CN102821098A - System and method for self-dissolving instant messaging under cloud environment - Google Patents
System and method for self-dissolving instant messaging under cloud environment Download PDFInfo
- Publication number
- CN102821098A CN102821098A CN2012102483233A CN201210248323A CN102821098A CN 102821098 A CN102821098 A CN 102821098A CN 2012102483233 A CN2012102483233 A CN 2012102483233A CN 201210248323 A CN201210248323 A CN 201210248323A CN 102821098 A CN102821098 A CN 102821098A
- Authority
- CN
- China
- Prior art keywords
- key
- dissolving
- communication information
- sub
- instant communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a system and a method for self-dissolving the instant messaging under cloud environment; the system comprises an encryption and decryption module, a secret sharing module and a key storage module, wherein the encryption and decryption module is used for encrypting the instant messaging which is needed to be self-dissolved, or decrypting the ciphertext in the self-dissolving message; the secret sharing module is used for resolving and recombining the encryption key with the secret sharing algorithm, wherein the secret sharing module resolves the encryption key K into n parts of sub key; and the key storage module is used for calling the DHT network sub module. After the life cycles of a greater number of sub keys reach a certain time, because of the dynamic characteristics of the motorbike Emul kad network, the sub keys are disappeared from the network, so that the encrypted instant messaging is not decrypted again, and the instant messaging is self-dissolved to be destroyed. The method does not need the user to carry out any specific operation, so even the attacker obtains the copy of the self-dissolving data before finishing the life cycle, the data are also dissolved after the finishing of the life cycle.
Description
Technical field
The present invention relates to the technical field of communication under the cloud environment, particularly a kind of system and method for destroying from dissolving in order to the data of protection user data privacy.
Background technology
The huge advantage that cloud computing brought makes increasing internet, applications all be deployed in the cloud environment with the mode of cloud service.Typical cloud computing provider often provides general Network to use; Can visit through softwares such as browser or other Web services; And software and user data all are stored on the server, and this is uncontrollable for user's data, thereby have caused the privacy concerns of user data.Therefore, under cloud environment, how to guarantee that through efficient strategy the privacy of user data becomes very important.
At present existing many schemes are used to protect the privacy of user data, and these schemes can be divided into several types.One type of scheme the most plain is exactly that the requirement user manually deletes them voluntarily and is kept at the data on the server or uses timed task to be used for deleted data.Yet be not that all cloud services all can provide the function of data dump, even provide the removing function can not guarantee that data really thoroughly have been eliminated, because user data possibly exist many parts buffer memory or backup in server yet.One type of scheme then use public-key encrypt or or the symmetric cryptography system user data is encrypted, how effectively this type scheme has been transformed into the privacy of key with the privacy of user data, but storage and preserve the problem that key becomes maximum.Key too simply can stay potential safety hazard, and key too complex man's brain is difficult to memory again, must note with certain form, and therefore, the key of noting is also dangerous.Another kind of scheme requires the third-party institution of one or more trusted to be used for the necessary information that trustship is used for the calling party data, for example based on the solution of Ephemerizer system.This scheme.Thereby the third-party institution will delete the data of trustship and cause user data to visit again after the specific time limit.The greatest problem of this type scheme is the trust degree of these third-party institutions, even they are believable, the user also maybe not can trust them.For example, Facebook still follows the tracks of user's behavior after the user logs off, and Google collects and the analysis user data through way of paying, and Twitter sells user profile and microblogging content to data mining company.These cases have all caused the worry of user for the important privacy information of individual.
Therefore, in order to comprise the privacy concerns of user data under cloud environment, people are badly in need of a kind of safer, more effective scheme.This scheme should be enough simple, and the user need not carry out too many specific operation, can not introduce new safety problem yet, need not rely on third party's service of the extra deployment of any needs simultaneously.
Summary of the invention
The shortcoming that the objective of the invention is to overcome prior art provides a kind of communication message that satisfies protection user data privacy requirement under the cloud environment from the dissolving system with not enough.
Another object of the present invention is to, provide a kind of communication message that satisfies protection user data privacy requirement under the cloud environment from the dissolving method.
In order to reach above-mentioned first purpose, the present invention adopts following technical scheme:
Instant communication information comprises from the dissolving system under a kind of cloud environment of the present invention:
The encrypting and decrypting module is responsible for needs are encrypted from the instant communication information of dissolving, or the ciphertext of dissolving certainly in the message is deciphered;
Secret sharing module, the secret shared algorithm of responsible use decomposes encryption key and recombinates, and secret sharing module resolves into n one's share of expenses for a joint undertaking key to encryption key K;
Key storage block is responsible for calling the DHT network submodular, uses random number generator to generate index index, stores sub-key the DHT network into or from the DHT network, fetches.
Preferably, the AES that uses when instant communication information is encrypted is the AES-CBC algorithm, and key length is 128 bits.
Preferably, to share algorithm be the secret algorithm of sharing of Shamir to the secret used of secret sharing module.
Preferably, the DHT network of storage sub-key is electric donkey eMule Kad network in the key storage block.
Preferably, the DHT submodule in the key storage block is stored sub-key as the notepad categorical data in the eMule Kad network.
In order to reach above-mentioned another purpose, the present invention adopts following technical scheme:
Instant communication information comprises the steps: from the dissolving method under the cloud environment of the present invention
The encryption and decryption module of S1, system is encrypted from the instant communication information of dissolving needs;
The secret sharing module of S2, system is responsible for using the secret algorithm of sharing that encryption key is decomposed;
S3, key storage block then store the sub-key after decomposing into electric donkey eMul kad network;
S4, before each sub-key reaches its life cycle, the user can fetch parton key recombinate out encryption key, the instant communication information behind the enabling decryption of encrypted then;
S5, after arriving the regular hour life cycle of most of sub-key; Because the dynamic characteristic of electric donkey eMul kad network; These sub-keys will disappear from this network, make that the instant communication information after encrypting can't be deciphered again, and the dissolving certainly that reaches instant communication information is destroyed.
Preferably, encrypting the concrete steps of dissolving message certainly is:
(1) for the instant communication information D of needs from dissolving; The encrypting and decrypting module of system will check in the key record that stores the DHT network in advance into whether satisfactory key is arranged; Obtain ciphertext C if having then directly use the key K that prestores that message is encrypted, then execution in step (4); Otherwise key K that generates at random of system is encrypted message and is obtained ciphertext C, execution in step (2) operation then;
(2) secret sharing module will resolve into n one's share of expenses for a joint undertaking key, i.e. k to encryption key
1, k
2..., k
n, just can recombinate and restore encryption key K, wherein k when having k one's share of expenses for a joint undertaking key<n, execution in step (3) then;
(3) key storage block is used an index index:I who generates n DHT network with L as the PRNG of the cryptography safety of seed
1, I
2..., I
n, system is with (I
1, k
1), (I
2, k
2) ..., (I
n, k
n) store in the corresponding node in the DHT network execution in step (4) then into;
(4) system will (n k) be packaged into certain form for C, L, is called from dissolving message, and the user can will be certainly dissolving message stores in cloud environment through cloud service.
Preferably, deblocking comprises the steps: from dissolving message
(1) for the dissolving message certainly that receives, the logical preliminary deblocking of system from dissolve message obtain (C, L, n, k), execution in step (2) then;
(2) key storage block is the index:I of n the DHT network of random number generator generation of seed in order to L
1, I
2..., I
n, and use these index from the DHT network, to fetch sub-key, then execution in step (3);
(3) when the sub-key number of fetching during more than or equal to k, just can use the secret sharing module encryption key K that recombinates out, execution in step (4) then, otherwise can't decrypting ciphertext C, data have been accomplished dissolving certainly;
(4), thereby obtain clear-text message D with key K decrypting ciphertext C.
Preferably, the DHT submodule in the key storage block is done sub-key in fetching the process of single sub-key, to send request to a plurality of nodes simultaneously, if node return results promptly stops to wait for the response of other node at once.
Preferably, the DHT submodule in the key storage block carries out buffer memory to the result who stores the searching nodal operation that carries out in the sub-key process.
The present invention has following advantage and effect with respect to prior art:
1, the present invention is in life cycle, and validated user is visit data easily.
2, the present invention is after life cycle finishes, and data will be dissolved automatically, not need the user to carry out any specific operation.Even the assailant obtains self-dissolving and separates the copy of data before life cycle finishes, data still can finish the back dissolving in life cycle.
3, the present invention has versatility, does not rely on any additional Special Equipment, need not depend on third party authentication center, than prior art, has higher efficient.
4, the present invention need not revise any data of having stored or having filed, and does not need safety in utilization hardware yet, saves cost; Need not rely on simultaneously the external service of the extra deployment of any needs yet.
Description of drawings
Fig. 1 dissolves the system framework sketch map certainly for instant communication information of the present invention;
Fig. 2 is packaged into instant communication information from dissolving the workflow diagram of message for the present invention;
Fig. 3 dissolves the workflow diagram of message certainly for decapsulation of the present invention.
Embodiment
Below in conjunction with embodiment and accompanying drawing the present invention is described in further detail, but execution mode of the present invention is not limited thereto.
Embodiment
As shown in Figure 1, instant communication information of the present invention comprises from the dissolving system:
Encrypting and decrypting module: be responsible for needs are encrypted from the instant communication information of dissolving, the ciphertext of dissolving certainly in the message is deciphered.
Secret sharing module: the secret shared algorithm of responsible use decomposes encryption key and recombinates.Secret sharing module resolves into n one's share of expenses for a joint undertaking key to encryption key, i.e. k1, and k2 ..., kn is when having k (k < n) the one's share of expenses for a joint undertaking key encryption key K that just can recombinate out.The introducing of secret sharing module can enhanced system fail safe and reliability.
Key storage block: be responsible for calling the DHT network submodular, use random number generator to generate index, store sub-key the DHT network into or from the DHT network, fetch.Key storage block is with the DHT network of eMuleKad network as the storage sub-key at present.2, instant communication information is characterized in that from the dissolving system AES that uses when instant communication information is encrypted is the AES-CBC algorithm under the cloud environment according to claim 1, and key length is 128 bits.
In the present embodiment; The secret that secret sharing module is used is shared algorithm and is the secret algorithm of sharing of Shamir; The DHT network of storage sub-key is electric donkey eMule Kad network in the key storage block, and the DHT submodule in the key storage block is stored sub-key as the notepad categorical data in the eMule Kad network.
Said safety management platform will use the mobile device sequence number, be stored in the ciphering sequence number of mobile device encrypted area (this ciphering sequence number is generated and sent to mobile device by safety management platform when mobile device is registered successfully at random) and mobile network identification number (sending to mobile device by safety management platform when mobile device is registered successfully).The encryption and decryption module comprises two sub-module: symmetric key encryption and decryption submodule and mixing encryption and decryption submodule.
Instant communication information comprises the steps: from the dissolving method under the present embodiment cloud environment
The encryption and decryption module of S1, system is encrypted from the instant communication information of dissolving needs;
The secret sharing module of S2, system is responsible for using the secret algorithm of sharing that encryption key is decomposed;
S3, key storage block then store the sub-key after decomposing into electric donkey eMul kad network;
S4, before each sub-key reaches its life cycle, the user can fetch parton key recombinate out encryption key, the instant communication information behind the enabling decryption of encrypted then;
S5, after arriving the regular hour life cycle of most of sub-key; Because the dynamic characteristic of electric donkey eMul kad network; These sub-keys will disappear from this network, make that the instant communication information after encrypting can't be deciphered again, and the dissolving certainly that reaches instant communication information is destroyed.
For the ease of analyzing the present invention, below instant communication information is packaged into from dissolving the workflow diagram (Fig. 2) of message and workflow diagram (Fig. 3) that message is separated in the decapsulation self-dissolving remakes labor.
As shown in Figure 2; Instant communication information D for the needs transmission; The encrypting and decrypting module of system will check in the key record that stores the DHT network in advance into whether satisfactory key is arranged, and obtain ciphertext C if having then directly use the key K that prestores that message is encrypted; Otherwise key K that generates at random of system uses secret sharing module to resolve into n one's share of expenses for a joint undertaking key, i.e. k to encryption key then
1, k
2..., k
n, when having k (k<n) the one's share of expenses for a joint undertaking key just can be recombinated and restored encryption key K, and key storage block is used an index:I who generates n DHT network with L as the PRNG of the cryptography safety of seed
1, I
2..., I
n, then with (I
1, k
1), (I
2, k
2) ..., (I
n, k
n) store in the corresponding node in the DHT network, behind the successful storage key, the encrypting and decrypting module is encrypted message and is obtained ciphertext C.System will (n k) be packaged into certain form for C, L, is called from dissolving message, and the user can will be dissolved message certainly through cloud service and sent to the recipient.
As shown in Figure 3, for the dissolving message certainly that receives, the logical preliminary deblocking of system from dissolve message obtain (C, L, n, k), key storage block is the index:I that the random number generator of seed generates n DHT network in order to L
1, I
2..., I
n, and use these index from the DHT network, to fetch sub-key, when the sub-key number of fetching during, just can use the secret sharing module encryption key K that recombinates out more than or equal to k, use key K decrypting ciphertext C then, thereby obtain clear-text message.If the sub-key number of fetching is during less than k then can't decrypting ciphertext C, data have been accomplished dissolving certainly and have been destroyed.
DHT submodule in the key storage block can carry out buffer memory to the result of FindNode (searching node) operation in the process of storage sub-key, carried out, so that raise the efficiency when fetching sub-key afterwards.
Further; In order to accelerate to fetch the process of sub-key; DHT submodule in the key storage block is done sub-key in fetching the process of single sub-key, to send request to a plurality of nodes simultaneously, if node return results promptly stops to wait for the response of other node at once.
The foregoing description is a preferred implementation of the present invention; But execution mode of the present invention is not restricted to the described embodiments; Other any do not deviate from change, the modification done under spirit of the present invention and the principle, substitutes, combination, simplify; All should be the substitute mode of equivalence, be included within protection scope of the present invention.
Claims (10)
1. instant communication information is characterized in that from the dissolving system under the cloud environment, comprising:
The encrypting and decrypting module is responsible for needs are encrypted from the instant communication information of dissolving, or the ciphertext of dissolving certainly in the message is deciphered;
Secret sharing module, the secret shared algorithm of responsible use decomposes encryption key and recombinates, and secret sharing module resolves into n one's share of expenses for a joint undertaking key to encryption key K;
Key storage block is responsible for calling the DHT network submodular, uses random number generator to generate index index, stores sub-key the DHT network into or from the DHT network, fetches.
2. instant communication information is characterized in that from the dissolving system under the cloud environment according to claim 1, and the AES that uses when instant communication information is encrypted is the AES-CBC algorithm, and key length is 128 bits.
3. instant communication information is characterized in that from the dissolving system under the cloud environment according to claim 1, and the secret that secret sharing module is used is shared algorithm and is the secret algorithm of sharing of Shamir.
4. instant communication information is characterized in that from the dissolving system under the cloud environment according to claim 1, and the DHT network of storage sub-key is electric donkey eMule Kad network in the key storage block.
5. instant communication information is characterized in that from the dissolving system under the cloud environment according to claim 1, and the DHT submodule in the key storage block is stored sub-key as the notepad categorical data in the eMule Kad network.
6. instant communication information is characterized in that from the dissolving method under the cloud environment according to claim 1, comprises the steps:
The encryption and decryption module of S1, system is encrypted from the instant communication information of dissolving needs;
The secret sharing module of S2, system is responsible for using the secret algorithm of sharing that encryption key is decomposed;
S3, key storage block then store the sub-key after decomposing into electric donkey eMul kad network;
S4, before each sub-key reaches its life cycle, the user can fetch parton key recombinate out encryption key, the instant communication information behind the enabling decryption of encrypted then;
S5, after arriving the regular hour life cycle of most of sub-key; Because the dynamic characteristic of electric donkey eMul kad network; These sub-keys will disappear from this network, make that the instant communication information after encrypting can't be deciphered again, and the dissolving certainly that reaches instant communication information is destroyed.
7. it is characterized in that from the dissolving method based on instant communication information under the described cloud environment of claim 6 that encryption from the concrete steps of dissolving message is:
(1) for the instant communication information D of needs from dissolving; The encrypting and decrypting module of system will check in the key record that stores the DHT network in advance into whether satisfactory key is arranged; Obtain ciphertext C if having then directly use the key K that prestores that message is encrypted, then execution in step (4); Otherwise key K that generates at random of system is encrypted message and is obtained ciphertext C, execution in step (2) operation then;
(2) secret sharing module will resolve into n one's share of expenses for a joint undertaking key, i.e. k to encryption key
1, k
2..., k
n, just can recombinate and restore encryption key K, wherein k when having k one's share of expenses for a joint undertaking key<n, execution in step (3) then;
(3) key storage block is used an index index:I who generates n DHT network with L as the PRNG of the cryptography safety of seed
1, I
2..., I
n, system is with (I
1, k
1), (I
2, k
2) ..., (I
n, k
n) store in the corresponding node in the DHT network execution in step (4) then into;
(4) system will (n k) be packaged into certain form for C, L, is called from dissolving message, and the user can will be certainly dissolving message stores in cloud environment through cloud service.
8. instant communication information is characterized in that from the dissolving method under the cloud environment according to claim 6, and deblocking comprises the steps: from dissolving message
(1) for the dissolving message certainly that receives, the logical preliminary deblocking of system from dissolve message obtain (C, L, n, k), execution in step (2) then;
(2) key storage block is the index:I of n the DHT network of random number generator generation of seed in order to L
1, I
2..., I
n, and use these index from the DHT network, to fetch sub-key, then execution in step (3);
(3) when the sub-key number of fetching during more than or equal to k, just can use the secret sharing module encryption key K that recombinates out, execution in step (4) then, otherwise can't decrypting ciphertext C, data have been accomplished dissolving certainly;
(4), thereby obtain clear-text message D with key K decrypting ciphertext C.
9. instant communication information is from the dissolving method under the cloud environment according to claim 7; It is characterized in that; DHT submodule in the key storage block is done sub-key in fetching the process of single sub-key, to send request to a plurality of nodes simultaneously; If node is return results, promptly stop to wait for the response of other node at once.
10. instant communication information is characterized in that from the dissolving method under the cloud environment according to claim 7, and the DHT submodule in the key storage block carries out buffer memory to the result who stores the searching nodal operation that carries out in the sub-key process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102483233A CN102821098A (en) | 2012-07-17 | 2012-07-17 | System and method for self-dissolving instant messaging under cloud environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102483233A CN102821098A (en) | 2012-07-17 | 2012-07-17 | System and method for self-dissolving instant messaging under cloud environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102821098A true CN102821098A (en) | 2012-12-12 |
Family
ID=47304955
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012102483233A Pending CN102821098A (en) | 2012-07-17 | 2012-07-17 | System and method for self-dissolving instant messaging under cloud environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102821098A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103338437A (en) * | 2013-07-11 | 2013-10-02 | 成都三零瑞通移动通信有限公司 | Encryption method and system of mobile instant message |
CN103414682A (en) * | 2013-04-07 | 2013-11-27 | 深圳大学 | Method for cloud storage of data and system |
CN103780626A (en) * | 2014-01-27 | 2014-05-07 | 北京飞流九天科技有限公司 | Data sharing method of cloud server and intelligent terminal |
CN103973790A (en) * | 2014-05-09 | 2014-08-06 | 中国电子科技集团公司第三十研究所 | Automatic destroying method of Web application data stored in network |
CN104601451A (en) * | 2015-01-27 | 2015-05-06 | 深信服网络科技(深圳)有限公司 | Instant message communication method and system |
CN104660589A (en) * | 2015-01-20 | 2015-05-27 | 中兴通讯股份有限公司 | Method and system for controlling encryption of information and analyzing information as well as terminal |
CN104851007A (en) * | 2015-06-10 | 2015-08-19 | 深圳市瑞盟包装有限公司 | Commodity information management system and method based on two-dimensional code and self-dissolving system |
CN107769918A (en) * | 2017-09-07 | 2018-03-06 | 广东工业大学 | A kind of more copy associated deletion methods of safe cloud data |
CN109255245A (en) * | 2018-08-13 | 2019-01-22 | 海南新软软件有限公司 | A kind of local cryptographic key protection method, apparatus and system |
CN110401533A (en) * | 2019-08-27 | 2019-11-01 | 腾讯科技(深圳)有限公司 | A kind of private key encryption method and device |
CN113411186A (en) * | 2021-08-19 | 2021-09-17 | 北京电信易通信息技术股份有限公司 | Video conference data security sharing method |
-
2012
- 2012-07-17 CN CN2012102483233A patent/CN102821098A/en active Pending
Non-Patent Citations (3)
Title |
---|
R.GEAMBASU 等: ""Vanish:Increasing data privacy with self-destructing data"", 《PROCEEDINGS OF THE 18TH USENIX SECURITY SYMPOSIUM》 * |
岳风顺: ""云计算环境中数据自毁机制研究"", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 * |
王丽娜: ""一种适于云存储的数据确定性删除方法"", 《电子学报》 * |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103414682A (en) * | 2013-04-07 | 2013-11-27 | 深圳大学 | Method for cloud storage of data and system |
CN103414682B (en) * | 2013-04-07 | 2016-08-17 | 深圳大学 | The method for cloud storage of a kind of data and system |
CN103338437B (en) * | 2013-07-11 | 2016-06-08 | 成都三零瑞通移动通信有限公司 | The encryption method of a kind of mobile instant message and system |
CN103338437A (en) * | 2013-07-11 | 2013-10-02 | 成都三零瑞通移动通信有限公司 | Encryption method and system of mobile instant message |
CN103780626A (en) * | 2014-01-27 | 2014-05-07 | 北京飞流九天科技有限公司 | Data sharing method of cloud server and intelligent terminal |
CN103973790A (en) * | 2014-05-09 | 2014-08-06 | 中国电子科技集团公司第三十研究所 | Automatic destroying method of Web application data stored in network |
CN104660589A (en) * | 2015-01-20 | 2015-05-27 | 中兴通讯股份有限公司 | Method and system for controlling encryption of information and analyzing information as well as terminal |
CN104601451A (en) * | 2015-01-27 | 2015-05-06 | 深信服网络科技(深圳)有限公司 | Instant message communication method and system |
CN104601451B (en) * | 2015-01-27 | 2017-11-28 | 深信服网络科技(深圳)有限公司 | Instant information communication method and system |
CN104851007A (en) * | 2015-06-10 | 2015-08-19 | 深圳市瑞盟包装有限公司 | Commodity information management system and method based on two-dimensional code and self-dissolving system |
CN104851007B (en) * | 2015-06-10 | 2018-05-15 | 深圳市瑞盟包装有限公司 | Commodity information management system and its method based on Quick Response Code and from dissolution system |
CN107769918A (en) * | 2017-09-07 | 2018-03-06 | 广东工业大学 | A kind of more copy associated deletion methods of safe cloud data |
CN107769918B (en) * | 2017-09-07 | 2020-12-04 | 广东工业大学 | Safe cloud data multi-copy association deletion method |
CN109255245A (en) * | 2018-08-13 | 2019-01-22 | 海南新软软件有限公司 | A kind of local cryptographic key protection method, apparatus and system |
CN110401533A (en) * | 2019-08-27 | 2019-11-01 | 腾讯科技(深圳)有限公司 | A kind of private key encryption method and device |
CN110401533B (en) * | 2019-08-27 | 2021-07-27 | 腾讯科技(深圳)有限公司 | Private key encryption method and device |
CN113411186A (en) * | 2021-08-19 | 2021-09-17 | 北京电信易通信息技术股份有限公司 | Video conference data security sharing method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102821098A (en) | System and method for self-dissolving instant messaging under cloud environment | |
Awan et al. | Secure framework enhancing AES algorithm in cloud computing | |
US9985782B2 (en) | Network bound decryption with offline encryption | |
US10951595B2 (en) | Method, system and apparatus for storing website private key plaintext | |
Yang et al. | Provable data possession of resource-constrained mobile devices in cloud computing | |
CN103138939B (en) | Based on the key access times management method of credible platform module under cloud memory module | |
JP2020528224A (en) | Secure execution of smart contract operations in a reliable execution environment | |
CN107342861B (en) | Data processing method, device and system | |
CN111245597A (en) | Key management method, system and equipment | |
CN112926051A (en) | Multi-party security computing method and device | |
US20220014367A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
CN112115461B (en) | Equipment authentication method and device, computer equipment and storage medium | |
CN104618096A (en) | Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center | |
US20210067334A1 (en) | System and Method for Cryptographic Key Fragments Management | |
Bhandari et al. | A framework for data security and storage in Cloud Computing | |
US20220216999A1 (en) | Blockchain system for supporting change of plain text data included in transaction | |
Agarkhed et al. | An efficient auditing scheme for data storage security in cloud | |
CN106257859A (en) | A kind of password using method | |
CN109120576A (en) | Data sharing method and device, computer equipment and storage medium | |
CN104811421A (en) | Secure communication method and secure communication device based on digital rights management | |
Jabbar et al. | Design and implementation of hybrid EC-RSA security algorithm based on TPA for cloud storage | |
CN114615087B (en) | Data sharing method, device, equipment and medium | |
CN114553557B (en) | Key calling method, device, computer equipment and storage medium | |
CN112565156B (en) | Information registration method, device and system | |
CN105426771A (en) | Method for realizing security of big data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20121212 |