CN107122139A - Method for writing data and device, method for reading data and device - Google Patents
Method for writing data and device, method for reading data and device Download PDFInfo
- Publication number
- CN107122139A CN107122139A CN201710294483.4A CN201710294483A CN107122139A CN 107122139 A CN107122139 A CN 107122139A CN 201710294483 A CN201710294483 A CN 201710294483A CN 107122139 A CN107122139 A CN 107122139A
- Authority
- CN
- China
- Prior art keywords
- data
- write
- cryptographic hash
- request
- read
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/061—Improving I/O performance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/13—File access structures, e.g. distributed indices
- G06F16/137—Hash-based
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The embodiments of the invention provide a kind of method for writing data and device, method for reading data and device.In the embodiment of the present invention, including data writing process and two processes of digital independent, after the cryptographic Hash of record write-in data, storage is encrypted to the write-in data, in data read process, when the cryptographic Hash of read requests key and the cryptographic Hash of data to be read match, corresponding data just can be read, compared with prior art, the cryptographic Hash of write-in data can be only preserved, key is asked without preserving it, different data can use different keys, therefore data access speed can have been taken into account on the premise of data access security is ensured.
Description
【Technical field】
The present invention relates to Internet technical field, more particularly to a kind of method for writing data and device, method for reading data
And device.
【Background technology】
With the arrival in big data epoch, data volume is continuously increased, and the visit capacity of database also constantly increases, user's logarithm
According to access speed requirement also more and more higher.Generally, in order to improve the access speed of data, it is necessary to will access data write-in
The internal memory of data server, then conduct interviews.However, data access security also can not be ignored, typically pass through software pair at present
The write-in data modes that are encrypted realizes access safety, but this can reduce the speed of digital independent.
Therefore, how the contradiction between data access speed and data access security, write using rational data
It is those skilled in the art's urgent problem to be solved to enter with method for reading data.
【The content of the invention】
In view of this, the embodiments of the invention provide a kind of method for writing data and device, method for reading data and device,
To solve the problem of data access speed can not be taken into account safely with data access in the prior art.
In a first aspect, the embodiments of the invention provide a kind of method for writing data, including:
Data write request is received, the data write request includes write-in data and request key;
Calculate the first cryptographic Hash of the request key;
When said write data are not present in writing position, first cryptographic Hash is recorded, and based on the request key
Stored after said write data are encrypted to said write position.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, methods described is also
Including:
When said write position has said write data, judge that first cryptographic Hash is corresponding with said write data
The second cryptographic Hash it is whether identical;
If so, being stored after said write data are encrypted based on the request key to said write position.
Second aspect, the embodiments of the invention provide a kind of method for writing data, including:
Data write request is received, the data write request includes write-in data;
When said write data are not present in writing position, it is sky to record first cryptographic Hash, and by said write number
According to storing to said write position.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, methods described is also
Including:
When said write position has said write data, whether corresponding second cryptographic Hash of said write data is judged
For sky;
If so, by said write data storage to said write position.
The third aspect, the embodiments of the invention provide a kind of method for reading data, including:
Data read request is received, the data read request includes reading information and request key;
Calculate the first cryptographic Hash of the request key;
Judge whether the second cryptographic Hash of first cryptographic Hash data to be read corresponding with the reading information is identical;
If so, being read out based on the request key to the data to be read.
Fourth aspect, the embodiments of the invention provide a kind of method for reading data, including:
Data read request is received, the data read request includes reading information;
Whether the second cryptographic Hash for judging reading information correspondence data to be read is empty;
If so, being read out to the data to be read.
5th aspect, the embodiments of the invention provide a kind of data transfer apparatus, including:
Receiving module, for receiving data write request, the data write request includes write-in data and request key;
Computing module, the first cryptographic Hash for calculating the request key;
First writing module, for when said write data are not present in writing position, recording first cryptographic Hash, and
Stored after said write data are encrypted based on the request key to said write position.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, described device is also
Including:
Second writing module, for when said write position has said write data, judging first cryptographic Hash
Whether the second cryptographic Hash corresponding with said write data is identical;
If so, being stored after said write data are encrypted based on the request key to said write position.
6th aspect, the embodiments of the invention provide a kind of data transfer apparatus, including:
Receiving module, for receiving data write request, the data write request includes write-in data;
First writing module, for when said write data are not present in writing position, recording first cryptographic Hash to be
Sky, and by said write data storage to said write position.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, described device is also
Including:
Second writing module, for when said write position has said write data, judging said write data pair
Whether the second cryptographic Hash answered is empty;
If so, by said write data storage to said write position.
7th aspect, the embodiments of the invention provide a kind of digital independent device, including:
Receiving module, for receiving data read request, the data read request includes reading information and request key;
Computing module, the first cryptographic Hash for calculating the request key;
Judge module, the second Hash for judging first cryptographic Hash data to be read corresponding with the reading information
Whether value is identical;
Read module, for if so, being read out based on the request key to the data to be read.
Eighth aspect, the embodiments of the invention provide a kind of digital independent device, including:
Receiving module, for receiving data read request, the data read request includes reading information;
Judge module, for judging whether the second cryptographic Hash of reading information correspondence data to be read is empty;
Judge module, for if so, being read out to the data to be read.
A technical scheme in above-mentioned technical proposal has the advantages that:
In the embodiment of the present invention, including data writing process and two processes of digital independent, the Hash of record write-in data
After value, storage is encrypted to the write-in data, in data read process, cryptographic Hash and access of continuing when read requests key
According to cryptographic Hash match when, corresponding data just can be read, compared with prior art, can only preserve write-in data Hash
Value, asks key, different data can use different keys, therefore can ensure data access security without preserving it
On the premise of, take into account data access speed.
【Brief description of the drawings】
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be attached to what is used required in embodiment
Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this area
For those of ordinary skill, without having to pay creative labor, it can also be obtained according to these accompanying drawings other attached
Figure.
Fig. 1 is a kind of schematic flow sheet for method for writing data that the embodiment of the present invention is provided;
Fig. 2 is the schematic flow sheet for another method for writing data that the embodiment of the present invention is provided;
Fig. 3 is a kind of schematic flow sheet for method for reading data that the embodiment of the present invention is provided;
Fig. 4 is the schematic flow sheet for another method for reading data that the embodiment of the present invention is provided;
Fig. 5 is a kind of functional block diagram for data transfer apparatus that the embodiment of the present invention is provided;
Fig. 6 is the functional block diagram for another data transfer apparatus that the embodiment of the present invention is provided;
Fig. 7 is a kind of functional block diagram for digital independent device that the embodiment of the present invention is provided;
Fig. 8 is the functional block diagram for another digital independent device that the embodiment of the present invention is provided.
【Embodiment】
In order to be better understood from technical scheme, the embodiment of the present invention is retouched in detail below in conjunction with the accompanying drawings
State.
It will be appreciated that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Base
Embodiment in the present invention, those of ordinary skill in the art obtained under the premise of creative work is not made it is all its
Its embodiment, belongs to the scope of protection of the invention.
The term used in embodiments of the present invention is the purpose only merely for description specific embodiment, and is not intended to be limiting
The present invention." one kind ", " described " and "the" of singulative used in the embodiment of the present invention and appended claims
It is also intended to including most forms, unless context clearly shows that other implications.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation for describing affiliated partner, represent
There may be three kinds of relations, for example, A and/or B, can be represented:Individualism A, while there is A and B, individualism B these three
Situation.In addition, character "/" herein, it is a kind of relation of "or" to typically represent forward-backward correlation object.
It will be appreciated that though in embodiments of the present invention Hash may be described using term first, second, third, etc.
Value, but these cryptographic Hash should not necessarily be limited by these terms.These terms are only used for cryptographic Hash being distinguished from each other out.For example, not taking off
In the case of from range of embodiment of the invention, the first cryptographic Hash can also be referred to as the second cryptographic Hash, similarly, the second cryptographic Hash
The first cryptographic Hash can also be referred to as.
Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining " or " in response to detection ".Similarly, depending on linguistic context, phrase " if it is determined that " or " if detection
(condition or event of statement) " can be construed to " when it is determined that when " or " in response to determine " or " when the detection (condition of statement
Or event) when " or " in response to detection (condition or event of statement) ".
When data write request includes write-in data and request key, the embodiment of the present invention provides a kind of data write-in side
Method, refer to Fig. 1, a kind of schematic flow sheet of its method for writing data provided by the embodiment of the present invention, as illustrated, should
Method comprises the following steps:
Step S101, receives data write request, and the data write request includes write-in data and request key.
Step S102, calculates the first cryptographic Hash of the request key.
Step S103, when said write data are not present in writing position, records first cryptographic Hash, and based on described
Request key is stored to said write position after said write data are encrypted.
It should be noted that when data write request includes request key (asking key to be not sky), calculating institute
The first cryptographic Hash of request key is stated, when said write data are not present in writing position, first cryptographic Hash is recorded, please
Ask key and write-in data transfer be encrypted to cryptographic hardware modules after, store to said write position.
Correspondingly, when said write position has said write data, write step includes:
A) judge whether first cryptographic Hash the second cryptographic Hash corresponding with said write data is identical;
B) if so, being stored after said write data are encrypted based on the request key to said write position;
C) if it is not, feedback wrong cipher key is notified, and forbidden data writes.
When data write request only includes write-in data, when not including request key, the embodiment of the present invention provides another
Method for writing data, refer to Fig. 2, the flow signal of its another method for writing data provided by the embodiment of the present invention
Figure, as illustrated, this method comprises the following steps:
Step S201, receives data write request, and the data write request includes write-in data.
Step S202, when said write data are not present in writing position, it is sky to record first cryptographic Hash, and by institute
Write-in data storage is stated to said write position.
It should be noted that when not including request key (ask key for sky) in data write request, and when writing
When entering position in the absence of said write data, it is sky to record first cryptographic Hash, will write data direct in the form of plaintext
Store to said write position.
Correspondingly, when said write position has said write data, write step includes:
A) when said write position has said write data, judge that corresponding second cryptographic Hash of said write data is
No is sky;
B) if so, by said write data storage to said write position;
C) if it is not, feedback wrong cipher key is notified, and forbidden data writes.
When data read request includes reading information and request key, the embodiment of the present invention provides a kind of digital independent side
Method, refer to Fig. 3, a kind of schematic flow sheet of its method for reading data provided by the embodiment of the present invention, as illustrated, should
Method comprises the following steps:
Step S301, receives data read request, and the data read request includes reading information and request key.
Step S302, calculates the first cryptographic Hash of the request key.
Step S303, judging the second cryptographic Hash of first cryptographic Hash data to be read corresponding with the reading information is
It is no identical.
Step S304, if so, being read out based on the request key to the data to be read.
It should be noted that when data read request includes request key (asking key to be not sky), calculating institute
The first cryptographic Hash of request key is stated, request cipher key delivery to decryption hardware module is decrypted, that is, judges that described first breathes out
Whether the second cryptographic Hash of uncommon value data to be read corresponding with the reading information is identical, if identical reading corresponding data.
When data read request only includes reading information, when not including request key, the embodiment of the present invention provides another
Method for reading data, refer to Fig. 4, the flow signal of its another method for reading data provided by the embodiment of the present invention
Figure, as illustrated, this method comprises the following steps:
Step S401, receives data read request, and the data read request includes reading information.
Step S402, whether the second cryptographic Hash for judging reading information correspondence data to be read is empty.
Step S403, if so, being read out to the data to be read.
It should be noted that when not including request key (asking key to be sky) in data read request, judging to read
Whether the cryptographic Hash of breath of winning the confidence correspondence data to be read is empty, if so, directly reading data to be read.
In the embodiment of the present invention, including data writing process and two processes of digital independent, the Hash of record write-in data
After value, storage is encrypted to the write-in data, in data read process, cryptographic Hash and access of continuing when read requests key
According to cryptographic Hash match when, corresponding data just can be read, compared with prior art, can only preserve write-in data Hash
Value, asks key, different data can use different keys, therefore can ensure data access security without preserving it
On the premise of, take into account data access speed.
It should be noted that terminal involved in the embodiment of the present invention can include but is not limited to personal computer
(Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), wireless handheld
Equipment, tablet personal computer (Tablet Computer), mobile phone, MP3 player, MP4 players etc..
It should be noted that the executive agent of above-mentioned steps can be data transfer apparatus or digital independent device, should
Device can be located locally the application of terminal, or can also be the plug-in unit being located locally in the application of terminal or software development work
The functional units such as tool bag (Software Development Kit, SDK), the embodiment of the present invention is to this without being particularly limited to.
It is understood that the application can be mounted in the application program (nativeApp) in terminal, or may be used also
To be a web page program (webApp) of browser in terminal, the embodiment of the present invention is to this without limiting.
The embodiment of the present invention further provides the device embodiment for realizing each step and method in above method embodiment.
Fig. 5 is refer to, a kind of functional block diagram of its data transfer apparatus provided by the embodiment of the present invention.Such as Fig. 5
Shown, the device includes:
Receiving module 510, for receiving data write request, the data write request includes write-in data and asked close
Key;
Computing module 520, the first cryptographic Hash for calculating the request key;
First writing module 530, for when said write data are not present in writing position, recording first Hash
Value, and ask key to be stored after said write data are encrypted to said write position based on described.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, described device is also
Including:
Second writing module 540, for when said write position has said write data, judging first Hash
Whether value the second cryptographic Hash corresponding with said write data is identical;
If so, being stored after said write data are encrypted based on the request key to said write position.
Fig. 6 is refer to, the functional block diagram of its another data transfer apparatus provided by the embodiment of the present invention.As schemed
Shown in 6, the device includes:
Receiving module 610, for receiving data write request, the data write request includes write-in data;
First writing module 620, for when said write data are not present in writing position, recording first cryptographic Hash
For sky, and by said write data storage to said write position.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, described device is also
Including:
Second writing module 630, for when said write position has said write data, judging said write data
Whether corresponding second cryptographic Hash is empty;
If so, by said write data storage to said write position.
Fig. 7 is refer to, a kind of functional block diagram of its digital independent device provided by the embodiment of the present invention.Such as Fig. 7
Shown, the device includes:
Receiving module 710, for receiving data read request, the data read request includes reading information and asked close
Key;
Computing module 720, the first cryptographic Hash for calculating the request key;
Judge module 730, second for judging first cryptographic Hash data to be read corresponding with the reading information
Whether cryptographic Hash is identical;
Read module 740, for if so, being read out based on the request key to the data to be read.
Fig. 8 is refer to, the functional block diagram of its another digital independent device provided by the embodiment of the present invention.As schemed
Shown in 8, the device includes:
Receiving module 810, for receiving data read request, the data read request includes reading information;
Judge module 820, for judging whether the second cryptographic Hash of reading information correspondence data to be read is empty;
Read module 830, for if so, being read out to the data to be read.
Because each module in the present embodiment is able to carry out the method shown in Fig. 1 to Fig. 4, what the present embodiment was not described in detail
Part, refers to the related description to Fig. 1 to Fig. 4.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, for example, multiple units or group
Part can combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown
Or the coupling each other discussed or direct-coupling or communication connection can be by some interfaces, device or unit it is indirect
Coupling is communicated to connect, and can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are to cause a computer
Device (can be personal computer, server, or network equipment etc.) or processor (Processor) perform the present invention each
The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various
Can be with the medium of store program codes.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
God is with principle, and any modification, equivalent substitution and improvements done etc. should be included within the scope of protection of the invention.
Claims (12)
1. a kind of method for writing data, it is characterised in that methods described includes:
Data write request is received, the data write request includes write-in data and request key;
Calculate the first cryptographic Hash of the request key;
When said write data are not present in writing position, first cryptographic Hash is recorded, and based on the request key to institute
State after write-in data are encrypted and store to said write position.
2. according to the method described in claim 1, it is characterised in that methods described also includes:
When said write position has said write data, first cryptographic Hash corresponding with said write data is judged
Whether two cryptographic Hash are identical;
If so, being stored after said write data are encrypted based on the request key to said write position.
3. a kind of method for writing data, it is characterised in that methods described includes:
Data write request is received, the data write request includes write-in data;
When said write data are not present in writing position, it is sky to record first cryptographic Hash, and said write data are deposited
Store up to said write position.
4. method according to claim 3, it is characterised in that methods described also includes:
When there are said write data in said write position, judge corresponding second cryptographic Hash of said write data whether be
It is empty;
If so, by said write data storage to said write position.
5. a kind of method for reading data, it is characterised in that methods described includes:
Data read request is received, the data read request includes reading information and request key;
Calculate the first cryptographic Hash of the request key;
Judge whether the second cryptographic Hash of first cryptographic Hash data to be read corresponding with the reading information is identical;
If so, being read out based on the request key to the data to be read.
6. a kind of method for reading data, it is characterised in that methods described includes:
Data read request is received, the data read request includes reading information;
Whether the second cryptographic Hash for judging reading information correspondence data to be read is empty;
If so, being read out to the data to be read.
7. a kind of data transfer apparatus, it is characterised in that described device includes:
Receiving module, for receiving data write request, the data write request includes write-in data and request key;
Computing module, the first cryptographic Hash for calculating the request key;
First writing module, for when said write data are not present in writing position, recording first cryptographic Hash, and be based on
The request key is stored to said write position after said write data are encrypted.
8. device according to claim 7, it is characterised in that described device also includes:
Second writing module, for when said write position has said write data, judging first cryptographic Hash and institute
Whether identical state corresponding second cryptographic Hash of write-in data;
If so, being stored after said write data are encrypted based on the request key to said write position.
9. a kind of data transfer apparatus, it is characterised in that described device includes:
Receiving module, for receiving data write request, the data write request includes write-in data;
First writing module, for when writing position be not present said write data when, record first cryptographic Hash for sky, and
By said write data storage to said write position.
10. device according to claim 9, it is characterised in that described device also includes:
Second writing module, for when said write position has said write data, judging that said write data are corresponding
Whether the second cryptographic Hash is empty;
If so, by said write data storage to said write position.
11. a kind of digital independent device, it is characterised in that described device includes:
Receiving module, for receiving data read request, the data read request includes reading information and request key;
Computing module, the first cryptographic Hash for calculating the request key;
Judge module, for judging that the second cryptographic Hash of first cryptographic Hash data to be read corresponding with the reading information is
It is no identical;
Read module, for if so, being read out based on the request key to the data to be read.
12. a kind of digital independent device, it is characterised in that described device includes:
Receiving module, for receiving data read request, the data read request includes reading information;
Judge module, for judging whether the second cryptographic Hash of reading information correspondence data to be read is empty;
Judge module, for if so, being read out to the data to be read.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710294483.4A CN107122139A (en) | 2017-04-28 | 2017-04-28 | Method for writing data and device, method for reading data and device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710294483.4A CN107122139A (en) | 2017-04-28 | 2017-04-28 | Method for writing data and device, method for reading data and device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107122139A true CN107122139A (en) | 2017-09-01 |
Family
ID=59725229
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710294483.4A Pending CN107122139A (en) | 2017-04-28 | 2017-04-28 | Method for writing data and device, method for reading data and device |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107122139A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110929303A (en) * | 2019-11-29 | 2020-03-27 | 江苏芯盛智能科技有限公司 | Data processing method, device and system and solid state disk |
| CN112685756A (en) * | 2020-12-30 | 2021-04-20 | 北京海泰方圆科技股份有限公司 | Data writing and reading method, device, medium and equipment |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1806410A (en) * | 2003-06-12 | 2006-07-19 | 松下电器产业株式会社 | Encryption communication system |
| CN102930224A (en) * | 2012-10-19 | 2013-02-13 | 华为技术有限公司 | Hard drive data write/read method and device |
| US20130185557A1 (en) * | 2012-01-13 | 2013-07-18 | Microsoft Corporation | Detection of Invalid Escrow Keys |
| CN103973810A (en) * | 2014-05-22 | 2014-08-06 | 华为技术有限公司 | Data processing method and device based on IP disk |
| CN105681032A (en) * | 2016-01-08 | 2016-06-15 | 腾讯科技(深圳)有限公司 | Key storage method and device as well as key management method and device |
| CN105825143A (en) * | 2016-03-07 | 2016-08-03 | 乐视移动智能信息技术(北京)有限公司 | Application program data writing and reading method and device |
| CN106126374A (en) * | 2016-06-22 | 2016-11-16 | 腾讯科技(深圳)有限公司 | Method for writing data, method for reading data and device |
| CN106506613A (en) * | 2016-10-31 | 2017-03-15 | 大唐高鸿信安(浙江)信息科技有限公司 | The data storage location encryption method of distributed key value storage systems |
-
2017
- 2017-04-28 CN CN201710294483.4A patent/CN107122139A/en active Pending
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1806410A (en) * | 2003-06-12 | 2006-07-19 | 松下电器产业株式会社 | Encryption communication system |
| US20130185557A1 (en) * | 2012-01-13 | 2013-07-18 | Microsoft Corporation | Detection of Invalid Escrow Keys |
| CN102930224A (en) * | 2012-10-19 | 2013-02-13 | 华为技术有限公司 | Hard drive data write/read method and device |
| CN103973810A (en) * | 2014-05-22 | 2014-08-06 | 华为技术有限公司 | Data processing method and device based on IP disk |
| CN105681032A (en) * | 2016-01-08 | 2016-06-15 | 腾讯科技(深圳)有限公司 | Key storage method and device as well as key management method and device |
| CN105825143A (en) * | 2016-03-07 | 2016-08-03 | 乐视移动智能信息技术(北京)有限公司 | Application program data writing and reading method and device |
| CN106126374A (en) * | 2016-06-22 | 2016-11-16 | 腾讯科技(深圳)有限公司 | Method for writing data, method for reading data and device |
| CN106506613A (en) * | 2016-10-31 | 2017-03-15 | 大唐高鸿信安(浙江)信息科技有限公司 | The data storage location encryption method of distributed key value storage systems |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110929303A (en) * | 2019-11-29 | 2020-03-27 | 江苏芯盛智能科技有限公司 | Data processing method, device and system and solid state disk |
| CN112685756A (en) * | 2020-12-30 | 2021-04-20 | 北京海泰方圆科技股份有限公司 | Data writing and reading method, device, medium and equipment |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN113535721B (en) | Data writing method and device | |
| CN104541271A (en) | Generating scenes and tours from spreadsheet data | |
| CN111339572A (en) | Method and system for verifying integrity of cloud data, terminal device and storage medium | |
| CN106572095B (en) | Account registration method, apparatus and system | |
| CN110162523A (en) | Date storage method, system, device and equipment | |
| CN104967593A (en) | Identity verification method, apparatus and system | |
| CN103870955B (en) | The processing method and processing device of data in webpage | |
| CN109889468A (en) | Transmission method, system, device, equipment and the storage medium of network data | |
| CN112751920B (en) | Block chain-based network interaction behavior evidence obtaining method and device and terminal | |
| CN107122139A (en) | Method for writing data and device, method for reading data and device | |
| CN103294407A (en) | Storage device and data read-write method | |
| US7409527B2 (en) | Bidirectional data storing method | |
| CN106535152A (en) | Terminal-based application data processing method, device and system | |
| CN107682526A (en) | A kind of application message methods of exhibiting and its equipment | |
| JP2009245079A (en) | Information terminal device and information processing method | |
| US8001114B2 (en) | Methods and apparatuses for dynamically searching for electronic mail messages | |
| US8478822B2 (en) | Device and method of sharing contents based on time synchronization | |
| CN106713041A (en) | Session log transmitting method and device | |
| CN106203107A (en) | Method and device for preventing system menu from being maliciously modified and electronic equipment | |
| CN107436918A (en) | Database implementation method, device and equipment | |
| CN110059081A (en) | Data output method, device and the computer equipment shown based on data | |
| CN108241583A (en) | Data processing method, application server and the computer readable storage medium that wages calculate | |
| US20110040778A1 (en) | Methods and apparatuses for dynamically displaying search suggestions | |
| CN115412726A (en) | Video authenticity detection method and device and storage medium | |
| EP3812999B1 (en) | Multiple blockchain network-based data reading method and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170901 |