CN104318168B - The encryption and decryption method and system of a kind of virtual machine image file - Google Patents

The encryption and decryption method and system of a kind of virtual machine image file Download PDF

Info

Publication number
CN104318168B
CN104318168B CN201410494162.5A CN201410494162A CN104318168B CN 104318168 B CN104318168 B CN 104318168B CN 201410494162 A CN201410494162 A CN 201410494162A CN 104318168 B CN104318168 B CN 104318168B
Authority
CN
China
Prior art keywords
aes
data
system time
encryption
image file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410494162.5A
Other languages
Chinese (zh)
Other versions
CN104318168A (en
Inventor
杨耀敏
易乐天
周雄峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Yun Chao Science and Technology Ltd.
Original Assignee
Zhejiang Yun Chao Science And Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Yun Chao Science And Technology Ltd filed Critical Zhejiang Yun Chao Science And Technology Ltd
Priority to CN201410494162.5A priority Critical patent/CN104318168B/en
Publication of CN104318168A publication Critical patent/CN104318168A/en
Application granted granted Critical
Publication of CN104318168B publication Critical patent/CN104318168B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the encryption and decryption method and system of a kind of virtual machine image file, it is related to field of data encryption.Encryption method includes:To virtual machine image file, the one-to-one relationship set up between the system time and AES of each data forms AES combination;Each be-encrypted data is received, and obtains corresponding system time;In the AES combination, retrieved according to the system time got, obtained the corresponding AES of each be-encrypted data;The be-encrypted data is encrypted using the AES and key, obtains encryption data;The system time that will be got is added to behind the encryption data, and all of encryption data write into virtual machine image file.Even if so that hacker has got image file and key, if the complicated AES combination can not be obtained, also virtual machine image file can not be decrypted, it is ensured that the safety of image file.

Description

The encryption and decryption method and system of a kind of virtual machine image file
Technical field
The present invention relates to field of data encryption, more particularly to a kind of virtual machine image file encryption and decryption method and be System.
Background technology
In Intel Virtualization Technology, the image file of virtual machine serves as the role of virtual disk.That is:The behaviour of virtual machine Make system, user data to be all stored in image file.To the high place of security request data, it is necessary to enter to image file Row encryption.
At present, all of data in virtual machine image file are encrypted, decrypted mostly using the single algorithm of identical. But, AES cans be counted on one's fingers, once hacker obtains image file and key, it is possible in quick obtaining image file Data so that there is great potential safety hazard in the data in virtual machine image file.
The content of the invention
It is an object of the invention to provide the encryption and decryption method and system of a kind of virtual machine image file, so as to solve Foregoing problems present in prior art.
To achieve these goals, the technical solution adopted by the present invention is as follows:
A kind of encryption method of virtual machine image file, comprises the following steps:
S1, to virtual machine image file, the one-to-one corresponding set up between the system time and AES of each data is closed System, forms AES combination;
S2, receives each be-encrypted data, and obtain corresponding system time;
S3, in the AES combination, is retrieved according to the system time got in step S2, obtains each The corresponding AES of the be-encrypted data;
S4, is encrypted to the be-encrypted data using the AES and key, obtains encryption data;
S5, the system time got in step S2 is added to behind the encryption data, and will be all described in Encryption data is write in virtual machine image file.
Preferably, the system time in step S1 and S2 is accurate to microsecond.
Specifically, in step S1, the one-to-one corresponding set up between the system time of each data and AES is closed System, specifically, by the system time of each data divided by the AES species, the remainder for obtaining and the encryption One-to-one relationship is set up between algorithm;It is described in the AES combination in step S3, got according in step S2 System time retrieved, specifically, the system time got in the rapid S2 is obtained divided by the species of the AES To remainder, by the use of the obtained remainder as key, retrieved in the AES combination.
Preferably, in step S4, the key is using MD5 values.
A kind of encryption system of virtual machine image file, including:
Decision-making module:For to virtual machine image file, setting up between the system time of each data and AES One-to-one relationship, forms AES combination;It is additionally operable in the AES combination, each is received according to encrypting module The system time got during be-encrypted data is retrieved, and obtains the corresponding AES of each described be-encrypted data;
Encrypting module:For receiving each be-encrypted data, and obtain corresponding system time;It is additionally operable to add using described The be-encrypted data is encrypted for close algorithm and key, obtains encryption data;It is additionally operable to that each be-encrypted data will be received When the system time that gets be added to behind the encryption data, and all encryption datas are write into virtual machine In image file.
A kind of decryption method of virtual machine image file, comprises the following steps:
S1, to virtual machine image file, the one-to-one corresponding set up between the system time of each data and AES is closed System, forms AES combination;
S2, receives each encryption data, and obtain the system time when encryption data is encrypted;
S3, in the AES combination, system time when being encrypted according to the encryption data is retrieved, and is obtained The corresponding AES of each encryption data;
S4, obtains the corresponding decipherment algorithm of the AES;
S5, is decrypted to the encryption data using the decipherment algorithm and key, obtains ciphertext data.
Preferably, the system time in step S1 and S2 is accurate to microsecond.
Specifically, in step S1, the one-to-one corresponding between the system time and AES for setting up each data is closed System, specifically, by the system time of each data divided by the AES species, the remainder for obtaining with it is described plus One-to-one relationship is set up between close algorithm;It is described in the AES combination in step S3, obtained according in step 2 To system time retrieved, specifically, the encryption data encryption when system time divided by the AES kind Class, obtains remainder, by the use of the obtained remainder as key, is retrieved in the AES combination.
Preferably, in step S5, the key is using MD5 values.
A kind of decryption system of virtual machine image file, including:
Decision-making module:For to virtual machine image file, set up each encryption data system time and AES it Between one-to-one relationship, formed AES combination;It is additionally operable in the AES combination, according to the encryption data System time during encryption is retrieved, and obtains the corresponding AES of each described encryption data;
Deciphering module:For receiving each encryption data, and obtain the system time when encryption data is encrypted;Also use In the corresponding decipherment algorithm of the acquisition AES;It is additionally operable to enter the encryption data using the decipherment algorithm and key Row decryption, obtains ciphertext data.
The beneficial effects of the invention are as follows:By will be set up between AES and the system time of each data in the present invention One-to-one relationship, forms complicated AES combination, and using the complicated AES combination to virtual machine image text Part is encrypted and decrypted.Even if so that hacker has got image file and key, if adding for the complexity can not be obtained Close algorithm combination, cannot also be decrypted to virtual machine image file, so as to ensure that the safety of image file.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the encryption method of virtual machine image file provided in an embodiment of the present invention;
Fig. 2 is the structural representation of the encryption system of virtual machine image file provided in an embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the decryption method of virtual machine image file provided in an embodiment of the present invention;
Fig. 4 is the structural representation of the decryption system of virtual machine image file provided in an embodiment of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with accompanying drawing, the present invention is entered Row is further described.It should be appreciated that specific embodiment described herein is only used to explain the present invention, it is not used to Limit the present invention.
As shown in figure 1, the embodiments of the invention provide a kind of encryption method of virtual machine image file, including following step Suddenly:
S1, to virtual machine image file, the one-to-one corresponding set up between the system time and AES of each data is closed System, forms AES combination;
S2, receives each be-encrypted data, and obtain corresponding system time;
S3, in the AES combination, is retrieved according to the system time got in step 2, obtains each The corresponding AES of the be-encrypted data;
S4, is encrypted using the AES and key to the be-encrypted data, obtains encryption data;
S5, the system time got in step 2 is added to behind the encryption data, and will be all described in plus Ciphertext data is write in virtual machine image file.
In the prior art, when all data in virtual machine image file being encrypted, general multiple data can be adopted Identical algorithm is used, because the AES of data is very limited, after hacker obtains the key of encryption data, it is easy to will The image file encrypted by identical algorithms is decrypted, and so as to get the data in image file, so, has resulted in virtual machine The potential safety hazard of image file.In the embodiment of the present invention, in order to multiple data use single calculation in solving virtual machine image file Easily being decrypted for method encryption, causes the unsafe problem of image file there is provided a kind of encryption method, by AES and often One-to-one relationship is set up between the system time of individual data, AES combination, in the AES combination, one is formed System time one AES of correspondence of data, due to there are multiple data in each image file, each data has right The system time answered, each system time one AES of correspondence, so in same image file, just having used multiple AES is encrypted to it, and AES combination can periodically be changed with flexible and changeable.So each mirror image text The corresponding AES combination of part may be differed also, such that it is able to realize that carrying out multiple encryption algorithms to image file adds It is close, and be more than using single algorithm, so, after hacker obtains image file and key, just it is not easy to by adding The image file of close algorithm combination encryption is decrypted, and so as to get the data in image file, so, ensures that mirror image The safety of file.
Wherein, the system time in step S1 and S2 is accurate to microsecond.So, the quantity of system time can be more Many, the AES combination of formation can be more complicated, and the encryption data for obtaining can more be difficult to decrypt.
In the embodiment of the present invention, in step S1, it is described set up between the system time of each data and AES one One corresponding relation, specifically, by the species of the system time of each data divided by the AES, obtained remainder One-to-one relationship is set up between the AES;It is described in the AES combination in step S3, according to step The system time got in 2 is retrieved, specifically, the system time got in described rapid 2 is divided by the AES Species, obtain remainder, by the use of the remainder for obtaining as key, in the AES combination retrieve.Using according to one System time after fixed rule process can be quickly found used in the data of the system time as retrieval key AES, so that the encryption to data is quickly realized, when system time is continually changing, it is determined which kind of AES used Speed the processing speed of data encryption will be played an important role, and then influence system operational efficiency.Such as this area Technical staff it should be understood that can also be processed system time using other rules, during using system after treatment Between as retrieval key.
In the embodiment of the present invention, the key uses MD5 values.Key is set to be not easy to be cracked.
As shown in Fig. 2 another embodiment of the present invention provides a kind of encryption system of virtual machine image file, including:
Decision-making module:For to virtual machine image file, setting up between the system time and AES of each data One-to-one relationship, forms AES combination;It is additionally operable in the AES combination, receives each according to encrypting module The system time got during be-encrypted data is retrieved, and obtains the corresponding AES of each be-encrypted data;
Encrypting module:For receiving each be-encrypted data, and obtain corresponding system time;It is additionally operable to add using described Close algorithm and key are encrypted to the be-encrypted data, obtain encryption data;It is additionally operable to that each be-encrypted data will be received When the system time that gets be added to behind the encryption data, and all of encryption data is write into virtual machine In image file.
The encryption system of the virtual machine image file provided in the embodiment of the present invention, for realizing the above embodiment of the present invention The encryption method of the virtual machine image file of offer.
It implements process:Encrypting module receives the data from virtual machine image file, and obtains each data Corresponding system time;Inquire about which kind of AES data encryption uses in decision-making module as key by the use of system time;Certainly The corresponding AESs of key are fed back to encrypting module by plan module, after encrypting module gets AES, using key to this Data are encrypted, and obtain encryption data, and system time when receiving be-encrypted data is added to behind encryption data, and In write-in virtual machine image file.After being encrypted to all data in virtual image file, just complete to image file Encryption.
As shown in figure 3, the embodiments of the invention provide a kind of decryption method of virtual machine image file, including following step Suddenly:
S1, to virtual machine image file, the one-to-one corresponding set up between the system time of each data and AES is closed System, forms AES combination;
S2, receives each encryption data, and obtain system time when encryption data is encrypted;
S3, in the AES combination, system time when being encrypted according to the encryption data is retrieved, and is obtained The corresponding AES of each encryption data;
S4, obtains the corresponding decipherment algorithm of the AES;
S5, is decrypted using the decipherment algorithm and key to the encryption data, obtains ciphertext data.
The decryption method of virtual machine image file provided in an embodiment of the present invention corresponds to the void provided in above-described embodiment The encryption method of plan machine image file, the encryption data to being obtained using the encryption method in above-described embodiment realizes decryption.
Wherein, the system time in step S1 and S2 is accurate to microsecond.
In step S1, the one-to-one relationship between the system time and AES for setting up each data, specifically For, by the system time of each data divided by the AES species, the remainder for obtaining and the AES it Between set up one-to-one relationship;It is described in the AES combination in step S3, according to the system got in step 2 Time is retrieved, specifically, the system time when encryption data is encrypted obtains remaining divided by the species of the AES Number, by the use of the remainder for obtaining as key, retrieves in the AES combination.
In step S5, the key is using MD5 values.
As shown in figure 4, in one embodiment of the invention there is provided a kind of decryption system of virtual machine image file, Including:
Decision-making module:For to virtual machine image file, setting up between the system time of each data and AES One-to-one relationship, forms AES combination;It is additionally operable in the AES combination, is encrypted according to the encryption data When system time retrieved, obtain the corresponding AES of each encryption data;
Deciphering module:For receiving each encryption data, and obtain system time when encryption data is encrypted;It is additionally operable to Obtain the corresponding decipherment algorithm of the AES;It is additionally operable to carry out the encryption data using the decipherment algorithm and key Decryption, obtains ciphertext data.
The decryption system of the virtual machine image file provided in the embodiment of the present invention, for realizing the above embodiment of the present invention The decryption method of the virtual machine image file of offer.
It implements process:Deciphering module receives the encryption data from virtual machine image file, and obtains each The corresponding system time of encryption data;Inquire about when encryption data is encrypted and use in decision-making module by the use of system time as key AES;The corresponding AESs of key are fed back to deciphering module by decision-making module, and deciphering module gets AES Afterwards, encryption data is decrypted using key and AES corresponding decipherment algorithm, obtains ciphertext data.To virtual image After all encryption datas in file are decrypted, the decryption to image file is just completed.
By using above-mentioned technical proposal disclosed by the invention, following beneficial effect has been obtained:In the embodiment of the present invention, One-to-one relationship will be set up between AES and the system time of each data, AES combination is formed, in the encryption In algorithm combination, system time one AES of correspondence of a data, due to there are multiple data in each image file, Each data have corresponding system time, one AES of each system time correspondence, so in same image file In, just use multiple AESs to be encrypted it, and AES combination can periodically be carried out more with flexible and changeable Change.So the corresponding AES combination of each image file may be differed also, such that it is able to realize carrying out image file The encryption of multiple encryption algorithms, and be more than using single algorithm, so, after hacker obtains image file and key, Just it is not easy to be decrypted the image file by being encrypted in algorithm combination, so as to get the data in image file, this Sample, ensures that the safety of image file.
Each embodiment in this specification is described by the way of progressive, what each embodiment was stressed be with The difference of other embodiment, between each embodiment identical similar part mutually referring to.
Those skilled in the art should be understood that the sequential of the method and step that above-described embodiment is provided can be entered according to actual conditions Row accommodation, is concurrently carried out also dependent on actual conditions.
All or part of step in the method that above-described embodiment is related to can be instructed by program correlation hardware come Complete, described program can be stored in the storage medium that computer equipment can be read, for performing the various embodiments described above side All or part of step described in method.The computer equipment, for example:Personal computer, server, the network equipment, intelligent sliding Dynamic terminal, intelligent home device, wearable intelligent equipment, vehicle intelligent equipment etc.;Described storage medium, for example:RAM、 ROM, magnetic disc, tape, CD, flash memory, USB flash disk, mobile hard disk, storage card, memory stick, webserver storage, network cloud storage Deng.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between there is any this actual relation or order.And, term " including ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, commodity or equipment including a series of key elements not only include that A little key elements, but also other key elements including being not expressly set out, or also include be this process, method, commodity or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", does not arrange Except also there is other identical element in the process including the key element, method, commodity or equipment.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should Depending on protection scope of the present invention.

Claims (8)

1. a kind of encryption method of virtual machine image file, it is characterised in that comprise the following steps:
S1, to virtual machine image file, the one-to-one relationship set up between the system time and AES of each data, shape Into AES combination;
S2, receives each be-encrypted data, and obtain corresponding system time;
S3, in the AES combination, is retrieved according to the system time got in step S2, is obtained described in each The corresponding AES of be-encrypted data;
S4, is encrypted using the AES and key to the be-encrypted data, obtains encryption data;
S5, the system time got in step S2 is added to behind the encryption data, and by all encryptions Data are write in virtual machine image file;
In step S1, the one-to-one relationship between the system time and AES for setting up each data, specifically, will The system time of each data divided by the species of the AES, set up between obtained remainder and the AES One-to-one relationship;It is described in the AES combination in step S3, entered according to the system time got in step S2 Row retrieval, specifically, the system time divided by the species of the AES that are got in the rapid S2, obtain remainder, is utilized The remainder for obtaining is retrieved as key in the AES combination.
2. the encryption method of virtual machine image file according to claim 1, it is characterised in that the institute in step S1 and S2 State system time and be accurate to microsecond.
3. the encryption method of virtual machine image file according to claim 1, it is characterised in that in step S4, described close Key uses MD5 values.
4. a kind of encryption system of virtual machine image file, it is characterised in that including:
Decision-making module:For to virtual machine image file, setting up between the system time of each data and AES one by one Corresponding relation, forms AES combination;It is additionally operable in the AES combination, it is to be added to receive each according to encrypting module The system time got during ciphertext data is retrieved, and obtains the corresponding AES of each described be-encrypted data;It is described to build The one-to-one relationship between the system time and AES of each data is found, specifically, by the system of each data Time, divided by the species of the AES, one-to-one relationship is set up between the remainder for obtaining and the AES;Institute State in AES combination, the system time got when receiving each be-encrypted data according to encrypting module is retrieved, have Body is that encrypting module receives the system time got during each be-encrypted data divided by the species of the AES, obtains Remainder, by the use of the obtained remainder as key, is retrieved in the AES combination;
Encrypting module:For receiving each be-encrypted data, and obtain corresponding system time;It is additionally operable to calculate using the encryption The be-encrypted data is encrypted for method and key, obtains encryption data;It is additionally operable to obtain when receiving each be-encrypted data The system time got is added to behind the encryption data, and all encryption datas are write into virtual machine image In file.
5. a kind of decryption method of virtual machine image file, it is characterised in that comprise the following steps:
S1, to virtual machine image file, the one-to-one relationship set up between the system time and AES of each data, shape Into AES combination;
S2, receives each encryption data, and obtain the system time when encryption data is encrypted;
S3, in the AES combination, system time when being encrypted according to the encryption data is retrieved, and obtains each The corresponding AES of the encryption data;
S4, obtains the corresponding decipherment algorithm of the AES;
S5, is decrypted to the encryption data using the decipherment algorithm and key, obtains ciphertext data;
In step S1, the one-to-one relationship set up between the system time of each data and AES, specifically, will The system time of each data divided by the species of the AES, set up between obtained remainder and the AES One-to-one relationship;It is described in the AES combination in step S3, entered according to the system time got in step 2 Row retrieval, specifically, the system time when encryption data is encrypted obtains remainder divided by the species of the AES, profit With the remainder for obtaining as key, retrieved in the AES combination.
6. the decryption method of virtual machine image file according to claim 5, it is characterised in that the institute in step S1 and S2 State system time and be accurate to microsecond.
7. the decryption method of virtual machine image file according to claim 5, it is characterised in that in step S5, described close Key is using MD5 values.
8. a kind of decryption system of virtual machine image file, it is characterised in that including:
Decision-making module:For to virtual machine image file, setting up between the system time and AES of each encryption data One-to-one relationship, forms AES combination;It is additionally operable in the AES combination, is encrypted according to the encryption data When system time retrieved, obtain the corresponding AES of each described encryption data;It is described set up each data be One-to-one relationship between system time and AES, specifically, the system time of each data is added divided by described The species of close algorithm, one-to-one relationship is set up between obtained remainder and the AES;In the AES combination In, system time when being encrypted according to the encryption data is retrieved, specifically, the encryption data encrypt when system when Between divided by the AES species, remainder is obtained, by the use of the obtained remainder as key, in the AES group Retrieved in conjunction;
Deciphering module:For receiving each encryption data, and obtain the system time when encryption data is encrypted;It is additionally operable to obtain Take the corresponding decipherment algorithm of the AES;It is additionally operable to solve the encryption data using the decipherment algorithm and key It is close, obtain ciphertext data.
CN201410494162.5A 2014-09-24 2014-09-24 The encryption and decryption method and system of a kind of virtual machine image file Expired - Fee Related CN104318168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410494162.5A CN104318168B (en) 2014-09-24 2014-09-24 The encryption and decryption method and system of a kind of virtual machine image file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410494162.5A CN104318168B (en) 2014-09-24 2014-09-24 The encryption and decryption method and system of a kind of virtual machine image file

Publications (2)

Publication Number Publication Date
CN104318168A CN104318168A (en) 2015-01-28
CN104318168B true CN104318168B (en) 2017-07-11

Family

ID=52373399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410494162.5A Expired - Fee Related CN104318168B (en) 2014-09-24 2014-09-24 The encryption and decryption method and system of a kind of virtual machine image file

Country Status (1)

Country Link
CN (1) CN104318168B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453300A (en) * 2016-09-30 2017-02-22 北京悦畅科技有限公司 Data encryption and decryption method and device, and data transmission system
CN106658061A (en) * 2016-12-06 2017-05-10 讯美科技股份有限公司 Video data security encryption transmission method and system
CN107169373A (en) * 2017-05-11 2017-09-15 山东超越数控电子有限公司 A kind of virtual machine image file guard method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1550083A (en) * 2001-08-30 2004-11-24 Method for encoding and decoding communication data
CN1972237A (en) * 2006-12-06 2007-05-30 胡祥义 VPN system based on dynamic encryption algorithm
CN102025744A (en) * 2010-12-20 2011-04-20 北京世纪互联工程技术服务有限公司 Import and export system of virtual machine image in cloud computing
CN102447698A (en) * 2011-11-29 2012-05-09 数字金融服务(杭州)有限公司 Encrypting and transmitting method for network communication information
CN102968595A (en) * 2012-12-20 2013-03-13 曙光云计算技术有限公司 Method and device for protecting virtual machine system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10001855A1 (en) * 2000-01-18 2001-07-19 Siemens Ag Data transmission method for communication network, switch nodes, firewalls etc.

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1550083A (en) * 2001-08-30 2004-11-24 Method for encoding and decoding communication data
CN1972237A (en) * 2006-12-06 2007-05-30 胡祥义 VPN system based on dynamic encryption algorithm
CN102025744A (en) * 2010-12-20 2011-04-20 北京世纪互联工程技术服务有限公司 Import and export system of virtual machine image in cloud computing
CN102447698A (en) * 2011-11-29 2012-05-09 数字金融服务(杭州)有限公司 Encrypting and transmitting method for network communication information
CN102968595A (en) * 2012-12-20 2013-03-13 曙光云计算技术有限公司 Method and device for protecting virtual machine system

Also Published As

Publication number Publication date
CN104318168A (en) 2015-01-28

Similar Documents

Publication Publication Date Title
US11558358B2 (en) Secure analytics using homomorphic and injective format-preserving encryption
CN108494768A (en) A kind of cipher text searching method and system for supporting access control
CN104205117B (en) device file encryption and decryption method and device
US9602280B2 (en) System and method for content encryption in a key/value store
CN108259171B (en) Shader file protection method and device
CN109214201B (en) Data sharing method, terminal equipment and computer readable storage medium
US20140355757A1 (en) Encryption / decryption of data with non-persistent, non-shared passkey
CN107454070B (en) A kind of personalized privacy information search method based on block chain
CN103049466B (en) A kind of text searching method based on distributed cryptograph storage and system
US20170364691A1 (en) Method and System for Controlling Encryption of Information and Analyzing Information as well as Terminal
US20130185569A1 (en) Data protection system and method based on cloud storage
CN103294961A (en) Method and device for file encrypting/decrypting
CN102006300A (en) Method, device and system for encrypting cloud storage data
CN102138300A (en) Message authentication code pre-computation with applications to secure memory
CN104318168B (en) The encryption and decryption method and system of a kind of virtual machine image file
US10284535B2 (en) Secure database
CN106357608B (en) A kind of private data encryption and decryption method towards personal medical treatment & health data
Rane et al. Multi-user multi-keyword privacy preserving ranked based search over encrypted cloud data
CN108377319A (en) picture transmission method and device
CN103501220B (en) encryption method and device
CN107066868A (en) A kind of data guard method and device of identity-based certification
CN108256343A (en) Encryption method, device and the decryption method of Shader files, device
CN103745170A (en) Processing method and device for disk data
EP3883177B1 (en) General data protection method for multicentric sensitive data storage and sharing
CN115694921A (en) Data storage method, device and medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170620

Address after: Room 1302, block B, building 1068, Jincheng Road, Jincheng Road, Xiaoshan District, Zhejiang, Hangzhou, 311200

Applicant after: Zhejiang Yun Chao Science and Technology Ltd.

Address before: 100091, room 402, building 1, Wan Lin Building, No. 88, Nongda South Road, Beijing, Haidian District

Applicant before: Beijing Yun Chao artery Science and Technology Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170711

Termination date: 20170924

CF01 Termination of patent right due to non-payment of annual fee