, the present invention has advantages below:
1. after file generated, the form according to the present invention recompiles, even if information is stolen intentionally or is not intended to reveal, All cannot normally open in the environment of non-the system, ensure that the secret of enterprise is not known by other people.
2. the storage of key is separated with the storage of data, and the two combination can read information, enhances information reading Confidentiality.
3. information is classified according to Permission Levels, and readable information content is classified according to Permission Levels, is easy to company manager To company information Classification Management, thus realizing the comprehensive control to enterprise, exclude hidden danger of divulging a secret, protection enterprise privacy.
Brief description
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the present invention, this Bright schematic description and description is used for explaining the present invention, does not constitute inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is a kind of structural representation of the user terminal of the information insurance management system based on cloud;
Fig. 2 is a kind of structural representation of the server of the information insurance management system based on cloud;
Fig. 3 is a kind of information insurance management method based on cloud.
Specific embodiment
In order that the technical problem to be solved, technical scheme and beneficial effect are clearer, clear, below tie Close drawings and Examples, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only used To explain the present invention, it is not intended to limit the present invention.
Embodiment 1
A kind of information insurance management system based on cloud, including user terminal, server, described user terminal and clothes Business device communication connection;Described user terminal includes processor, authentication module, coding/decoding module, memorizer, encrypting module, display Module, communication module, described processor passes through interface circuit and authentication module, import modul, coding/decoding module, memorizer, adds Close module, display module, communication module are connected and communicate;
Described server includes authentication ' unit, memory element, CPU control unit, communication unit, decryption unit, described CPU Control unit is connected with authentication ' unit, memory element, communication unit, decryption unit and is communicated by interface circuit.
Preferably, described user terminal is the mobile terminal such as mobile phone, panel computer, or PC, work station, small-sized Server etc..
A kind of information insurance managing method based on cloud, including:
Step S100:Acquisition information, the information of acquisition is recompiled, and is saved in memorizer;
Step S200:Information after recompiling is encrypted and generates key, and key is uploaded onto the server;Described close Key with recompile after information set up one-to-one relationship;
Step S300:Obtain Permission Levels, according to the Permission Levels screening key obtaining, and the selection result is sent to use Family terminal;
Step S400:The data of display module display information;
Step S500:Selection information, then server extract this information after recompiling from memory module, and with close Key combines deciphering, the information after deciphering is sent to memory module, then decodes this information.
Preferably, described acquisition information refers to process original information, or is externally introduced new information.
Described process original information refers to original information is carried out to delete, merges, newly-built, replicate, the operation such as shearing, thus Change the storage address of original information, or at least one of quantity, size, permutation and combination form.Described be externally introduced new Information refer to import from the server of other user terminals or outside new information to this user terminal in it is possible to understand that , equally can carry out after importing deleting, merge, newly-built, replicate, the operation such as shearing.
Described original information and/or new information are stored in memorizer, for the ease of understanding and describing, hereafter former Information and/or new information is had all to use " information " replacement.
Described information includes but is not limited to address list, mail, picture, audio frequency, software, video, file, appoints in file Meaning one kind or a combination thereof.
Described recompile the information of acquisition refers to by coding/decoding module, the information obtaining will be encoded, and raw Become to only have the file format that present system can identify.
Described and be saved into referring in memorizer by the information Store after above-mentioned coding in memorizer it is preferred that With the information before the information can be caused to cover coding after coding.
Preferably, also include starting authentication procedure, user terminal and service before the step of described step S100 acquisition information Device communicates to connect.Described startup authentication procedure refers to that the authentication module of user terminal carries out authentication, such as user to user Authentication can be carried out by inputting the forms such as account password, fingerprint recognition, retina scanning.Authenticating user identification success Afterwards, user terminal and server set up communication connection.
Described information after recompiling is encrypted and generates key, and key uploaded onto the server refer to, with plus solution Close module is encrypted to the information after recompiling and generates a string key, and key is uploaded onto the server, and is stored in In the memory element of server, described key with recompile after information set up one-to-one relationship refer to by processor will Key with recompile after information set up one-to-one relationship, a string key corresponds to an information.It should be understood that can more than Pass multiple keys in server, in memory element, also preserve multiple keys.
Described obtain Permission Levels refer to server obtain user terminal user Permission Levels, before this it is preferable that According to the identity information of described user, in the memory element of server, it is provided with data base, by the use of different accounts in data base Authority setting is different Permission Levels.
It is further preferred that the corresponding access right of described Permission Levels includes following species:Consult part described information; Consult full detail;Consult and download part information;Consult and download full detail;Change partly described in the database The described access right of account, updates the identity information of the partly corresponding user of described account;High level Permission Levels are authorized Low-level Permission Levels;Change the described access right of all described accounts in the database;Update all described accounts Identity information of the corresponding user in family etc., described access right can be used in any combination with Permission Levels.
Preferably, Permission Levels are divided into the authority of different stage, described height from highest level authority to lowest level authority The authority of rank can authorize the authority of rank lower than it.For example, Permission Levels are at least divided into highest authority, intermediate authority, rudimentary Authority, server managers have highest authority, can be permissible with the intermediate authority in authoring system and rudimentary authority, intermediate authority Authorize rudimentary authority, thus forming tree-shaped information management structure.And the corresponding access right species of high level authority is more Abundant, extent of competence is bigger, and for example intermediate corresponding access right of authority is to download full detail, and rudimentary authority corresponds to the right to use Limit is download part information, and intermediate authority can arbitrarily distribute 3 low level level privileges.
Described step S300 is further comprising the steps of before obtaining Permission Levels, and user terminal sends certification application, service Device starts authentication procedure, if certification is passed through, service acquisition Permission Levels, and specifically i.e. user terminal passes through authentication module Send certification application to server, the authentication ' unit of server starts authentication procedure, and such as user terminal sends finger print information, This finger print information is compared by authentication ' unit with the finger print information prestoring, if the same, certification is passed through, if different, Certification is not passed through;If certification is passed through, the CPU control unit of server obtains the Permission Levels of user, if certification is not passed through Then refuse subsequent operation.
Described and the selection result be sent to user terminal step include according to the Permission Levels obtaining screening key, institute The CPU control unit stating server is according to the Permission Levels screening key obtaining, and the selection result is sent by communication unit To user terminal.
In one preferred embodiment, one Permission Levels correspond to multiple keys, and multiple keys are corresponding a kind of Above file type, described CPU control unit is sent to user terminal after sorting out key according to file type.
The data step of described display module display information includes, in the user terminal, due to the volume again in memorizer Information after code and key are one-to-one relationships, and when key issues user terminal, CPU control unit controls display module to show Show the related data of encoded infonnation, described data include but is not limited to icon, file name, code name, one in chained address Plant or a combination thereof.
Described selection information, then server extract this information after recompiling from memory module, and with key knot Close deciphering, the information after deciphering is sent to memory module, then decodes this information Step and include:
User select information in display module it is preferred that select information when need confirm, for example have selected the figure of information ACK button is ejected after mark, chosen successfully after click ACK button.Then after server extracts from memory module and recompiles This information, and corresponding for this information key is combined, the content solution after key is combined by decryption unit with information Close, and the information after deciphering is sent to memory module, coding/decoding module is decoded to the information after deciphering in memory module, Finally can browse to user or download.
Preferably, described upload, download and verification process all generate record in the server, and are saved in memory element In.
Described upload refers to that key is uploaded onto the server by user terminal, after described download refers to deciphering in memory module Information be decoded the download of rear user, before described certification refers to that server obtains Permission Levels, user terminal sends certification Application, startup of server authentication procedure, the result that under unit records, user profile and certification are passed through or do not passed through.
In a detailed embodiment, described user terminal executes in the information insurance management method based on cloud Following steps:
Step A1:Described user terminal obtains information, the information of acquisition is recompiled, and is saved into memorizer In;
Step A2:Information after recompiling is encrypted and is generated key by user terminal, and key is uploaded onto the server; Described key with recompile after information set up one-to-one relationship;
Step A3:The key that the reception server sends, the data of display module display information;
Step A4:Information after receiving and deciphering, then decodes this information.
In a detailed embodiment, described server executes in the information insurance management method based on cloud Following steps:
Step B1:The key that described server receive user terminal sends;
Step B2:Obtain Permission Levels, according to the Permission Levels screening key obtaining, and the selection result is sent to user Terminal;
Step B3:Server extracts this information after recompiling from memory module, and is combined deciphering with key, will solve Information after close is sent to memory module.
The present invention proposes a kind of information insurance management system based on cloud and method.To the information in user terminal Encrypt and recompile generation unique key, key is uploaded onto the server preservation, read internal system information by cloud service Device mandate simultaneously sets up access record, and the storage of key is separated with the storage of information, and then realizes enterprises information security, secret Easily link up again.
Described above illustrate and describes the preferred embodiments of the present invention, as previously mentioned it should be understood that the present invention not office Be limited to form disclosed herein, be not to be taken as the exclusion to other embodiment, and can be used for various other combinations, modification and Environment, and can be changed by the technology or knowledge of above-mentioned teaching or association area in invention contemplated scope described herein Dynamic.And the change that those skilled in the art are carried out and change without departing from the spirit and scope of the present invention, then all should be appended by the present invention In scope of the claims.

Claims (10)

1. a kind of information insurance management method based on cloud is it is characterised in that comprise the following steps:
Step S100:Acquisition information, the information of acquisition is recompiled, and is saved in memorizer;
Step S200:Information after recompiling is encrypted and generates key, and key is uploaded onto the server;
Described key with recompile after information set up one-to-one relationship;
Step S300:Obtain Permission Levels, according to the Permission Levels screening key obtaining, and the selection result is sent to user eventually End;
Step S400:The data of display module display information;
Step S500:Selection information, then server extract this information after recompiling from memory module, and with key knot Close deciphering, the information after deciphering is sent to memory module, then decodes this information.
2. as claimed in claim 1 a kind of information insurance management method based on cloud it is characterised in that described will obtain Information recompile refer to will by coding/decoding module to obtain information encode, and generate only present system can File format with identification.
3. as claimed in claim 1 a kind of information insurance management method based on cloud it is characterised in that described acquisition letter Breath refers to process original information, or is externally introduced new information.
4. as claimed in claim 1 a kind of information insurance management method based on cloud it is characterised in that described step Also include starting authentication procedure before the step of S100 acquisition information, user terminal is connected with server communication, described startup certification Program refers to that the authentication module of user terminal carries out authentication to user.
5. as claimed in claim 1 a kind of information insurance management method based on cloud it is characterised in that described step Further comprising the steps of before obtaining Permission Levels in S300, user terminal sends certification application, startup of server authentication procedure, If certification is passed through, server obtains Permission Levels.
6. as claimed in claim 1 a kind of information insurance management method based on cloud it is characterised in that Permission Levels from Highest level authority is divided into the authority of different stage to lowest level authority, and described high level authority can authorize rank lower than it Authority.
7. as claimed in claim 5 a kind of information insurance management method based on cloud it is characterised in that described upload, Download and verification process all generates record in the server, and preserve in the memory unit.
8. a kind of information insurance management method based on cloud is it is characterised in that comprise the following steps:
Step A1:Described user terminal obtains information, the information of acquisition is recompiled, and is saved in memorizer;
Step A2:Information after recompiling is encrypted and is generated key by user terminal, and key is uploaded onto the server;Described Key with recompile after information set up one-to-one relationship;
Step A3:The key that the reception server sends, the data of display module display information;
Step A4:Information after receiving and deciphering, then decodes this information.
9. a kind of information insurance management method based on cloud is it is characterised in that comprise the following steps:
Step B1:The key that described server receive user terminal sends;
Step B2:Obtain Permission Levels, according to the Permission Levels screening key obtaining, and the selection result is sent to user eventually End;
Step B3:Server extracts this information after recompiling from memory module, and is combined deciphering with key, after deciphering Information be sent to memory module.
10. a kind of information insurance management system based on cloud it is characterised in that:Including
User terminal, server, described user terminal is connected with server communication;
Described user terminal includes processor, authentication module, import modul, coding/decoding module, memorizer, encrypting module, display Module, communication module, described processor passes through interface circuit and authentication module, import modul, coding/decoding module, memorizer, adds Close module, display module, communication module are connected and communicate;
Described server includes authentication ' unit, memory element, CPU control unit, communication unit, decryption unit, and described CPU controls Unit is connected with authentication ' unit, memory element, communication unit, decryption unit and is communicated by interface circuit.
CN201610841380.0A 2016-09-22 2016-09-22 A kind of information insurance management system and method based on cloud Expired - Fee Related CN106453273B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610841380.0A CN106453273B (en) 2016-09-22 2016-09-22 A kind of information insurance management system and method based on cloud

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610841380.0A CN106453273B (en) 2016-09-22 2016-09-22 A kind of information insurance management system and method based on cloud

Publications (2)

Publication Number Publication Date
CN106453273A true CN106453273A (en) 2017-02-22
CN106453273B CN106453273B (en) 2019-09-13

Family

ID=58166391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610841380.0A Expired - Fee Related CN106453273B (en) 2016-09-22 2016-09-22 A kind of information insurance management system and method based on cloud

Country Status (1)

Country Link
CN (1) CN106453273B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147679A (en) * 2017-07-17 2017-09-08 长威信息科技发展股份有限公司 Information transferring method, system and the device of self-service accreditation machine private network remote access
CN112311536A (en) * 2020-09-30 2021-02-02 航天信息股份有限公司 Key hierarchical management method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701611A (en) * 2013-12-30 2014-04-02 天地融科技股份有限公司 Method for accessing and uploading data in data storage system
CN105184058A (en) * 2015-08-17 2015-12-23 李泉生 Private conversation robot
CN105760781A (en) * 2016-03-02 2016-07-13 四川师范大学 Storage method, restoration method and operation method of ordered and derivable large-data files
CN105933345A (en) * 2016-06-28 2016-09-07 电子科技大学 Verifiable outsourcing attribute-based encryption method based on linear secret sharing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701611A (en) * 2013-12-30 2014-04-02 天地融科技股份有限公司 Method for accessing and uploading data in data storage system
CN105184058A (en) * 2015-08-17 2015-12-23 李泉生 Private conversation robot
CN105760781A (en) * 2016-03-02 2016-07-13 四川师范大学 Storage method, restoration method and operation method of ordered and derivable large-data files
CN105933345A (en) * 2016-06-28 2016-09-07 电子科技大学 Verifiable outsourcing attribute-based encryption method based on linear secret sharing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
汪金龙,马继红: "一种基于安全策略云存储系统中的关键技术研究", 《信息技术与信息化》 *
贾红: "移动云环境下基于属性解密的外包技术研究", 《万方数据知识服务平台》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147679A (en) * 2017-07-17 2017-09-08 长威信息科技发展股份有限公司 Information transferring method, system and the device of self-service accreditation machine private network remote access
CN112311536A (en) * 2020-09-30 2021-02-02 航天信息股份有限公司 Key hierarchical management method and system

Also Published As

Publication number Publication date
CN106453273B (en) 2019-09-13

Similar Documents

Publication Publication Date Title
US10769287B2 (en) Forced data transformation policy
US8260353B2 (en) SIM messaging client
JP5365512B2 (en) Software IC card system, management server, terminal, service providing server, service providing method and program
WO2019237570A1 (en) Electronic contract signing method, device and server
US20170277774A1 (en) Systems and methods for secure storage of user information in a user profile
CN108234515A (en) A kind of Self-certified digital identity management system and its method based on intelligent contract
US20110142230A1 (en) Real-time data encryption
CN101310286A (en) Improved single sign on
EP3469512A1 (en) Systems and methods for secure storage of user information in a user profile
US11282071B2 (en) Digital identity management device
US8220040B2 (en) Verifying that group membership requirements are met by users
CN101165705B (en) Image forming apparatus and user authentication system
US20240163279A1 (en) Systems and methods for securing login access
CN103812649A (en) Method and system for safety access control of machine-card interface, and handset terminal
WO1999012144A1 (en) Digital signature generating server and digital signature generating method
US7412603B2 (en) Methods and systems for enabling secure storage of sensitive data
KR101346284B1 (en) Method for producing an encrypted file and decrypting the encrypted file, computer readable recording medium a program for implementing the methods
CN106453273B (en) A kind of information insurance management system and method based on cloud
CN105515959A (en) Implementation method of CMS technology-based instant messenger security system
US20220188395A1 (en) Digital identity management device
AU2013200453B2 (en) Methods and Systems for Increasing the Security of Electronic Messages
CN111767576A (en) User matching method and system based on privacy information and readable storage medium
CN112257084A (en) Personal information storage and monitoring method, system and storage medium based on block chain
US20230208634A1 (en) Key management method and apparatus
CN117118750B (en) Data sharing method and device based on white-box password, electronic equipment and medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 710119 the six level of new industrial park development avenue ten, new high-tech industrial park, Xi'an, Shaanxi.

Applicant after: Xi'an Morebeck Semiconductor Technology Co., Ltd.

Address before: 710119 the three layer of No. 10 hi-tech development road, Yanta District, Xi'an, Shaanxi.

Applicant before: Xi'an Morebeck Semiconductor Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190913

Termination date: 20200922