+

CN107122139A - Method for writing data and device, method for reading data and device - Google Patents

Method for writing data and device, method for reading data and device Download PDF

Info

Publication number
CN107122139A
CN107122139A CN201710294483.4A CN201710294483A CN107122139A CN 107122139 A CN107122139 A CN 107122139A CN 201710294483 A CN201710294483 A CN 201710294483A CN 107122139 A CN107122139 A CN 107122139A
Authority
CN
China
Prior art keywords
data
write
cryptographic hash
request
read
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710294483.4A
Other languages
Chinese (zh)
Inventor
张健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tinno Wireless Technology Co Ltd
Original Assignee
Shenzhen Tinno Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tinno Wireless Technology Co Ltd filed Critical Shenzhen Tinno Wireless Technology Co Ltd
Priority to CN201710294483.4A priority Critical patent/CN107122139A/en
Publication of CN107122139A publication Critical patent/CN107122139A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/061Improving I/O performance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • G06F16/137Hash-based
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiments of the invention provide a kind of method for writing data and device, method for reading data and device.In the embodiment of the present invention, including data writing process and two processes of digital independent, after the cryptographic Hash of record write-in data, storage is encrypted to the write-in data, in data read process, when the cryptographic Hash of read requests key and the cryptographic Hash of data to be read match, corresponding data just can be read, compared with prior art, the cryptographic Hash of write-in data can be only preserved, key is asked without preserving it, different data can use different keys, therefore data access speed can have been taken into account on the premise of data access security is ensured.

Description

Method for writing data and device, method for reading data and device
【Technical field】
The present invention relates to Internet technical field, more particularly to a kind of method for writing data and device, method for reading data And device.
【Background technology】
With the arrival in big data epoch, data volume is continuously increased, and the visit capacity of database also constantly increases, user's logarithm According to access speed requirement also more and more higher.Generally, in order to improve the access speed of data, it is necessary to will access data write-in The internal memory of data server, then conduct interviews.However, data access security also can not be ignored, typically pass through software pair at present The write-in data modes that are encrypted realizes access safety, but this can reduce the speed of digital independent.
Therefore, how the contradiction between data access speed and data access security, write using rational data It is those skilled in the art's urgent problem to be solved to enter with method for reading data.
【The content of the invention】
In view of this, the embodiments of the invention provide a kind of method for writing data and device, method for reading data and device, To solve the problem of data access speed can not be taken into account safely with data access in the prior art.
In a first aspect, the embodiments of the invention provide a kind of method for writing data, including:
Data write request is received, the data write request includes write-in data and request key;
Calculate the first cryptographic Hash of the request key;
When said write data are not present in writing position, first cryptographic Hash is recorded, and based on the request key Stored after said write data are encrypted to said write position.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, methods described is also Including:
When said write position has said write data, judge that first cryptographic Hash is corresponding with said write data The second cryptographic Hash it is whether identical;
If so, being stored after said write data are encrypted based on the request key to said write position.
Second aspect, the embodiments of the invention provide a kind of method for writing data, including:
Data write request is received, the data write request includes write-in data;
When said write data are not present in writing position, it is sky to record first cryptographic Hash, and by said write number According to storing to said write position.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, methods described is also Including:
When said write position has said write data, whether corresponding second cryptographic Hash of said write data is judged For sky;
If so, by said write data storage to said write position.
The third aspect, the embodiments of the invention provide a kind of method for reading data, including:
Data read request is received, the data read request includes reading information and request key;
Calculate the first cryptographic Hash of the request key;
Judge whether the second cryptographic Hash of first cryptographic Hash data to be read corresponding with the reading information is identical;
If so, being read out based on the request key to the data to be read.
Fourth aspect, the embodiments of the invention provide a kind of method for reading data, including:
Data read request is received, the data read request includes reading information;
Whether the second cryptographic Hash for judging reading information correspondence data to be read is empty;
If so, being read out to the data to be read.
5th aspect, the embodiments of the invention provide a kind of data transfer apparatus, including:
Receiving module, for receiving data write request, the data write request includes write-in data and request key;
Computing module, the first cryptographic Hash for calculating the request key;
First writing module, for when said write data are not present in writing position, recording first cryptographic Hash, and Stored after said write data are encrypted based on the request key to said write position.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, described device is also Including:
Second writing module, for when said write position has said write data, judging first cryptographic Hash Whether the second cryptographic Hash corresponding with said write data is identical;
If so, being stored after said write data are encrypted based on the request key to said write position.
6th aspect, the embodiments of the invention provide a kind of data transfer apparatus, including:
Receiving module, for receiving data write request, the data write request includes write-in data;
First writing module, for when said write data are not present in writing position, recording first cryptographic Hash to be Sky, and by said write data storage to said write position.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, described device is also Including:
Second writing module, for when said write position has said write data, judging said write data pair Whether the second cryptographic Hash answered is empty;
If so, by said write data storage to said write position.
7th aspect, the embodiments of the invention provide a kind of digital independent device, including:
Receiving module, for receiving data read request, the data read request includes reading information and request key;
Computing module, the first cryptographic Hash for calculating the request key;
Judge module, the second Hash for judging first cryptographic Hash data to be read corresponding with the reading information Whether value is identical;
Read module, for if so, being read out based on the request key to the data to be read.
Eighth aspect, the embodiments of the invention provide a kind of digital independent device, including:
Receiving module, for receiving data read request, the data read request includes reading information;
Judge module, for judging whether the second cryptographic Hash of reading information correspondence data to be read is empty;
Judge module, for if so, being read out to the data to be read.
A technical scheme in above-mentioned technical proposal has the advantages that:
In the embodiment of the present invention, including data writing process and two processes of digital independent, the Hash of record write-in data After value, storage is encrypted to the write-in data, in data read process, cryptographic Hash and access of continuing when read requests key According to cryptographic Hash match when, corresponding data just can be read, compared with prior art, can only preserve write-in data Hash Value, asks key, different data can use different keys, therefore can ensure data access security without preserving it On the premise of, take into account data access speed.
【Brief description of the drawings】
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be attached to what is used required in embodiment Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this area For those of ordinary skill, without having to pay creative labor, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 is a kind of schematic flow sheet for method for writing data that the embodiment of the present invention is provided;
Fig. 2 is the schematic flow sheet for another method for writing data that the embodiment of the present invention is provided;
Fig. 3 is a kind of schematic flow sheet for method for reading data that the embodiment of the present invention is provided;
Fig. 4 is the schematic flow sheet for another method for reading data that the embodiment of the present invention is provided;
Fig. 5 is a kind of functional block diagram for data transfer apparatus that the embodiment of the present invention is provided;
Fig. 6 is the functional block diagram for another data transfer apparatus that the embodiment of the present invention is provided;
Fig. 7 is a kind of functional block diagram for digital independent device that the embodiment of the present invention is provided;
Fig. 8 is the functional block diagram for another digital independent device that the embodiment of the present invention is provided.
【Embodiment】
In order to be better understood from technical scheme, the embodiment of the present invention is retouched in detail below in conjunction with the accompanying drawings State.
It will be appreciated that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Base Embodiment in the present invention, those of ordinary skill in the art obtained under the premise of creative work is not made it is all its Its embodiment, belongs to the scope of protection of the invention.
The term used in embodiments of the present invention is the purpose only merely for description specific embodiment, and is not intended to be limiting The present invention." one kind ", " described " and "the" of singulative used in the embodiment of the present invention and appended claims It is also intended to including most forms, unless context clearly shows that other implications.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation for describing affiliated partner, represent There may be three kinds of relations, for example, A and/or B, can be represented:Individualism A, while there is A and B, individualism B these three Situation.In addition, character "/" herein, it is a kind of relation of "or" to typically represent forward-backward correlation object.
It will be appreciated that though in embodiments of the present invention Hash may be described using term first, second, third, etc. Value, but these cryptographic Hash should not necessarily be limited by these terms.These terms are only used for cryptographic Hash being distinguished from each other out.For example, not taking off In the case of from range of embodiment of the invention, the first cryptographic Hash can also be referred to as the second cryptographic Hash, similarly, the second cryptographic Hash The first cryptographic Hash can also be referred to as.
Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining " or " in response to detection ".Similarly, depending on linguistic context, phrase " if it is determined that " or " if detection (condition or event of statement) " can be construed to " when it is determined that when " or " in response to determine " or " when the detection (condition of statement Or event) when " or " in response to detection (condition or event of statement) ".
When data write request includes write-in data and request key, the embodiment of the present invention provides a kind of data write-in side Method, refer to Fig. 1, a kind of schematic flow sheet of its method for writing data provided by the embodiment of the present invention, as illustrated, should Method comprises the following steps:
Step S101, receives data write request, and the data write request includes write-in data and request key.
Step S102, calculates the first cryptographic Hash of the request key.
Step S103, when said write data are not present in writing position, records first cryptographic Hash, and based on described Request key is stored to said write position after said write data are encrypted.
It should be noted that when data write request includes request key (asking key to be not sky), calculating institute The first cryptographic Hash of request key is stated, when said write data are not present in writing position, first cryptographic Hash is recorded, please Ask key and write-in data transfer be encrypted to cryptographic hardware modules after, store to said write position.
Correspondingly, when said write position has said write data, write step includes:
A) judge whether first cryptographic Hash the second cryptographic Hash corresponding with said write data is identical;
B) if so, being stored after said write data are encrypted based on the request key to said write position;
C) if it is not, feedback wrong cipher key is notified, and forbidden data writes.
When data write request only includes write-in data, when not including request key, the embodiment of the present invention provides another Method for writing data, refer to Fig. 2, the flow signal of its another method for writing data provided by the embodiment of the present invention Figure, as illustrated, this method comprises the following steps:
Step S201, receives data write request, and the data write request includes write-in data.
Step S202, when said write data are not present in writing position, it is sky to record first cryptographic Hash, and by institute Write-in data storage is stated to said write position.
It should be noted that when not including request key (ask key for sky) in data write request, and when writing When entering position in the absence of said write data, it is sky to record first cryptographic Hash, will write data direct in the form of plaintext Store to said write position.
Correspondingly, when said write position has said write data, write step includes:
A) when said write position has said write data, judge that corresponding second cryptographic Hash of said write data is No is sky;
B) if so, by said write data storage to said write position;
C) if it is not, feedback wrong cipher key is notified, and forbidden data writes.
When data read request includes reading information and request key, the embodiment of the present invention provides a kind of digital independent side Method, refer to Fig. 3, a kind of schematic flow sheet of its method for reading data provided by the embodiment of the present invention, as illustrated, should Method comprises the following steps:
Step S301, receives data read request, and the data read request includes reading information and request key.
Step S302, calculates the first cryptographic Hash of the request key.
Step S303, judging the second cryptographic Hash of first cryptographic Hash data to be read corresponding with the reading information is It is no identical.
Step S304, if so, being read out based on the request key to the data to be read.
It should be noted that when data read request includes request key (asking key to be not sky), calculating institute The first cryptographic Hash of request key is stated, request cipher key delivery to decryption hardware module is decrypted, that is, judges that described first breathes out Whether the second cryptographic Hash of uncommon value data to be read corresponding with the reading information is identical, if identical reading corresponding data.
When data read request only includes reading information, when not including request key, the embodiment of the present invention provides another Method for reading data, refer to Fig. 4, the flow signal of its another method for reading data provided by the embodiment of the present invention Figure, as illustrated, this method comprises the following steps:
Step S401, receives data read request, and the data read request includes reading information.
Step S402, whether the second cryptographic Hash for judging reading information correspondence data to be read is empty.
Step S403, if so, being read out to the data to be read.
It should be noted that when not including request key (asking key to be sky) in data read request, judging to read Whether the cryptographic Hash of breath of winning the confidence correspondence data to be read is empty, if so, directly reading data to be read.
In the embodiment of the present invention, including data writing process and two processes of digital independent, the Hash of record write-in data After value, storage is encrypted to the write-in data, in data read process, cryptographic Hash and access of continuing when read requests key According to cryptographic Hash match when, corresponding data just can be read, compared with prior art, can only preserve write-in data Hash Value, asks key, different data can use different keys, therefore can ensure data access security without preserving it On the premise of, take into account data access speed.
It should be noted that terminal involved in the embodiment of the present invention can include but is not limited to personal computer (Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), wireless handheld Equipment, tablet personal computer (Tablet Computer), mobile phone, MP3 player, MP4 players etc..
It should be noted that the executive agent of above-mentioned steps can be data transfer apparatus or digital independent device, should Device can be located locally the application of terminal, or can also be the plug-in unit being located locally in the application of terminal or software development work The functional units such as tool bag (Software Development Kit, SDK), the embodiment of the present invention is to this without being particularly limited to.
It is understood that the application can be mounted in the application program (nativeApp) in terminal, or may be used also To be a web page program (webApp) of browser in terminal, the embodiment of the present invention is to this without limiting.
The embodiment of the present invention further provides the device embodiment for realizing each step and method in above method embodiment.
Fig. 5 is refer to, a kind of functional block diagram of its data transfer apparatus provided by the embodiment of the present invention.Such as Fig. 5 Shown, the device includes:
Receiving module 510, for receiving data write request, the data write request includes write-in data and asked close Key;
Computing module 520, the first cryptographic Hash for calculating the request key;
First writing module 530, for when said write data are not present in writing position, recording first Hash Value, and ask key to be stored after said write data are encrypted to said write position based on described.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, described device is also Including:
Second writing module 540, for when said write position has said write data, judging first Hash Whether value the second cryptographic Hash corresponding with said write data is identical;
If so, being stored after said write data are encrypted based on the request key to said write position.
Fig. 6 is refer to, the functional block diagram of its another data transfer apparatus provided by the embodiment of the present invention.As schemed Shown in 6, the device includes:
Receiving module 610, for receiving data write request, the data write request includes write-in data;
First writing module 620, for when said write data are not present in writing position, recording first cryptographic Hash For sky, and by said write data storage to said write position.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, described device is also Including:
Second writing module 630, for when said write position has said write data, judging said write data Whether corresponding second cryptographic Hash is empty;
If so, by said write data storage to said write position.
Fig. 7 is refer to, a kind of functional block diagram of its digital independent device provided by the embodiment of the present invention.Such as Fig. 7 Shown, the device includes:
Receiving module 710, for receiving data read request, the data read request includes reading information and asked close Key;
Computing module 720, the first cryptographic Hash for calculating the request key;
Judge module 730, second for judging first cryptographic Hash data to be read corresponding with the reading information Whether cryptographic Hash is identical;
Read module 740, for if so, being read out based on the request key to the data to be read.
Fig. 8 is refer to, the functional block diagram of its another digital independent device provided by the embodiment of the present invention.As schemed Shown in 8, the device includes:
Receiving module 810, for receiving data read request, the data read request includes reading information;
Judge module 820, for judging whether the second cryptographic Hash of reading information correspondence data to be read is empty;
Read module 830, for if so, being read out to the data to be read.
Because each module in the present embodiment is able to carry out the method shown in Fig. 1 to Fig. 4, what the present embodiment was not described in detail Part, refers to the related description to Fig. 1 to Fig. 4.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, for example, multiple units or group Part can combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown Or the coupling each other discussed or direct-coupling or communication connection can be by some interfaces, device or unit it is indirect Coupling is communicated to connect, and can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are to cause a computer Device (can be personal computer, server, or network equipment etc.) or processor (Processor) perform the present invention each The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various Can be with the medium of store program codes.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention God is with principle, and any modification, equivalent substitution and improvements done etc. should be included within the scope of protection of the invention.

Claims (12)

1. a kind of method for writing data, it is characterised in that methods described includes:
Data write request is received, the data write request includes write-in data and request key;
Calculate the first cryptographic Hash of the request key;
When said write data are not present in writing position, first cryptographic Hash is recorded, and based on the request key to institute State after write-in data are encrypted and store to said write position.
2. according to the method described in claim 1, it is characterised in that methods described also includes:
When said write position has said write data, first cryptographic Hash corresponding with said write data is judged Whether two cryptographic Hash are identical;
If so, being stored after said write data are encrypted based on the request key to said write position.
3. a kind of method for writing data, it is characterised in that methods described includes:
Data write request is received, the data write request includes write-in data;
When said write data are not present in writing position, it is sky to record first cryptographic Hash, and said write data are deposited Store up to said write position.
4. method according to claim 3, it is characterised in that methods described also includes:
When there are said write data in said write position, judge corresponding second cryptographic Hash of said write data whether be It is empty;
If so, by said write data storage to said write position.
5. a kind of method for reading data, it is characterised in that methods described includes:
Data read request is received, the data read request includes reading information and request key;
Calculate the first cryptographic Hash of the request key;
Judge whether the second cryptographic Hash of first cryptographic Hash data to be read corresponding with the reading information is identical;
If so, being read out based on the request key to the data to be read.
6. a kind of method for reading data, it is characterised in that methods described includes:
Data read request is received, the data read request includes reading information;
Whether the second cryptographic Hash for judging reading information correspondence data to be read is empty;
If so, being read out to the data to be read.
7. a kind of data transfer apparatus, it is characterised in that described device includes:
Receiving module, for receiving data write request, the data write request includes write-in data and request key;
Computing module, the first cryptographic Hash for calculating the request key;
First writing module, for when said write data are not present in writing position, recording first cryptographic Hash, and be based on The request key is stored to said write position after said write data are encrypted.
8. device according to claim 7, it is characterised in that described device also includes:
Second writing module, for when said write position has said write data, judging first cryptographic Hash and institute Whether identical state corresponding second cryptographic Hash of write-in data;
If so, being stored after said write data are encrypted based on the request key to said write position.
9. a kind of data transfer apparatus, it is characterised in that described device includes:
Receiving module, for receiving data write request, the data write request includes write-in data;
First writing module, for when writing position be not present said write data when, record first cryptographic Hash for sky, and By said write data storage to said write position.
10. device according to claim 9, it is characterised in that described device also includes:
Second writing module, for when said write position has said write data, judging that said write data are corresponding Whether the second cryptographic Hash is empty;
If so, by said write data storage to said write position.
11. a kind of digital independent device, it is characterised in that described device includes:
Receiving module, for receiving data read request, the data read request includes reading information and request key;
Computing module, the first cryptographic Hash for calculating the request key;
Judge module, for judging that the second cryptographic Hash of first cryptographic Hash data to be read corresponding with the reading information is It is no identical;
Read module, for if so, being read out based on the request key to the data to be read.
12. a kind of digital independent device, it is characterised in that described device includes:
Receiving module, for receiving data read request, the data read request includes reading information;
Judge module, for judging whether the second cryptographic Hash of reading information correspondence data to be read is empty;
Judge module, for if so, being read out to the data to be read.
CN201710294483.4A 2017-04-28 2017-04-28 Method for writing data and device, method for reading data and device Pending CN107122139A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710294483.4A CN107122139A (en) 2017-04-28 2017-04-28 Method for writing data and device, method for reading data and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710294483.4A CN107122139A (en) 2017-04-28 2017-04-28 Method for writing data and device, method for reading data and device

Publications (1)

Publication Number Publication Date
CN107122139A true CN107122139A (en) 2017-09-01

Family

ID=59725229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710294483.4A Pending CN107122139A (en) 2017-04-28 2017-04-28 Method for writing data and device, method for reading data and device

Country Status (1)

Country Link
CN (1) CN107122139A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110929303A (en) * 2019-11-29 2020-03-27 江苏芯盛智能科技有限公司 Data processing method, device and system and solid state disk
CN112685756A (en) * 2020-12-30 2021-04-20 北京海泰方圆科技股份有限公司 Data writing and reading method, device, medium and equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1806410A (en) * 2003-06-12 2006-07-19 松下电器产业株式会社 Encryption communication system
CN102930224A (en) * 2012-10-19 2013-02-13 华为技术有限公司 Hard drive data write/read method and device
US20130185557A1 (en) * 2012-01-13 2013-07-18 Microsoft Corporation Detection of Invalid Escrow Keys
CN103973810A (en) * 2014-05-22 2014-08-06 华为技术有限公司 Data processing method and device based on IP disk
CN105681032A (en) * 2016-01-08 2016-06-15 腾讯科技(深圳)有限公司 Key storage method and device as well as key management method and device
CN105825143A (en) * 2016-03-07 2016-08-03 乐视移动智能信息技术(北京)有限公司 Application program data writing and reading method and device
CN106126374A (en) * 2016-06-22 2016-11-16 腾讯科技(深圳)有限公司 Method for writing data, method for reading data and device
CN106506613A (en) * 2016-10-31 2017-03-15 大唐高鸿信安(浙江)信息科技有限公司 The data storage location encryption method of distributed key value storage systems

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1806410A (en) * 2003-06-12 2006-07-19 松下电器产业株式会社 Encryption communication system
US20130185557A1 (en) * 2012-01-13 2013-07-18 Microsoft Corporation Detection of Invalid Escrow Keys
CN102930224A (en) * 2012-10-19 2013-02-13 华为技术有限公司 Hard drive data write/read method and device
CN103973810A (en) * 2014-05-22 2014-08-06 华为技术有限公司 Data processing method and device based on IP disk
CN105681032A (en) * 2016-01-08 2016-06-15 腾讯科技(深圳)有限公司 Key storage method and device as well as key management method and device
CN105825143A (en) * 2016-03-07 2016-08-03 乐视移动智能信息技术(北京)有限公司 Application program data writing and reading method and device
CN106126374A (en) * 2016-06-22 2016-11-16 腾讯科技(深圳)有限公司 Method for writing data, method for reading data and device
CN106506613A (en) * 2016-10-31 2017-03-15 大唐高鸿信安(浙江)信息科技有限公司 The data storage location encryption method of distributed key value storage systems

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110929303A (en) * 2019-11-29 2020-03-27 江苏芯盛智能科技有限公司 Data processing method, device and system and solid state disk
CN112685756A (en) * 2020-12-30 2021-04-20 北京海泰方圆科技股份有限公司 Data writing and reading method, device, medium and equipment

Similar Documents

Publication Publication Date Title
CN113535721B (en) Data writing method and device
CN104541271A (en) Generating scenes and tours from spreadsheet data
CN111339572A (en) Method and system for verifying integrity of cloud data, terminal device and storage medium
CN106572095B (en) Account registration method, apparatus and system
CN110162523A (en) Date storage method, system, device and equipment
CN104967593A (en) Identity verification method, apparatus and system
CN103870955B (en) The processing method and processing device of data in webpage
CN109889468A (en) Transmission method, system, device, equipment and the storage medium of network data
CN112751920B (en) Block chain-based network interaction behavior evidence obtaining method and device and terminal
CN107122139A (en) Method for writing data and device, method for reading data and device
CN103294407A (en) Storage device and data read-write method
US7409527B2 (en) Bidirectional data storing method
CN106535152A (en) Terminal-based application data processing method, device and system
CN107682526A (en) A kind of application message methods of exhibiting and its equipment
JP2009245079A (en) Information terminal device and information processing method
US8001114B2 (en) Methods and apparatuses for dynamically searching for electronic mail messages
US8478822B2 (en) Device and method of sharing contents based on time synchronization
CN106713041A (en) Session log transmitting method and device
CN106203107A (en) Method and device for preventing system menu from being maliciously modified and electronic equipment
CN107436918A (en) Database implementation method, device and equipment
CN110059081A (en) Data output method, device and the computer equipment shown based on data
CN108241583A (en) Data processing method, application server and the computer readable storage medium that wages calculate
US20110040778A1 (en) Methods and apparatuses for dynamically displaying search suggestions
CN115412726A (en) Video authenticity detection method and device and storage medium
EP3812999B1 (en) Multiple blockchain network-based data reading method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170901

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载