CN107257349A - Cipher encrypting method and system based on unidirectional and public key encryption algorithm - Google Patents
Cipher encrypting method and system based on unidirectional and public key encryption algorithm Download PDFInfo
- Publication number
- CN107257349A CN107257349A CN201710625981.2A CN201710625981A CN107257349A CN 107257349 A CN107257349 A CN 107257349A CN 201710625981 A CN201710625981 A CN 201710625981A CN 107257349 A CN107257349 A CN 107257349A
- Authority
- CN
- China
- Prior art keywords
- unidirectional
- public key
- ciphertext
- encryption algorithm
- key encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of cipher encrypting method and system based on unidirectional and public key encryption algorithm, including:The login password of user is obtained, calls hash algorithm to be encrypted first, new character string is exported;Secondly, call public key encryption algorithm that new character string is encrypted using public key, the ciphertext of output password sends backstage to, when backstage receives the ciphertext, calls identical public key encryption algorithm that ciphertext is decrypted using private key first, export a character string;Finally, hash algorithm generates a random salt figure, and is combined with the character string of output, calls Hash AES to carry out Hash, exports new ciphertext, by ciphertext storage into database.The present invention ensure that safety of the login password of user in transmission and storing process.
Description
Technical field
The present invention relates to computer software field of information security technology, belong to the safe design of cloud security Hole Detection platform
One of, and in particular to a kind of cipher encrypting method and system based on unidirectional and public key encryption algorithm.
Background technology
With the fast development of network technology, information security events occur again and again, and enterprise and user are all caused or many
Or few loss.Information assets already turns into one of generally acknowledged assets of most worthy, so the information protection of enterprise or user
As important a research topic and technological means.The user name of various servers in the moving machine room of such as enterprises
Login password, the login password of system database, the mailbox password of high-level leader, the login password of private account of user etc.
Enterprise and the information of user Deng direct correlation.Therefore, some WEB websites or the login of system for description like above are close
The safe transmission of code and the research of storage turn into the important ring in system safe design.
The significant data or sensitive information of enterprise or user are general all involved in personal account, in order to protect these
Sensitive data, the login password that premise seeks to protect user is not broken in transmitting procedure and storing process.
The content of the invention
Instant invention overcomes the deficiencies in the prior art, there is provided a kind of password encryption side based on unidirectional and public key encryption algorithm
Method and system, the safety problem for solving user login code encrypted transmission and storage.
In view of the above mentioned problem of prior art, according to one side disclosed by the invention, the present invention uses following technology
Scheme:
A kind of cipher encrypting method based on unidirectional and public key encryption algorithm, including:
The login password of user is obtained in front end;And
Call unidirectional AES to carry out One-Way Encryption to the login password got, export ciphertext;
Public key encryption algorithm is called for the ciphertext and the public key stored, one section of new ciphertext is exported, and will be described new
Ciphertext is transmitted to rear end;
Rear end receives the new password;And
Public key encryption algorithm is called to be decrypted the new password and the private key stored, output string;
Then call unidirectional AES to carry out One-Way Encryption to the character string, export corresponding ciphertext storage and arrive data
In storehouse.
In order to which the present invention is better achieved, further technical scheme is:
According to one embodiment of the invention, the unidirectional AES is MD5.
According to another embodiment of the invention, the public key encryption algorithm is RSA.
It is described to call unidirectional AES to enter the login password got according to another embodiment of the invention
The step of row One-Way Encryption, output ciphertext, includes:
First, call unidirectional AES to carry out One-Way Encryption, export a character string;
Then, call One-way encryption algorithm that character string is encrypted, export corresponding ciphertext.
According to another embodiment of the invention, the character string of rear end calls unidirectional AES to carry out unidirectionally
In encrypting step, the unidirectional AES is using the AES for unidirectionally adding salt.
The present invention can also be:
A kind of password encryption system based on unidirectional and public key encryption algorithm, including:
Front end password acquisition module, the login password for obtaining user in front end;
The unidirectional enciphering algorithm module in front end, for carrying out One-Way Encryption to the login password got, exports ciphertext;
Front end public key encryption algorithm module, for calling the public key encryption algorithm to the ciphertext and the public key stored
Module, exports one section of new ciphertext, and the new ciphertext is passed again to rear end;
Rear end password acceptance module, the new password transmitted for receiving front-end;
Rear end public key encryption algorithm module, for calling the rear end public key encryption to new password and the private key stored
Algoritic module is decrypted, output string;
The unidirectional enciphering algorithm module in rear end, the enciphering algorithm module unidirectional for being called to the character string carries out unidirectional
Encryption, exports corresponding ciphertext and stores into database.
According to another embodiment of the invention, the unidirectional enciphering algorithm module in the rear end is added using unidirectional plus salt
Close algorithm.
Compared with prior art, one of beneficial effects of the present invention are:
A kind of cipher encrypting method and system based on unidirectional and public key encryption algorithm of the present invention, by the present invention, makes
Transmission is encrypted to the login password of user and stores for cloud platform, ensure that the transmission safety of the password of user under the platform
With storage safety, certain attack is resisted.
Brief description of the drawings
, below will be to embodiment for clearer explanation present specification embodiment or technical scheme of the prior art
Or the accompanying drawing used required in the description of prior art is briefly described, it should be apparent that, drawings in the following description are only
It is the reference to the embodiment of some in present specification, for those skilled in the art, is not paying creative work
In the case of, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the transmission encryption flow schematic diagram according to one embodiment of the invention.
Fig. 2 is the storage encryption flow schematic diagram according to one embodiment of the invention.
Embodiment
The present invention is described in further detail with reference to embodiment, but the implementation of the present invention is not limited to this.
A kind of cipher encrypting method based on unidirectional and public key encryption algorithm, including password transmitting procedure and password storage mistake
Journey, for password transmitting procedure as shown in figure 1, Fig. 1 shows transmission encryption flow frame according to an embodiment of the invention, tool
Body:
When User logs in website or other systems, input after oneself correct login password, front end receiver to password, first
Call unidirectional AES to carry out One-Way Encryption, export a new character string, then call One-way encryption algorithm to be added
It is close, export corresponding ciphertext;Secondly, public key encryption algorithm is being called for the ciphertext and the public key stored, is exporting one section
New ciphertext, is transmitted to rear end.
The login password for remembering user is character string m;One-way encryption algorithm is Hash ();C is the result after hash algorithm;
Random salt figure is salt;Public key encryption algorithm is E ();Public key is p, and private key is q;C is close after public key encryption algorithm is encrypted
Text;M is the new character strings that c and salt salt figures are constituted;Character string passwords of the s for storage into data.Calculating process is as follows:
1.Hash (m)=c;
2.E (c, p)=C.
For password storage process as shown in Fig. 2 Fig. 2 shows storage encryption flow according to an embodiment of the invention
Frame, specifically:
When rear end receives ciphertext, public key encryption algorithm is called to the ciphertext and the private key stored, one section of word is exported
Symbol string;Then call the AES of unidirectional plus salt to carry out One-Way Encryption to the character string, that is to say, that firstly generate one with
The salt figure of machine, the character string for being transmitted through is combined with the salt figure, as a new character string, One-way encryption algorithm is called
It is encrypted, exports corresponding ciphertext, stores into database.
The login password for remembering user is character string m;One-way encryption algorithm is Hash ();C is the result after hash algorithm;
Random salt figure is salt;Public key encryption algorithm is E ();Public key is p, and private key is q;C is close after public key encryption algorithm is encrypted
Text;M is the new character strings that c and salt salt figures are constituted;Character string passwords of the s for storage into data.Calculating process is as follows:
1.E (C, q)=c;
2.c+salt=M;
3.Hash (M)=s.
Unidirectional AES for more than can be MD5, and public key encryption algorithm can be RSA.But One-Way Encryption is calculated
Method and public key encryption algorithm can select suitable AES according to project demands, be not limited to cited by the present embodiment.
Unidirectional AES is hash algorithm, without key, and can only be encrypted, it is impossible to decrypted;Public key encryption algorithm is asymmetric
AES, with two different keys of public key and private key.
A kind of corresponding password encryption system based on unidirectional and public key encryption algorithm, including:
Front end password acquisition module, the login password for obtaining user in front end;
The unidirectional enciphering algorithm module in front end, for carrying out One-Way Encryption to the login password got, exports ciphertext;
Front end public key encryption algorithm module, for calling the public key encryption algorithm to the ciphertext and the public key stored
Module, exports one section of new ciphertext, and the new ciphertext is passed again to rear end;
Rear end password acceptance module, the new password transmitted for receiving front-end;
Rear end public key encryption algorithm module, for calling the rear end public key encryption to new password and the private key stored
Algoritic module is decrypted, output string;
The unidirectional enciphering algorithm module in rear end, the enciphering algorithm module unidirectional for being called to the character string carries out unidirectional
Encryption, exports corresponding ciphertext and stores into database.
It is that one kind is directed to WEB websites the invention belongs to one of safe design of cloud security Hole Detection platform for sum up
Or the method that transmission and safety storage is encrypted in the login password of the user of other systems, it ensure that the login password of user
It is transmitted and stores on network in the form of ciphertext.Can solve WEB websites or system application in cryptosecurity transmission and
The problem of storage, and the safe and efficient principle of moment holding in the design of algorithm, one will not be produced to Hole Detection platform
Fixed performance impact.This method includes:The login password of user is obtained, calls hash algorithm to be encrypted first, is exported newly
Character string;Secondly, call public key encryption algorithm that new character string is encrypted using public key, the ciphertext of output password, transmission
To backstage, when backstage receives the ciphertext, call identical public key encryption algorithm that ciphertext is decrypted using private key first, it is defeated
Go out a character string;Finally, hash algorithm generates a random salt figure, and is combined with the character string of output, calls Hash
AES carries out Hash, exports new ciphertext, by ciphertext storage into database.This method ensure that the login of user
Safety of the password in transmission and storing process.
The embodiment of each in this specification is described by the way of progressive, what each embodiment was stressed be with it is other
Identical similar portion cross-reference between the difference of embodiment, each embodiment.
" one embodiment ", " another embodiment ", " embodiment " for being spoken of in this manual, etc., refer to knot
Specific features, structure or the feature for closing embodiment description are included at least one embodiment of the application generality description
In.It is not necessarily to refer to same embodiment that statement of the same race, which occur, in multiple places in the description.Appoint furthermore, it is understood that combining
When one embodiment describes a specific features, structure or feature, what is advocated is this to realize with reference to other embodiment
Feature, structure or feature are also fallen within the scope of the present invention.
Although reference be made herein to invention has been described for multiple explanatory embodiments of the invention, however, it is to be understood that
Those skilled in the art can be designed that a lot of other modification and embodiment, and these modifications and embodiment will fall in this Shen
Please be within disclosed spirit and spirit.More specifically, can be to master in the range of disclosure and claim
The building block and/or layout for inscribing composite configuration carry out a variety of variations and modifications.Except what is carried out to building block and/or layout
Outside variations and modifications, to those skilled in the art, other purposes also will be apparent.
Claims (7)
1. a kind of cipher encrypting method based on unidirectional and public key encryption algorithm, it is characterised in that including:
The login password of user is obtained in front end;And
Call unidirectional AES to carry out One-Way Encryption to the login password got, export ciphertext;
Public key encryption algorithm is called for the ciphertext and the public key stored, exports one section of new ciphertext, and by the new ciphertext
It is transmitted to rear end;
Rear end receives the new password;And
Public key encryption algorithm is called to be decrypted the new password and the private key stored, output string;
Then call unidirectional AES to carry out One-Way Encryption to the character string, export corresponding ciphertext storage and arrive database
In.
2. the cipher encrypting method according to claim 1 based on unidirectional and public key encryption algorithm, it is characterised in that described
Unidirectional AES is MD5.
3. the cipher encrypting method according to claim 1 based on unidirectional and public key encryption algorithm, it is characterised in that described
Public key encryption algorithm is RSA.
4. the cipher encrypting method according to claim 1 based on unidirectional and public key encryption algorithm, it is characterised in that described
The step of calling unidirectional AES to carry out One-Way Encryption, output ciphertext to the login password got includes:
First, call unidirectional AES to carry out One-Way Encryption, export a character string;
Then, call One-way encryption algorithm that character string is encrypted, export corresponding ciphertext.
5. the cipher encrypting method according to claim 1 based on unidirectional and public key encryption algorithm, it is characterised in that rear end
The character string call unidirectional AES to carry out in One-Way Encryption step, the unidirectional AES using unidirectional plus
The AES of salt.
6. a kind of password encryption system based on unidirectional and public key encryption algorithm, it is characterised in that including:
Front end password acquisition module, the login password for obtaining user in front end;
The unidirectional enciphering algorithm module in front end, for carrying out One-Way Encryption to the login password got, exports ciphertext;
Front end public key encryption algorithm module, for calling the public key encryption algorithm mould to the ciphertext and the public key stored
Block, exports one section of new ciphertext, and the new ciphertext is passed again to rear end;
Rear end password acceptance module, the new password transmitted for receiving front-end;
Rear end public key encryption algorithm module, for calling the rear end public key encryption algorithm to new password and the private key stored
Module is decrypted, output string;
The unidirectional enciphering algorithm module in rear end, the enciphering algorithm module unidirectional for being called to the character string unidirectionally add
It is close, export corresponding ciphertext and store into database.
7. the cipher encrypting method according to claim 1 based on unidirectional and public key encryption algorithm, it is characterised in that described
The unidirectional enciphering algorithm module in rear end is using the AES for unidirectionally adding salt.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710625981.2A CN107257349A (en) | 2017-07-27 | 2017-07-27 | Cipher encrypting method and system based on unidirectional and public key encryption algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710625981.2A CN107257349A (en) | 2017-07-27 | 2017-07-27 | Cipher encrypting method and system based on unidirectional and public key encryption algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107257349A true CN107257349A (en) | 2017-10-17 |
Family
ID=60025255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710625981.2A Pending CN107257349A (en) | 2017-07-27 | 2017-07-27 | Cipher encrypting method and system based on unidirectional and public key encryption algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107257349A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108734024A (en) * | 2018-05-11 | 2018-11-02 | 四川长虹电器股份有限公司 | A kind of efficient database encryption method based on dictionary mapping |
CN108833449A (en) * | 2018-08-22 | 2018-11-16 | 海南新软软件有限公司 | Web communication encrypted transmission method, apparatus and system based on RAS algorithm |
CN109687966A (en) * | 2017-10-18 | 2019-04-26 | 北京明特量化信息技术有限公司 | Encryption method and its system |
CN112019535A (en) * | 2020-08-26 | 2020-12-01 | 北京信安世纪科技股份有限公司 | Password authentication method |
CN112488685A (en) * | 2020-12-23 | 2021-03-12 | 杨宁波 | User private key protection method for block chain |
CN112671841A (en) * | 2020-12-10 | 2021-04-16 | 清研灵智信息咨询(北京)有限公司 | Data security management method and system based on micro-service technology architecture |
CN114615054A (en) * | 2022-03-09 | 2022-06-10 | 四川中电启明星信息技术有限公司 | Dynamic encryption transmission method based on code table |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140032922A1 (en) * | 2012-07-18 | 2014-01-30 | TapLink, Inc. | Blind hashing |
CN104348609A (en) * | 2014-09-18 | 2015-02-11 | 成都西山居互动娱乐科技有限公司 | Non-stored password management algorithm |
CN106204038A (en) * | 2016-06-24 | 2016-12-07 | 广州正峰电子科技有限公司 | The method and device that a kind of password string generates |
CN106355106A (en) * | 2016-08-30 | 2017-01-25 | 深圳市引导美电子商务有限公司 | Account information storing method and system |
CN106656476A (en) * | 2017-01-18 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Password protecting method and device |
-
2017
- 2017-07-27 CN CN201710625981.2A patent/CN107257349A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140032922A1 (en) * | 2012-07-18 | 2014-01-30 | TapLink, Inc. | Blind hashing |
CN104348609A (en) * | 2014-09-18 | 2015-02-11 | 成都西山居互动娱乐科技有限公司 | Non-stored password management algorithm |
CN106204038A (en) * | 2016-06-24 | 2016-12-07 | 广州正峰电子科技有限公司 | The method and device that a kind of password string generates |
CN106355106A (en) * | 2016-08-30 | 2017-01-25 | 深圳市引导美电子商务有限公司 | Account information storing method and system |
CN106656476A (en) * | 2017-01-18 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Password protecting method and device |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109687966A (en) * | 2017-10-18 | 2019-04-26 | 北京明特量化信息技术有限公司 | Encryption method and its system |
CN108734024A (en) * | 2018-05-11 | 2018-11-02 | 四川长虹电器股份有限公司 | A kind of efficient database encryption method based on dictionary mapping |
CN108734024B (en) * | 2018-05-11 | 2021-08-06 | 四川长虹电器股份有限公司 | Dictionary mapping-based efficient database encryption method |
CN108833449A (en) * | 2018-08-22 | 2018-11-16 | 海南新软软件有限公司 | Web communication encrypted transmission method, apparatus and system based on RAS algorithm |
CN108833449B (en) * | 2018-08-22 | 2021-05-28 | 海南火链科技有限公司 | Web communication encryption transmission method, device and system based on RAS algorithm |
CN112019535A (en) * | 2020-08-26 | 2020-12-01 | 北京信安世纪科技股份有限公司 | Password authentication method |
CN112019535B (en) * | 2020-08-26 | 2023-03-07 | 北京信安世纪科技股份有限公司 | Password authentication method |
CN112671841A (en) * | 2020-12-10 | 2021-04-16 | 清研灵智信息咨询(北京)有限公司 | Data security management method and system based on micro-service technology architecture |
CN112488685A (en) * | 2020-12-23 | 2021-03-12 | 杨宁波 | User private key protection method for block chain |
CN112488685B (en) * | 2020-12-23 | 2023-12-12 | 杨宁波 | User private key protection method for blockchain |
CN114615054A (en) * | 2022-03-09 | 2022-06-10 | 四川中电启明星信息技术有限公司 | Dynamic encryption transmission method based on code table |
CN114615054B (en) * | 2022-03-09 | 2023-12-15 | 四川中电启明星信息技术有限公司 | Dynamic encryption transmission method based on code table |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107257349A (en) | Cipher encrypting method and system based on unidirectional and public key encryption algorithm | |
CN106529327B9 (en) | Data access system and method for encrypted database in hybrid cloud environment | |
CN104333580B (en) | A kind of account management system and its method based on cloud service | |
CN110324143A (en) | Data transmission method, electronic equipment and storage medium | |
CN108154038B (en) | Data processing method and device | |
CN108737374A (en) | The method for secret protection that data store in a kind of block chain | |
CN105100115A (en) | Data storage method for privacy protection based on encryption password and data fractionation | |
CN104992119B (en) | A kind of safe transmission method and system of sensitive information Anti-theft | |
CN103378971B (en) | A kind of data encryption system and method | |
CN110413652B (en) | Big data privacy retrieval method based on edge calculation | |
CN105827582B (en) | A kind of communication encrypting method, device and system | |
CN103236930A (en) | Data encryption method and system | |
CN205901794U (en) | System for it encrypts to carry out selectivity to big data content | |
CN109815051A (en) | The data processing method and system of block chain | |
CN106572076A (en) | Web service access method, client side and server side | |
CN106161710B (en) | A kind of user account safety management system based on smart phone | |
CN104967693A (en) | Document similarity calculation method facing cloud storage based on fully homomorphic password technology | |
CN106610995A (en) | Ciphertext index creating method, device and system | |
Suganya et al. | Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment | |
CN114710274A (en) | Data calling method and device, electronic equipment and storage medium | |
CN112398861B (en) | Encryption system and method for sensitive data in web configuration system | |
CN104252604B (en) | Database based building block system type dynamic encryption method | |
CN102821110A (en) | Password finding method used for audio/video storage device | |
Suthar et al. | EncryScation: A novel framework for cloud iaas, daas security using encryption and obfuscation techniques | |
US11133926B2 (en) | Attribute-based key management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171017 |