CN105993010B - 用以提供扩展对象符号数据的方法及设备 - Google Patents

用以提供扩展对象符号数据的方法及设备 Download PDF

Info

Publication number
CN105993010B
CN105993010B CN201580008241.3A CN201580008241A CN105993010B CN 105993010 B CN105993010 B CN 105993010B CN 201580008241 A CN201580008241 A CN 201580008241A CN 105993010 B CN105993010 B CN 105993010B
Authority
CN
China
Prior art keywords
key
exemplary
value
data
output data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201580008241.3A
Other languages
English (en)
Chinese (zh)
Other versions
CN105993010A (zh
Inventor
亚伯拉罕·鲍姆
利安·扎尔米
吉尔·赖特尔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Texas Instruments Inc
Original Assignee
Texas Instruments Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Texas Instruments Inc filed Critical Texas Instruments Inc
Publication of CN105993010A publication Critical patent/CN105993010A/zh
Application granted granted Critical
Publication of CN105993010B publication Critical patent/CN105993010B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4488Object-oriented
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45504Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
    • G06F9/45529Embedded in an application, e.g. JavaScript in a Web browser
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/30Compression, e.g. Merkle-Damgard construction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
CN201580008241.3A 2014-02-11 2015-02-11 用以提供扩展对象符号数据的方法及设备 Active CN105993010B (zh)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201461938381P 2014-02-11 2014-02-11
US61/938,381 2014-02-11
US14/611,080 US9853956B2 (en) 2014-02-11 2015-01-30 JSON encryption and hashing with indication added to key-value
US14/611,080 2015-01-30
PCT/US2015/015515 WO2015123366A2 (en) 2014-02-11 2015-02-11 Methods and apparatus to provide extended object notation data

Publications (2)

Publication Number Publication Date
CN105993010A CN105993010A (zh) 2016-10-05
CN105993010B true CN105993010B (zh) 2019-05-07

Family

ID=53775978

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580008241.3A Active CN105993010B (zh) 2014-02-11 2015-02-11 用以提供扩展对象符号数据的方法及设备

Country Status (5)

Country Link
US (2) US9853956B2 (enExample)
EP (1) EP3105686B1 (enExample)
JP (1) JP6685230B2 (enExample)
CN (1) CN105993010B (enExample)
WO (1) WO2015123366A2 (enExample)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024248630A1 (en) * 2023-05-30 2024-12-05 Xero Limited Systems, methods and computer readable media for comparing structured data

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12375484B2 (en) 2012-02-02 2025-07-29 Josiah Johnson Umezurike Decentralized secure true digital ID for communication
US10911217B1 (en) * 2017-01-20 2021-02-02 Josiah Johnson Umezurike Endpoint-to-endpoint cryptographic system for mobile and IoT devices
US12363112B2 (en) 2012-02-02 2025-07-15 Josiah Umezurike Real-time analysis plugin for cyber defense
CN103309315B (zh) * 2013-05-24 2015-09-02 成都秦川科技发展有限公司 物联网汽车智能控制仪表及物联网汽车智能管理系统
US11256798B2 (en) 2014-03-19 2022-02-22 Bluefin Payment Systems Llc Systems and methods for decryption as a service
US9355374B2 (en) 2014-03-19 2016-05-31 Bluefin Payment Systems Llc Systems and methods for creating fingerprints of encryption devices
US9930095B2 (en) * 2014-03-26 2018-03-27 Google Llc System for managing extension modifications to web pages
US11178212B2 (en) * 2014-07-29 2021-11-16 Facebook, Inc. Compressing and transmitting structured information
US9582301B2 (en) * 2014-09-17 2017-02-28 International Business Machines Corporation Method of defining javascript objects
US10310774B2 (en) * 2015-12-24 2019-06-04 Intel Corporation Techniques for data storage protection and integrity checking
US10333709B2 (en) * 2016-04-25 2019-06-25 Barracuda Networks, Inc. Method and apparatus to support binary packing of JSON data
US10299091B2 (en) * 2016-06-22 2019-05-21 Intel Corporation Internet of things protocol handler
CN106411948A (zh) * 2016-11-28 2017-02-15 浪潮软件集团有限公司 一种基于json验证码的安全认证拦截的方法
WO2018223130A1 (en) 2017-06-02 2018-12-06 Bluefin Payment Systems Llc Systems and methods for managing a payment terminal via a web browser
US11711350B2 (en) 2017-06-02 2023-07-25 Bluefin Payment Systems Llc Systems and processes for vaultless tokenization and encryption
WO2019060534A2 (en) 2017-09-20 2019-03-28 Infinity Tribe Group Inc. DEVICE SUBSTITUTED TO THE REMOTELY CONTROLLED TECHNICIAN
US20190114628A1 (en) * 2017-10-12 2019-04-18 Bluefin Payment Systems Llc Systems and methods for parsing and decrypting payloads
US10503497B2 (en) * 2018-01-30 2019-12-10 Microsoft Technology Licensing, Llc Techniques for utilizing an expression language in service configuration files
CN108833339B (zh) * 2018-04-25 2021-02-12 广东工业大学 一种内容中心网络下加密的访问控制方法
US11722470B2 (en) * 2018-08-29 2023-08-08 International Business Machines Corporation Encrypted data according to a schema
CN110968744B (zh) 2018-09-30 2023-09-05 中国移动通信有限公司研究院 一种资源查询方法及装置、设备、存储介质
US11425002B1 (en) * 2018-11-26 2022-08-23 Amazon Technologies, Inc. Infrastructure managing framework for serverless architecture
US11641274B2 (en) * 2019-03-22 2023-05-02 Jpmorgan Chase Bank, N.A. Systems and methods for manipulation of private information on untrusted environments
WO2020232162A1 (en) 2019-05-13 2020-11-19 Bluefin Payment Systems Llc Systems and processes for vaultless tokenization and encryption
CN110502602B (zh) * 2019-08-14 2023-10-17 平安科技(深圳)有限公司 数据存储方法、装置、设备和计算机存储介质
US12298984B2 (en) * 2019-12-06 2025-05-13 William J. Ziebell Systems, methods, and media for identification, disambiguation, verification and for communicating knowledge
US11693841B2 (en) 2020-01-03 2023-07-04 International Business Machines Corporation Hash for structural data with same data meaning
US11960623B2 (en) * 2020-03-27 2024-04-16 EMC IP Holding Company LLC Intelligent and reversible data masking of computing environment information shared with external systems
US12093974B2 (en) * 2020-10-30 2024-09-17 Lucid Ratings, Inc. Review engine with blockchain-based verification
CN112817602B (zh) * 2021-02-26 2024-04-23 青岛海信网络科技股份有限公司 一种json格式数据发送、接收方法、设备及介质
CN114218300B (zh) * 2021-12-23 2023-08-08 北京百度网讯科技有限公司 数据处理方法和装置、系统、电子设备、计算机可读介质
CN114489839B (zh) * 2022-01-12 2023-08-01 海南车智易通信息技术有限公司 针对页面加载配置数据的方法及装置、服务器
JP2023140128A (ja) 2022-03-22 2023-10-04 キオクシア株式会社 永続記憶装置、ホスト及び永続記憶装置の制御方法
US11709808B1 (en) 2022-03-25 2023-07-25 Snowflake Inc. Schema evolution for the serialization of non-primary key columnar data into row-organized byte sequences

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1552026A (zh) * 2001-07-02 2004-12-01 Bea系统公司 用于处理数据表示语言对象的编程语言扩展和相关应用
CN101101602A (zh) * 2007-07-27 2008-01-09 华为技术有限公司 一种数据格式的校验方法及装置
CN101661391A (zh) * 2009-09-24 2010-03-03 金蝶软件(中国)有限公司 一种对象序列化方法、对象反序列化方法、装置及系统
CN101854371A (zh) * 2009-03-31 2010-10-06 华为技术有限公司 JavaScript对象的调用及处理的方法、装置
CN101925895A (zh) * 2007-12-13 2010-12-22 谷歌公司 用于高效传输数据的通用格式
CN102053994A (zh) * 2009-11-10 2011-05-11 阿里巴巴集团控股有限公司 一种语言解析器和应用该解析器的解析方法
CN102207873A (zh) * 2011-06-15 2011-10-05 中国联合网络通信集团有限公司 基于安卓平台的JavaScript扩展对象实现方法及绑定接口结构
CN102479130A (zh) * 2010-11-25 2012-05-30 上海宇芯科技有限公司 一种跨平台跨语言单芯片系统的验证方法
CN102622448A (zh) * 2012-03-26 2012-08-01 中山大学 一种数字电视互动应用页面标记语言解析方法
CN102750268A (zh) * 2012-06-19 2012-10-24 山东中创软件商用中间件股份有限公司 一种对象序列化方法、对象反序列化方法、装置及系统
CN102981841A (zh) * 2011-11-08 2013-03-20 微软公司 外部序列化和去序列化
CN103064720A (zh) * 2011-09-09 2013-04-24 微软公司 简档导向的jit代码生成
CN103077185A (zh) * 2012-12-18 2013-05-01 厦门雅迅网络股份有限公司 一种基于对象的自定义扩展信息的方法
WO2013096887A1 (en) * 2011-12-23 2013-06-27 Amiato, Inc. Scalable analysis platform for semi-structured data
CN103379127A (zh) * 2012-04-12 2013-10-30 阿里巴巴集团控股有限公司 服务器与客户端间的数据交互方法及装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8291230B2 (en) 2009-01-20 2012-10-16 International Business Machines Corporation Method and system for signing JavaScript object notation (JSON) messages
US9461817B2 (en) * 2009-01-20 2016-10-04 International Business Machines Corporation Method and system for encrypting JavaScript object notation (JSON) messages
WO2011035944A1 (en) * 2009-09-25 2011-03-31 International Business Machines Corporation Managing application state information by means of a uniform resource identifier (uri)
JP5609309B2 (ja) * 2010-06-24 2014-10-22 富士通株式会社 データ提供方法、データ提供装置、データ提供プログラムおよびデータ提供システム
CN102508674A (zh) * 2011-12-02 2012-06-20 方正国际软件有限公司 基于json进行对象化参数传递的方法及系统
US9285826B2 (en) 2011-12-22 2016-03-15 Intel Corporation Deterministic clock crossing
JP5662391B2 (ja) * 2012-08-17 2015-01-28 株式会社東芝 情報操作装置、情報出力装置および情報処理方法
CN102968307B (zh) * 2012-11-29 2016-02-24 中国传媒大学 一种基于java的web开发中间件
CN103235731A (zh) * 2013-04-27 2013-08-07 四川长虹电器股份有限公司 存储应用程序的方法
CN103401562B (zh) * 2013-07-31 2016-07-06 北京华易互动科技有限公司 一种无损json数据压缩方法

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1552026A (zh) * 2001-07-02 2004-12-01 Bea系统公司 用于处理数据表示语言对象的编程语言扩展和相关应用
CN101101602A (zh) * 2007-07-27 2008-01-09 华为技术有限公司 一种数据格式的校验方法及装置
CN101925895A (zh) * 2007-12-13 2010-12-22 谷歌公司 用于高效传输数据的通用格式
CN101854371A (zh) * 2009-03-31 2010-10-06 华为技术有限公司 JavaScript对象的调用及处理的方法、装置
CN101661391A (zh) * 2009-09-24 2010-03-03 金蝶软件(中国)有限公司 一种对象序列化方法、对象反序列化方法、装置及系统
CN102053994A (zh) * 2009-11-10 2011-05-11 阿里巴巴集团控股有限公司 一种语言解析器和应用该解析器的解析方法
CN102479130A (zh) * 2010-11-25 2012-05-30 上海宇芯科技有限公司 一种跨平台跨语言单芯片系统的验证方法
CN102207873A (zh) * 2011-06-15 2011-10-05 中国联合网络通信集团有限公司 基于安卓平台的JavaScript扩展对象实现方法及绑定接口结构
CN103064720A (zh) * 2011-09-09 2013-04-24 微软公司 简档导向的jit代码生成
CN102981841A (zh) * 2011-11-08 2013-03-20 微软公司 外部序列化和去序列化
WO2013096887A1 (en) * 2011-12-23 2013-06-27 Amiato, Inc. Scalable analysis platform for semi-structured data
CN102622448A (zh) * 2012-03-26 2012-08-01 中山大学 一种数字电视互动应用页面标记语言解析方法
CN103379127A (zh) * 2012-04-12 2013-10-30 阿里巴巴集团控股有限公司 服务器与客户端间的数据交互方法及装置
CN102750268A (zh) * 2012-06-19 2012-10-24 山东中创软件商用中间件股份有限公司 一种对象序列化方法、对象反序列化方法、装置及系统
CN103077185A (zh) * 2012-12-18 2013-05-01 厦门雅迅网络股份有限公司 一种基于对象的自定义扩展信息的方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JSON Encryption;A. A. Abd El-Aziz等;《2014 International Conference on Computer Communication and Informatics》;20140103;第1-6页 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024248630A1 (en) * 2023-05-30 2024-12-05 Xero Limited Systems, methods and computer readable media for comparing structured data

Also Published As

Publication number Publication date
JP2017511920A (ja) 2017-04-27
EP3105686A2 (en) 2016-12-21
US20180077129A1 (en) 2018-03-15
CN105993010A (zh) 2016-10-05
US20150229613A1 (en) 2015-08-13
EP3105686A4 (en) 2017-08-16
EP3105686B1 (en) 2024-09-18
US10609009B2 (en) 2020-03-31
US9853956B2 (en) 2017-12-26
WO2015123366A2 (en) 2015-08-20
JP6685230B2 (ja) 2020-04-22
WO2015123366A3 (en) 2015-10-08

Similar Documents

Publication Publication Date Title
CN105993010B (zh) 用以提供扩展对象符号数据的方法及设备
CN107391298B (zh) 数据存储状态检测方法、装置及计算机可读存储介质
CN107786331B (zh) 数据处理方法、装置、系统及计算机可读存储介质
CN109241484B (zh) 一种基于加密技术的网页数据的发送方法及设备
JP6120961B2 (ja) 特定フォーマットを有する代替データの生成および検証
CN112966227A (zh) 代码加密解密方法和装置、存储介质
WO2020233047A1 (zh) 页面测试的方法及装置
CN110858249A (zh) 一种数据库文件加密方法、解密方法和相关装置
US20230144072A1 (en) Data storage server and client devices for securely storing data
CN107103211B (zh) Sdk发送、应用发布、应用运行方法及装置
CN115982675A (zh) 文档处理方法、装置、电子设备以及存储介质
CN103473104A (zh) 一种基于关键词上下文频率矩阵的应用重打包辨别方法
CN110462620A (zh) 分解敏感数据存储在不同应用环境中
US11232190B2 (en) Device attestation techniques
CN106780280A (zh) 数字水印加密方法及装置
CN105574371A (zh) 基于文本水印的安卓应用程序信息隐藏与软件保护方法
CN103561147A (zh) 移动设备的通讯录更新方法和系统
CN105809494A (zh) 发票生成及验证方法及系统
US8769290B1 (en) Providing confidential structured data
CN108512657B (zh) 一种密码生成方法及装置
CN114385617A (zh) 基于插件的数据清洗加密方法、装置、设备及介质
CN104102538A (zh) 信息处理的方法及电子设备
CN106656496A (zh) 一种数据加密方法及装置
US20210192048A1 (en) Methods and apparatus to facilitate malware detection using compressed data
CN102970145B (zh) 一种签名方法及装置

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant