CN115550006A - Cloud control platform self-adaptive security protection method based on cloud control platform trust authority confirmation - Google Patents

Cloud control platform self-adaptive security protection method based on cloud control platform trust authority confirmation Download PDF

Info

Publication number
CN115550006A
CN115550006A CN202211148724.1A CN202211148724A CN115550006A CN 115550006 A CN115550006 A CN 115550006A CN 202211148724 A CN202211148724 A CN 202211148724A CN 115550006 A CN115550006 A CN 115550006A
Authority
CN
China
Prior art keywords
data
control platform
key
cloud control
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211148724.1A
Other languages
Chinese (zh)
Other versions
CN115550006B (en
Inventor
张雷
俞文娟
公备
沈韬
沈国琛
宁正
张馨尹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tongji University
Original Assignee
Tongji University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tongji University filed Critical Tongji University
Priority to CN202211148724.1A priority Critical patent/CN115550006B/en
Publication of CN115550006A publication Critical patent/CN115550006A/en
Application granted granted Critical
Publication of CN115550006B publication Critical patent/CN115550006B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Abstract

The invention discloses a cloud control platform self-adaptive safety protection method based on trust authority of a cloud control platform, which comprises the following steps of: the method comprises the steps of carrying out double encryption on the to-be-trusted authority confirmation of the cloud control platform, adding an electronic key after the authority confirmation data, carrying out data coarse-grained encryption on the to-be-trusted authority confirmation of the cloud control platform, carrying out self-adaptive data transmission through the Internet, receiving the authority confirmation data, carrying out key decryption, coarse-grained decryption and dynamic decryption on the authority confirmation data, and verifying the integrity of the transmitted authority confirmation data according to the comparison result of the authority confirmation data and the hash value of the electronic key; according to the method, a double encryption algorithm is adopted to apply fine-grained weight determining factors to the to-be-trusted weight determining of the cloud control platform and generate the corresponding dynamic key, and meanwhile, a hash function is adopted to generate a data abstract to the to-be-trusted weight determining of the cloud control platform and add an electronic key, so that the access process of data is safer when the cloud control platform trusts the weight determining, and the weight determining data is prevented from being maliciously cracked and invaded in the access process.

Description

Cloud control platform self-adaptive security protection method based on cloud control platform trust authority confirmation
Technical Field
The invention relates to the technical field of network space security and data security protection, in particular to a cloud control platform self-adaptive security protection method based on cloud control platform trust authority.
Background
Data becomes national basic strategic resources, but a data property right system for standardizing the trading order of a data market is not established at present, the right of data is one of the core problems which need to be solved in the development of big data application and data industry, the right of property right of the data is determined in a legal form aiming at the data of different sources, the data integration is promoted, the data sharing and circulation are accelerated, the trading cost is reduced, and therefore huge data asset value and innovative application are activated, and the data industry is rapidly developed.
With the increasing penetration of networks into social life, people increasingly utilize the internet of things to exchange information and access data, and during the access process of the authorized data, self-adaptive data transmission needs to be encrypted to ensure the security of the authorized data, the data encryption is always an important part of confidential data, at present, a plurality of mature encryption modes exist, common encryption algorithms include a reversible encryption algorithm and an irreversible encryption algorithm, and the reversible encryption algorithm is divided into a symmetric encryption algorithm and an asymmetric encryption algorithm.
The traditional method for encrypting the self-adaptive data transmission is mostly single in means, generally, encryption is carried out only through encryption means, so that the data security is low, the confidentiality is low, and malicious cracking and interception are easy to happen in the transmission process, so that the transmission quality and the integrity of the data are affected badly.
Disclosure of Invention
Aiming at the problems, the invention aims to provide a cloud control platform self-adaptive security protection method and system based on the trust and the right of the cloud control platform, and solves the problems that the traditional method for encrypting the self-adaptive data transmission has single encryption means, low security and low confidentiality and is easy to be maliciously cracked and invaded in the access process.
In order to achieve the purpose of the invention, the invention is realized by the following technical scheme: the cloud control platform self-adaptive security protection method based on the trust authority determination of the cloud control platform comprises the following steps of:
the method comprises the following steps: firstly, a cloud control platform to-be-trusted authority confirmation source and a data access terminal generate a public key and a private key, the cloud control platform to-be-trusted authority confirmation source firstly encrypts the cloud control platform to-be-trusted authority confirmation by using a double encryption algorithm and sends the encrypted double key serving as a dynamic key to the data access terminal, then a hash function is used for generating a data digest for the cloud control platform to-be-trusted authority confirmation, then the private key is used for encrypting the data digest and forming an electronic key of the cloud control platform to-be-trusted authority confirmation source, and then the electronic key is attached to the cloud control platform to-be-trusted authority confirmation and forms one of the components of the cloud control platform to-be-trusted authority confirmation;
step two: after the electronic key is added to the to-be-trusted authority confirmation of the cloud control platform, a symmetric key is selected by the to-be-trusted authority confirmation source of the cloud control platform to carry out data coarse-grained encryption on the to-be-trusted authority confirmation of the cloud control platform with the electronic key and is transmitted to the data access terminal through the internet, then the to-be-trusted authority confirmation source of the cloud control platform encrypts the symmetric key by using the public key and transmits an encrypted key ciphertext to the data access terminal through the internet;
step three: the data access terminal decrypts the key ciphertext by using the private key to obtain a symmetric key, then performs coarse-grained decryption on the right-confirming data ciphertext by using the symmetric key to obtain right-confirming data and an electronic key of the right-confirming data, and then dynamically decrypts the right-confirming data by using the dual keys;
step four: and the data access end decrypts the electronic key by using the public key provided by the to-be-trusted authority confirming source of the cloud control platform to obtain a hash value in the electronic key, recalculates the hash value of the obtained authority confirming data by using a hash function, compares the hash value of the authority confirming data with the hash value of the electronic key, and verifies the integrity of the authority confirming data according to a data comparison result.
The further improvement lies in that: in the first step, the specific steps of generating the public key and the private key are as follows: the method comprises the steps that a data access terminal sends an access request to a to-be-trusted authority confirming source of the cloud control platform through the Internet, the to-be-trusted authority confirming source of the cloud control platform generates a corresponding public key according to the access request and sends the public key to the data access terminal, and the data access terminal generates a private key according to the public key and sends the generated private key to the to-be-trusted authority confirming source of the cloud control platform.
The further improvement lies in that: in the first step, the specific steps of encrypting the to-be-trusted authority confirmation of the cloud control platform are as follows: firstly, a DES encryption algorithm is adopted to encrypt the right-confirming data to be accessed for the first time and generate a corresponding first secret key, then an RSA encryption algorithm is adopted to encrypt the secret key generated by the DES encryption algorithm for the second time and generate a corresponding second secret key, and then the first secret key and the second secret key form a double secret key.
The further improvement lies in that: in the third step, after the coarse-grained decryption of the authorized data, the data access end firstly decrypts the secondary encryption of the RSA encryption algorithm by using the second key and then decrypts the primary encryption of the DES encryption algorithm to obtain the unencrypted authorized data.
The further improvement is that: in the third step, the data is cleared after the weight-determining data is dynamically decrypted, and the method specifically comprises the following steps: and data cleaning is carried out through data mining, mathematical statistics and predefined cleaning rules, and the original data are converted into clean data which accord with the data quality.
The further improvement is that: in the fourth step, if the comparison result between the hash value of the authorization data and the hash value of the electronic key shows that the two hash values are the same, the authorization data is complete and effective, that is, the dynamic encryption transmission of the authorization data is completed.
The further improvement lies in that: in the fourth step, if the comparison result between the hash value of the authorization data and the hash value of the electronic key shows different results, it indicates that the authorization data is damaged in the access process, and the transmitted authorization data is invalid.
The further improvement lies in that: in the fourth step, if the integrity of the obtained weight data is not qualified through verification, the first step is returned to continue to access the weight data.
The invention has the beneficial effects that: the method adopts a double encryption algorithm to apply fine-grained weight determining factors to the to-be-trusted authority of the cloud control platform and generate a corresponding dynamic key, and simultaneously adopts a hash function to generate a data abstract and attach an electronic key to the to-be-trusted authority of the cloud control platform, so that the access process of data is safer when the cloud control platform trusts the authority, the authority data is prevented from being maliciously invaded and damaged in the access process, the safety protection and quality robustness of the data in the access and controlled processes are ensured, and the access of the authority data is smoothly carried out.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic flow chart of a method according to a first embodiment of the present invention;
fig. 2 is a schematic flow chart of a method according to a second embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, the present embodiment provides a cloud control platform adaptive security protection method based on cloud control platform trust authority, including the following steps:
the method comprises the following steps: double encryption is carried out on the to-be-trusted authority confirmation of the cloud control platform, and an electronic key is added after the authority confirmation data
The method comprises the steps that firstly, a data access terminal sends an access request to a to-be-trusted authority confirming source of a cloud control platform through the Internet, then the to-be-trusted authority confirming source of the cloud control platform generates a corresponding public key according to the access request and sends the public key to the data access terminal, the data access terminal generates a private key according to the public key and sends the generated private key to the to-be-trusted authority confirming source of the cloud control platform, the to-be-trusted authority confirming source of the cloud control platform firstly encrypts authority confirming data to be accessed by adopting a DES encryption algorithm to generate a corresponding first secret key, secondly encrypts the secret key generated by a DES encryption algorithm to generate a corresponding second secret key by adopting an RSA encryption algorithm to generate a second secret key, then the first secret key and the second secret key form a double secret key which is used as a dynamic secret key to be sent to the data access terminal, then a hash function is used for generating a data digest for the to-be-trusted authority confirming of the cloud control platform, then the private key is used for encrypting the data digest and forming an electronic secret key of the to-be-trusted authority confirming source of the cloud control platform, and then one of the to-be-trusted authority confirming source of the cloud control platform is formed into a component of the to-be-trusted authority confirming source of the to be-trusted authority confirming source of the cloud control platform;
step two: data coarse-grained encryption is carried out on the to-be-trusted authority of the cloud control platform and adaptive data transmission is carried out through the Internet
After the electronic key is added to the to-be-trusted authority confirmation of the cloud control platform, a symmetric key is selected by the to-be-trusted authority confirmation source of the cloud control platform to carry out data coarse-grained encryption on the to-be-trusted authority confirmation of the cloud control platform with the electronic key and is transmitted to the data access terminal through the internet, then the to-be-trusted authority confirmation source of the cloud control platform encrypts the symmetric key by using the public key and transmits an encrypted key ciphertext to the data access terminal through the internet;
step three: receiving the authorized data and performing key decryption, coarse-grained decryption and dynamic decryption on the authorized data
And after the coarse-grained decryption of the right-confirming data, the data access end firstly decrypts the secondary encryption of the RSA encryption algorithm by using a second key and then decrypts the primary encryption of the DES encryption algorithm to obtain the right-confirming data without encryption, namely the dynamic encryption transmission based on the trust and the right-confirming of the cloud control platform is completed.
Example two
Referring to fig. 2, the embodiment provides a cloud control platform adaptive security protection method based on the trust authority of a cloud control platform, and the method includes the following steps:
the method comprises the following steps: double encryption is carried out on the to-be-trusted authority confirmation of the cloud control platform, and an electronic key is added after the authority confirmation data
The method comprises the steps that firstly, a data access terminal sends an access request to a to-be-trusted authority confirming source of a cloud control platform through the Internet, then the to-be-trusted authority confirming source of the cloud control platform generates a corresponding public key according to the access request and sends the public key to the data access terminal, the data access terminal generates a private key according to the public key and sends the generated private key to the to-be-trusted authority confirming source of the cloud control platform, the to-be-trusted authority confirming source of the cloud control platform firstly encrypts authority confirming data to be accessed by adopting a DES encryption algorithm to generate a corresponding first secret key, secondly encrypts the secret key generated by a DES encryption algorithm to generate a corresponding second secret key by adopting an RSA encryption algorithm to generate a second secret key, then the first secret key and the second secret key form a double secret key which is used as a dynamic secret key to be sent to the data access terminal, then a hash function is used for generating a data digest for the to-be-trusted authority confirming of the cloud control platform, then the private key is used for encrypting the data digest and forming an electronic secret key of the to-be-trusted authority confirming source of the cloud control platform, and then one of the to-be-trusted authority confirming source of the cloud control platform is formed into a component of the to-be-trusted authority confirming source of the to be-trusted authority confirming source of the cloud control platform;
step two: data coarse-grained encryption is carried out on the to-be-trusted authority of the cloud control platform and adaptive data transmission is carried out through the Internet
After the electronic key is added to the to-be-trusted authority confirmation of the cloud control platform, a symmetric key is selected by the to-be-trusted authority confirmation source of the cloud control platform to carry out data coarse-grained encryption on the to-be-trusted authority confirmation of the cloud control platform with the electronic key and is transmitted to the data access terminal through the internet, then the to-be-trusted authority confirmation source of the cloud control platform encrypts the symmetric key by using the public key and transmits an encrypted key ciphertext to the data access terminal through the internet;
step three: receiving the authorized data and performing key decryption, coarse-grained decryption and dynamic decryption on the authorized data
The data access end decrypts the key ciphertext by using a private key to obtain a symmetric key, then performs coarse-grained decryption on the authentication data ciphertext by using the symmetric key to obtain authentication data and an electronic key of the authentication data, decrypts the secondary encryption of the RSA encryption algorithm by using the second key after the coarse-grained decryption of the authentication data, decrypts the primary encryption of the DES encryption algorithm to obtain unencrypted authentication data, and performs data cleaning after dynamically decrypting the authentication data, and the method specifically comprises the following steps: data cleaning is carried out through data mining, mathematical statistics and predefined cleaning rules, and original data are converted into clean data which accord with data quality;
step four: verifying the integrity of the transmitted entitlement data based on a hash value comparison of the entitlement data and the electronic key
The data access end decrypts the electronic key by using a public key provided by a to-be-trusted authority confirming source of the cloud control platform to obtain a hash value in the electronic key, recalculates the hash value of the obtained authority confirming data by using a hash function, then compares the hash value of the authority confirming data with the hash value of the electronic key, if the comparison result of the hash value of the authority confirming data and the hash value of the electronic key shows that the authority confirming data is complete and valid, namely the dynamic encryption transmission of the authority confirming data is completed, if the comparison result of the hash value of the authority confirming data and the hash value of the electronic key shows that the authority confirming data is different, the authority confirming data is damaged in the access process, the transmitted authority confirming data is invalid, so that the integrity of the authority confirming data is verified, and if the integrity of the authority confirming data obtained by verification is unqualified, the data access is returned to the first step to continue to access the authority confirming data.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.

Claims (8)

1. The cloud control platform self-adaptive security protection method based on the cloud control platform trust authority determination is characterized by comprising the following steps of:
the method comprises the following steps: the method comprises the steps that a cloud control platform to-be-trusted authority confirming source and a data access terminal generate a public key and a private key, the cloud control platform to-be-trusted authority confirming source encrypts a cloud control platform to-be-trusted authority confirming through a double encryption algorithm and sends an encrypted double key serving as a dynamic key to the data access terminal, a data digest is generated on the cloud control platform to-be-trusted authority confirming through a hash function, then the data digest is encrypted through the private key to form an electronic key of the cloud control platform to-be-trusted authority confirming source, and then the electronic key is attached to the cloud control platform to-be-trusted authority confirming to form one of components of the cloud control platform to-be-trusted authority confirming;
step two: after the electronic key is added to the to-be-trusted authority confirmation of the cloud control platform, a symmetric key is selected by the to-be-trusted authority confirmation source of the cloud control platform to carry out data coarse-grained encryption on the to-be-trusted authority confirmation of the cloud control platform with the electronic key and is transmitted to the data access terminal through the internet, then the to-be-trusted authority confirmation source of the cloud control platform encrypts the symmetric key by using the public key and transmits an encrypted key ciphertext to the data access terminal through the internet;
step three: the data access terminal decrypts the key ciphertext by using the private key to obtain a symmetric key, then performs coarse-grained decryption on the right-confirming data ciphertext by using the symmetric key to obtain right-confirming data and an electronic key of the right-confirming data, and then dynamically decrypts the right-confirming data by using the dual keys;
step four: and the data access end decrypts the electronic key by using the public key provided by the to-be-trusted authority confirming source of the cloud control platform to obtain a hash value in the electronic key, recalculates the hash value of the obtained authority confirming data by using a hash function, compares the hash value of the authority confirming data with the hash value of the electronic key, and verifies the integrity of the authority confirming data according to a data comparison result.
2. The cloud-controlled platform adaptive security protection method based on the cloud-controlled platform trust authority according to claim 1, characterized in that: in the first step, the specific steps of generating the public key and the private key are as follows: the method comprises the steps that firstly, a data access terminal sends an access request to a to-be-trusted authority confirmation source of the cloud control platform through the internet, then the to-be-trusted authority confirmation source of the cloud control platform generates a corresponding public key according to the access request and sends the public key to the data access terminal, and the data access terminal generates a private key according to the public key and sends the generated private key to the to-be-trusted authority confirmation source of the cloud control platform.
3. The cloud-controlled platform adaptive security protection method based on the cloud-controlled platform trust authority according to claim 1, characterized in that: in the first step, the specific steps of encrypting the to-be-trusted authority confirmation of the cloud control platform are as follows: firstly, a DES encryption algorithm is adopted to encrypt the right-confirming data to be accessed for the first time and generate a corresponding first secret key, then an RSA encryption algorithm is adopted to encrypt the secret key generated by the DES encryption algorithm for the second time and generate a corresponding second secret key, and then the first secret key and the second secret key form a double secret key.
4. The cloud-controlled platform adaptive security protection method based on the cloud-controlled platform trust authority according to claim 1, characterized in that: in the third step, after the coarse-grained decryption of the authorized data, the data access end firstly decrypts the secondary encryption of the RSA encryption algorithm by using the second key and then decrypts the primary encryption of the DES encryption algorithm to obtain the unencrypted authorized data.
5. The cloud-controlled platform adaptive security protection method based on the cloud-controlled platform trust authority according to claim 1, characterized in that: in the third step, the data is cleared after the weight-determining data is dynamically decrypted, and the method specifically comprises the following steps: and data cleaning is carried out through data mining, mathematical statistics and predefined cleaning rules, and the original data are converted into clean data which accord with the data quality.
6. The cloud-controlled platform adaptive security protection method based on the cloud-controlled platform trust authority according to claim 1, characterized in that: in the fourth step, if the comparison result between the hash value of the weight-confirming data and the hash value of the electronic key shows that the hash values are the same, the weight-confirming data is complete and effective, and the dynamic encryption transmission of the weight-confirming data is completed.
7. The cloud-controlled platform adaptive security protection method based on the cloud-controlled platform trust authority according to claim 1, characterized in that: in the fourth step, if the comparison result between the hash value of the authorization data and the hash value of the electronic key shows different results, it indicates that the authorization data is damaged in the access process, and the transmitted authorization data is invalid.
8. The cloud-controlled platform adaptive security protection method based on the cloud-controlled platform trust authority according to claim 1, characterized in that: in the fourth step, if the integrity of the obtained weight data is not qualified through verification, the first step is returned to continue to access the weight data.
CN202211148724.1A 2022-09-20 2022-09-20 Cloud control platform self-adaptive safety protection method based on trust confirmation of cloud control platform Active CN115550006B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211148724.1A CN115550006B (en) 2022-09-20 2022-09-20 Cloud control platform self-adaptive safety protection method based on trust confirmation of cloud control platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211148724.1A CN115550006B (en) 2022-09-20 2022-09-20 Cloud control platform self-adaptive safety protection method based on trust confirmation of cloud control platform

Publications (2)

Publication Number Publication Date
CN115550006A true CN115550006A (en) 2022-12-30
CN115550006B CN115550006B (en) 2024-02-09

Family

ID=84727373

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211148724.1A Active CN115550006B (en) 2022-09-20 2022-09-20 Cloud control platform self-adaptive safety protection method based on trust confirmation of cloud control platform

Country Status (1)

Country Link
CN (1) CN115550006B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624522A (en) * 2012-03-30 2012-08-01 华中科技大学 Key encryption method based on file attribution
CN109800588A (en) * 2019-01-24 2019-05-24 工业和信息化部装备工业发展中心 Bar code dynamic encrypting method and device, bar code dynamic decryption method and device
CN110176986A (en) * 2019-05-30 2019-08-27 杭州奇治信息技术股份有限公司 A kind of data ciphering method of multi-enciphering, device and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624522A (en) * 2012-03-30 2012-08-01 华中科技大学 Key encryption method based on file attribution
CN109800588A (en) * 2019-01-24 2019-05-24 工业和信息化部装备工业发展中心 Bar code dynamic encrypting method and device, bar code dynamic decryption method and device
CN110176986A (en) * 2019-05-30 2019-08-27 杭州奇治信息技术股份有限公司 A kind of data ciphering method of multi-enciphering, device and mobile terminal

Also Published As

Publication number Publication date
CN115550006B (en) 2024-02-09

Similar Documents

Publication Publication Date Title
CN110855671B (en) Trusted computing method and system
CN107959567B (en) Data storage method, data acquisition method, device and system
US7231526B2 (en) System and method for validating a network session
CA2423636C (en) Methods for authenticating potential members invited to join a group
US7688975B2 (en) Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
WO2020119258A1 (en) Data processing method and device
KR100979576B1 (en) Methods for remotely changing a communications password
US20170244687A1 (en) Techniques for confidential delivery of random data over a network
US20080301436A1 (en) Method and apparatus for performing authentication between clients using session key shared with server
WO2021120615A1 (en) Encryption apparatus, encryption system and data encryption method
JPH1041932A (en) Ciphering key recovery method and equipment
JP2023500570A (en) Digital signature generation using cold wallet
CN112383391B (en) Data security protection method based on data attribute authorization, storage medium and terminal
CN111859446A (en) Agricultural product traceability information sharing-privacy protection method and system
CN102999710A (en) Method, equipment and system for safely sharing digital content
CN114553557B (en) Key calling method, device, computer equipment and storage medium
WO2022135383A1 (en) Identity authentication method and apparatus
CN111541652B (en) System for improving security of secret information keeping and transmission
KR102539418B1 (en) Apparatus and method for mutual authentication based on physical unclonable function
CN115550006B (en) Cloud control platform self-adaptive safety protection method based on trust confirmation of cloud control platform
CN114244501A (en) Power data privacy protection system and implementation method thereof, and encryption attribute revocation method
KR20170111809A (en) Bidirectional authentication method using security token based on symmetric key
CN113556365B (en) Authentication result data transmission system, method and device
CN113556236B (en) Energy data middlebox sensitive content entrusting and authorizing method based on proxy signature
CN113037686B (en) Multi-database secure communication method and system, computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant