CN105993010B - 用以提供扩展对象符号数据的方法及设备 - Google Patents
用以提供扩展对象符号数据的方法及设备 Download PDFInfo
- Publication number
- CN105993010B CN105993010B CN201580008241.3A CN201580008241A CN105993010B CN 105993010 B CN105993010 B CN 105993010B CN 201580008241 A CN201580008241 A CN 201580008241A CN 105993010 B CN105993010 B CN 105993010B
- Authority
- CN
- China
- Prior art keywords
- key
- exemplary
- value
- data
- output data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/448—Execution paradigms, e.g. implementations of programming paradigms
- G06F9/4488—Object-oriented
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
- G06F9/45529—Embedded in an application, e.g. JavaScript in a Web browser
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201461938381P | 2014-02-11 | 2014-02-11 | |
| US61/938,381 | 2014-02-11 | ||
| US14/611,080 US9853956B2 (en) | 2014-02-11 | 2015-01-30 | JSON encryption and hashing with indication added to key-value |
| US14/611,080 | 2015-01-30 | ||
| PCT/US2015/015515 WO2015123366A2 (en) | 2014-02-11 | 2015-02-11 | Methods and apparatus to provide extended object notation data |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN105993010A CN105993010A (zh) | 2016-10-05 |
| CN105993010B true CN105993010B (zh) | 2019-05-07 |
Family
ID=53775978
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201580008241.3A Active CN105993010B (zh) | 2014-02-11 | 2015-02-11 | 用以提供扩展对象符号数据的方法及设备 |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US9853956B2 (enExample) |
| EP (1) | EP3105686B1 (enExample) |
| JP (1) | JP6685230B2 (enExample) |
| CN (1) | CN105993010B (enExample) |
| WO (1) | WO2015123366A2 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2024248630A1 (en) * | 2023-05-30 | 2024-12-05 | Xero Limited | Systems, methods and computer readable media for comparing structured data |
Families Citing this family (34)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12375484B2 (en) | 2012-02-02 | 2025-07-29 | Josiah Johnson Umezurike | Decentralized secure true digital ID for communication |
| US10911217B1 (en) * | 2017-01-20 | 2021-02-02 | Josiah Johnson Umezurike | Endpoint-to-endpoint cryptographic system for mobile and IoT devices |
| US12363112B2 (en) | 2012-02-02 | 2025-07-15 | Josiah Umezurike | Real-time analysis plugin for cyber defense |
| CN103309315B (zh) * | 2013-05-24 | 2015-09-02 | 成都秦川科技发展有限公司 | 物联网汽车智能控制仪表及物联网汽车智能管理系统 |
| US11256798B2 (en) | 2014-03-19 | 2022-02-22 | Bluefin Payment Systems Llc | Systems and methods for decryption as a service |
| US9355374B2 (en) | 2014-03-19 | 2016-05-31 | Bluefin Payment Systems Llc | Systems and methods for creating fingerprints of encryption devices |
| US9930095B2 (en) * | 2014-03-26 | 2018-03-27 | Google Llc | System for managing extension modifications to web pages |
| US11178212B2 (en) * | 2014-07-29 | 2021-11-16 | Facebook, Inc. | Compressing and transmitting structured information |
| US9582301B2 (en) * | 2014-09-17 | 2017-02-28 | International Business Machines Corporation | Method of defining javascript objects |
| US10310774B2 (en) * | 2015-12-24 | 2019-06-04 | Intel Corporation | Techniques for data storage protection and integrity checking |
| US10333709B2 (en) * | 2016-04-25 | 2019-06-25 | Barracuda Networks, Inc. | Method and apparatus to support binary packing of JSON data |
| US10299091B2 (en) * | 2016-06-22 | 2019-05-21 | Intel Corporation | Internet of things protocol handler |
| CN106411948A (zh) * | 2016-11-28 | 2017-02-15 | 浪潮软件集团有限公司 | 一种基于json验证码的安全认证拦截的方法 |
| WO2018223130A1 (en) | 2017-06-02 | 2018-12-06 | Bluefin Payment Systems Llc | Systems and methods for managing a payment terminal via a web browser |
| US11711350B2 (en) | 2017-06-02 | 2023-07-25 | Bluefin Payment Systems Llc | Systems and processes for vaultless tokenization and encryption |
| WO2019060534A2 (en) | 2017-09-20 | 2019-03-28 | Infinity Tribe Group Inc. | DEVICE SUBSTITUTED TO THE REMOTELY CONTROLLED TECHNICIAN |
| US20190114628A1 (en) * | 2017-10-12 | 2019-04-18 | Bluefin Payment Systems Llc | Systems and methods for parsing and decrypting payloads |
| US10503497B2 (en) * | 2018-01-30 | 2019-12-10 | Microsoft Technology Licensing, Llc | Techniques for utilizing an expression language in service configuration files |
| CN108833339B (zh) * | 2018-04-25 | 2021-02-12 | 广东工业大学 | 一种内容中心网络下加密的访问控制方法 |
| US11722470B2 (en) * | 2018-08-29 | 2023-08-08 | International Business Machines Corporation | Encrypted data according to a schema |
| CN110968744B (zh) | 2018-09-30 | 2023-09-05 | 中国移动通信有限公司研究院 | 一种资源查询方法及装置、设备、存储介质 |
| US11425002B1 (en) * | 2018-11-26 | 2022-08-23 | Amazon Technologies, Inc. | Infrastructure managing framework for serverless architecture |
| US11641274B2 (en) * | 2019-03-22 | 2023-05-02 | Jpmorgan Chase Bank, N.A. | Systems and methods for manipulation of private information on untrusted environments |
| WO2020232162A1 (en) | 2019-05-13 | 2020-11-19 | Bluefin Payment Systems Llc | Systems and processes for vaultless tokenization and encryption |
| CN110502602B (zh) * | 2019-08-14 | 2023-10-17 | 平安科技(深圳)有限公司 | 数据存储方法、装置、设备和计算机存储介质 |
| US12298984B2 (en) * | 2019-12-06 | 2025-05-13 | William J. Ziebell | Systems, methods, and media for identification, disambiguation, verification and for communicating knowledge |
| US11693841B2 (en) | 2020-01-03 | 2023-07-04 | International Business Machines Corporation | Hash for structural data with same data meaning |
| US11960623B2 (en) * | 2020-03-27 | 2024-04-16 | EMC IP Holding Company LLC | Intelligent and reversible data masking of computing environment information shared with external systems |
| US12093974B2 (en) * | 2020-10-30 | 2024-09-17 | Lucid Ratings, Inc. | Review engine with blockchain-based verification |
| CN112817602B (zh) * | 2021-02-26 | 2024-04-23 | 青岛海信网络科技股份有限公司 | 一种json格式数据发送、接收方法、设备及介质 |
| CN114218300B (zh) * | 2021-12-23 | 2023-08-08 | 北京百度网讯科技有限公司 | 数据处理方法和装置、系统、电子设备、计算机可读介质 |
| CN114489839B (zh) * | 2022-01-12 | 2023-08-01 | 海南车智易通信息技术有限公司 | 针对页面加载配置数据的方法及装置、服务器 |
| JP2023140128A (ja) | 2022-03-22 | 2023-10-04 | キオクシア株式会社 | 永続記憶装置、ホスト及び永続記憶装置の制御方法 |
| US11709808B1 (en) | 2022-03-25 | 2023-07-25 | Snowflake Inc. | Schema evolution for the serialization of non-primary key columnar data into row-organized byte sequences |
Citations (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1552026A (zh) * | 2001-07-02 | 2004-12-01 | Bea系统公司 | 用于处理数据表示语言对象的编程语言扩展和相关应用 |
| CN101101602A (zh) * | 2007-07-27 | 2008-01-09 | 华为技术有限公司 | 一种数据格式的校验方法及装置 |
| CN101661391A (zh) * | 2009-09-24 | 2010-03-03 | 金蝶软件(中国)有限公司 | 一种对象序列化方法、对象反序列化方法、装置及系统 |
| CN101854371A (zh) * | 2009-03-31 | 2010-10-06 | 华为技术有限公司 | JavaScript对象的调用及处理的方法、装置 |
| CN101925895A (zh) * | 2007-12-13 | 2010-12-22 | 谷歌公司 | 用于高效传输数据的通用格式 |
| CN102053994A (zh) * | 2009-11-10 | 2011-05-11 | 阿里巴巴集团控股有限公司 | 一种语言解析器和应用该解析器的解析方法 |
| CN102207873A (zh) * | 2011-06-15 | 2011-10-05 | 中国联合网络通信集团有限公司 | 基于安卓平台的JavaScript扩展对象实现方法及绑定接口结构 |
| CN102479130A (zh) * | 2010-11-25 | 2012-05-30 | 上海宇芯科技有限公司 | 一种跨平台跨语言单芯片系统的验证方法 |
| CN102622448A (zh) * | 2012-03-26 | 2012-08-01 | 中山大学 | 一种数字电视互动应用页面标记语言解析方法 |
| CN102750268A (zh) * | 2012-06-19 | 2012-10-24 | 山东中创软件商用中间件股份有限公司 | 一种对象序列化方法、对象反序列化方法、装置及系统 |
| CN102981841A (zh) * | 2011-11-08 | 2013-03-20 | 微软公司 | 外部序列化和去序列化 |
| CN103064720A (zh) * | 2011-09-09 | 2013-04-24 | 微软公司 | 简档导向的jit代码生成 |
| CN103077185A (zh) * | 2012-12-18 | 2013-05-01 | 厦门雅迅网络股份有限公司 | 一种基于对象的自定义扩展信息的方法 |
| WO2013096887A1 (en) * | 2011-12-23 | 2013-06-27 | Amiato, Inc. | Scalable analysis platform for semi-structured data |
| CN103379127A (zh) * | 2012-04-12 | 2013-10-30 | 阿里巴巴集团控股有限公司 | 服务器与客户端间的数据交互方法及装置 |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8291230B2 (en) | 2009-01-20 | 2012-10-16 | International Business Machines Corporation | Method and system for signing JavaScript object notation (JSON) messages |
| US9461817B2 (en) * | 2009-01-20 | 2016-10-04 | International Business Machines Corporation | Method and system for encrypting JavaScript object notation (JSON) messages |
| WO2011035944A1 (en) * | 2009-09-25 | 2011-03-31 | International Business Machines Corporation | Managing application state information by means of a uniform resource identifier (uri) |
| JP5609309B2 (ja) * | 2010-06-24 | 2014-10-22 | 富士通株式会社 | データ提供方法、データ提供装置、データ提供プログラムおよびデータ提供システム |
| CN102508674A (zh) * | 2011-12-02 | 2012-06-20 | 方正国际软件有限公司 | 基于json进行对象化参数传递的方法及系统 |
| US9285826B2 (en) | 2011-12-22 | 2016-03-15 | Intel Corporation | Deterministic clock crossing |
| JP5662391B2 (ja) * | 2012-08-17 | 2015-01-28 | 株式会社東芝 | 情報操作装置、情報出力装置および情報処理方法 |
| CN102968307B (zh) * | 2012-11-29 | 2016-02-24 | 中国传媒大学 | 一种基于java的web开发中间件 |
| CN103235731A (zh) * | 2013-04-27 | 2013-08-07 | 四川长虹电器股份有限公司 | 存储应用程序的方法 |
| CN103401562B (zh) * | 2013-07-31 | 2016-07-06 | 北京华易互动科技有限公司 | 一种无损json数据压缩方法 |
-
2015
- 2015-01-30 US US14/611,080 patent/US9853956B2/en active Active
- 2015-02-11 JP JP2016551809A patent/JP6685230B2/ja active Active
- 2015-02-11 WO PCT/US2015/015515 patent/WO2015123366A2/en not_active Ceased
- 2015-02-11 EP EP15749251.3A patent/EP3105686B1/en active Active
- 2015-02-11 CN CN201580008241.3A patent/CN105993010B/zh active Active
-
2017
- 2017-11-27 US US15/822,455 patent/US10609009B2/en active Active
Patent Citations (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1552026A (zh) * | 2001-07-02 | 2004-12-01 | Bea系统公司 | 用于处理数据表示语言对象的编程语言扩展和相关应用 |
| CN101101602A (zh) * | 2007-07-27 | 2008-01-09 | 华为技术有限公司 | 一种数据格式的校验方法及装置 |
| CN101925895A (zh) * | 2007-12-13 | 2010-12-22 | 谷歌公司 | 用于高效传输数据的通用格式 |
| CN101854371A (zh) * | 2009-03-31 | 2010-10-06 | 华为技术有限公司 | JavaScript对象的调用及处理的方法、装置 |
| CN101661391A (zh) * | 2009-09-24 | 2010-03-03 | 金蝶软件(中国)有限公司 | 一种对象序列化方法、对象反序列化方法、装置及系统 |
| CN102053994A (zh) * | 2009-11-10 | 2011-05-11 | 阿里巴巴集团控股有限公司 | 一种语言解析器和应用该解析器的解析方法 |
| CN102479130A (zh) * | 2010-11-25 | 2012-05-30 | 上海宇芯科技有限公司 | 一种跨平台跨语言单芯片系统的验证方法 |
| CN102207873A (zh) * | 2011-06-15 | 2011-10-05 | 中国联合网络通信集团有限公司 | 基于安卓平台的JavaScript扩展对象实现方法及绑定接口结构 |
| CN103064720A (zh) * | 2011-09-09 | 2013-04-24 | 微软公司 | 简档导向的jit代码生成 |
| CN102981841A (zh) * | 2011-11-08 | 2013-03-20 | 微软公司 | 外部序列化和去序列化 |
| WO2013096887A1 (en) * | 2011-12-23 | 2013-06-27 | Amiato, Inc. | Scalable analysis platform for semi-structured data |
| CN102622448A (zh) * | 2012-03-26 | 2012-08-01 | 中山大学 | 一种数字电视互动应用页面标记语言解析方法 |
| CN103379127A (zh) * | 2012-04-12 | 2013-10-30 | 阿里巴巴集团控股有限公司 | 服务器与客户端间的数据交互方法及装置 |
| CN102750268A (zh) * | 2012-06-19 | 2012-10-24 | 山东中创软件商用中间件股份有限公司 | 一种对象序列化方法、对象反序列化方法、装置及系统 |
| CN103077185A (zh) * | 2012-12-18 | 2013-05-01 | 厦门雅迅网络股份有限公司 | 一种基于对象的自定义扩展信息的方法 |
Non-Patent Citations (1)
| Title |
|---|
| JSON Encryption;A. A. Abd El-Aziz等;《2014 International Conference on Computer Communication and Informatics》;20140103;第1-6页 * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2024248630A1 (en) * | 2023-05-30 | 2024-12-05 | Xero Limited | Systems, methods and computer readable media for comparing structured data |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2017511920A (ja) | 2017-04-27 |
| EP3105686A2 (en) | 2016-12-21 |
| US20180077129A1 (en) | 2018-03-15 |
| CN105993010A (zh) | 2016-10-05 |
| US20150229613A1 (en) | 2015-08-13 |
| EP3105686A4 (en) | 2017-08-16 |
| EP3105686B1 (en) | 2024-09-18 |
| US10609009B2 (en) | 2020-03-31 |
| US9853956B2 (en) | 2017-12-26 |
| WO2015123366A2 (en) | 2015-08-20 |
| JP6685230B2 (ja) | 2020-04-22 |
| WO2015123366A3 (en) | 2015-10-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN105993010B (zh) | 用以提供扩展对象符号数据的方法及设备 | |
| CN107391298B (zh) | 数据存储状态检测方法、装置及计算机可读存储介质 | |
| CN107786331B (zh) | 数据处理方法、装置、系统及计算机可读存储介质 | |
| CN109241484B (zh) | 一种基于加密技术的网页数据的发送方法及设备 | |
| JP6120961B2 (ja) | 特定フォーマットを有する代替データの生成および検証 | |
| CN112966227A (zh) | 代码加密解密方法和装置、存储介质 | |
| WO2020233047A1 (zh) | 页面测试的方法及装置 | |
| CN110858249A (zh) | 一种数据库文件加密方法、解密方法和相关装置 | |
| US20230144072A1 (en) | Data storage server and client devices for securely storing data | |
| CN107103211B (zh) | Sdk发送、应用发布、应用运行方法及装置 | |
| CN115982675A (zh) | 文档处理方法、装置、电子设备以及存储介质 | |
| CN103473104A (zh) | 一种基于关键词上下文频率矩阵的应用重打包辨别方法 | |
| CN110462620A (zh) | 分解敏感数据存储在不同应用环境中 | |
| US11232190B2 (en) | Device attestation techniques | |
| CN106780280A (zh) | 数字水印加密方法及装置 | |
| CN105574371A (zh) | 基于文本水印的安卓应用程序信息隐藏与软件保护方法 | |
| CN103561147A (zh) | 移动设备的通讯录更新方法和系统 | |
| CN105809494A (zh) | 发票生成及验证方法及系统 | |
| US8769290B1 (en) | Providing confidential structured data | |
| CN108512657B (zh) | 一种密码生成方法及装置 | |
| CN114385617A (zh) | 基于插件的数据清洗加密方法、装置、设备及介质 | |
| CN104102538A (zh) | 信息处理的方法及电子设备 | |
| CN106656496A (zh) | 一种数据加密方法及装置 | |
| US20210192048A1 (en) | Methods and apparatus to facilitate malware detection using compressed data | |
| CN102970145B (zh) | 一种签名方法及装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |