CN106973044A - A kind of recognition methods for realizing data owner in big data transaction - Google Patents

A kind of recognition methods for realizing data owner in big data transaction Download PDF

Info

Publication number
CN106973044A
CN106973044A CN201710154307.0A CN201710154307A CN106973044A CN 106973044 A CN106973044 A CN 106973044A CN 201710154307 A CN201710154307 A CN 201710154307A CN 106973044 A CN106973044 A CN 106973044A
Authority
CN
China
Prior art keywords
data
modules
key
plaintext
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710154307.0A
Other languages
Chinese (zh)
Other versions
CN106973044B (en
Inventor
吴鸿钟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Bite Xin'an Technology Co Ltd
Original Assignee
Chengdu Bite Xin'an Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Bite Xin'an Technology Co Ltd filed Critical Chengdu Bite Xin'an Technology Co Ltd
Priority to CN201710154307.0A priority Critical patent/CN106973044B/en
Publication of CN106973044A publication Critical patent/CN106973044A/en
Application granted granted Critical
Publication of CN106973044B publication Critical patent/CN106973044B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Abstract

The invention discloses a kind of recognition methods for realizing data owner in big data transaction; include the target data plaintext X1 in the initial data plaintext X encrypted will be needed to handle by FPE protections including data encryption step S100, obtain the target data ciphertext Y1 of same format length;Data authentication step S200 includes verifying target data plaintext X1 using HASH algorithms by algorithm management AM modules, obtains target data plaintext X1 authenticity information and target data plaintext X1 owner's information;Data decryption step S300 includes target data ciphertext Y1 obtaining target data plaintext X1 and initial data plaintext X by FPE decryption.The present invention can be encrypted protection to data by FPE encryption technologies and select AS modules to handle data according to specific encryption or decipherment algorithm by AES; and record the corresponding informance related to owner in initial data; form watermark; prevent that data from illegally being distorted, judge the authenticity and validity of data.

Description

A kind of recognition methods for realizing data owner in big data transaction
Technical field
The present invention relates to big data discriminating conduct field, more particularly to data encryption recognition methods field, specifically, it is A kind of recognition methods for realizing data owner in big data transaction.
Background technology
Today's society has completely passed into the information age, and by computer and internet, people can be according to big data Analysis obtains many unknown information, for the foundation for building, opening up and developing the science of offer of every field and direction, to things Carry out Scientific evaluation etc..Meanwhile, it is also the credit epoch now, the personal credit information of people is related to the method face face of life, It is formal that there is very high commercial value due to the personal information under big data, while life is convenient for people to, also occur in that Some bad social phenomenons, for example:Financial swindling, telephone fraud, personal information forgery etc..
In order to ensure the authenticity and validity of information, data can be encrypted with place generally during the circulation of data Reason, prevent data because be tampered with, increase illegal fragment or by extracts important information after cause the distortion of data, still, Existing encryption gimmick if it can prevent that information from not known the third party of password distorts, and can not prevent and shut out Whether exhausted information, which is had permission the people that checks, carries out carrying out circulation again after malicious modification.In order to avoid information is in circulation process In there arises a problem that:
A, buyer, which may change hands the data obtained from big data seller, to be sold to third party and is made a profit;
The fragment bought in data may be won out for other purposes by B, buyer;
C, buyer may forge or insert new data change hands be sold to again third party profit.
Data are effectively differentiated, know information whether by by processing and distorting meaning very great.
The current general way of industry is that a part of data are made into some slight changes, such as uses the message registration of user The excel softwares of Microsoft make some trickle adjustment(The data for being sold to party A-subscriber are the air time to be pushed away forward 0.01 second, are sold to B The data of user are the air time to be pushed away forward 0.02 second, so contrast the data after processing and initial data, can just judge The owner of the data belongs to A or B)Although this method is simple, once rule is leaked out, either party may be used To revert to initial data with opposite method, so as to change hands use or merchandise, and then it can not judge that data are A or B on earth Leak out.
Moreover, this straightforward procedure can not solve data integrity issues at present, that is to say, that can only at most solve A class wind Danger, it is impossible to solve B/C class risks.
The present invention solves the problem using a kind of special mechanism, and this technology can solve A/B/C class risks simultaneously.
The content of the invention
It is an object of the invention to provide a kind of recognition methods for realizing data owner in big data transaction, for solving the back of the body The three class problems that data described in scape technology easily occur during circulation.The present invention is by data encryption-checking-solution Close processing, can effectively judge authenticity, the integrality of data, at the same can or data original owner's information, to obtain Know the primary source of information;It is not only able to prevent the third party without authority from carrying out malice to data message and distorting or usurp, It can also effectively prevent the user with authority from carrying out usurping, change and selling off for malice to data message simultaneously.
The present invention is achieved through the following technical solutions:
A kind of recognition methods for realizing data owner in big data transaction, including the data encryption step carried out by Encryption Model S100, data authentication step S200 and data decryption step S300, the Encryption Model is by the mould for determining master key MK Type initializes INIT modules, the algorithm management AM modules for adding/deleting and updating algorithm set EAS, for according to data Feature selects appropriate AES ALG AES to select AS modules, key to disperse KD modules and guarantor in algorithm set EAS Form is stayed to encrypt FPE modules composition, the data encryption step S100 is included the mesh in the initial data plaintext X for needing encryption Mark data clear text X1 is handled by FPE protections, obtains the target data ciphertext Y1 of same format length;The data authentication step S200 includes verifying target data plaintext X1 using HASH algorithms by algorithm management AM modules, obtains target data bright Owner's information of literary X1 authenticity information and target data plaintext X1;The data decryption step S300 is included number of targets Target data plaintext X1 and initial data plaintext X is obtained by FPE decryption according to ciphertext Y1.
In order to preferably realize the present invention, it is preferable that the data encryption step S100 specifically also includes:
S110 selects AS according to the target data plaintext X1 of input type type and format character feature using AES Module selects appropriate AES ALG in form encryption FPE modular algorithm set EAS is retained;
S120 passes through model initialization INIT modules profit according to target data plaintext X1 format character and algorithm ALG feature With the scattered generation encryption key key of master key MK;
Target data plaintext X1 is encrypted using AES Enc and encryption key key by S130, generation correspondence ciphertext Y1.
In order to preferably realize the present invention, it is preferable that the data authentication step S200 specifically also includes complete to data The verification step of property:
S210 randomly selects N number of data cell using AES selection AS modules in target data X1;
S211 calculates the HASH of this N number of data cell using algorithm management AM modules, and fixed and justice is A-HASH;
S212 selects to randomly select corresponding N in step S210 in the target data X2 of AS modules after a transaction using AES Individual data cell;
S213 utilizes the HASH of N number of data cell in algorithm management AM module calculation procedures S230, and fixed and justice is B-HASH;
S214 judges whether A-HASH=B-HASH is equal, obtains data and truly verifies.
In order to preferably realize the present invention, it is preferable that the data authentication step S200 specifically also includes complete to file The verification step of property:
S220 randomly selects N number of data cell using AES selection AS modules in target data X1;
S221 calculates the HASH of this N number of data cell using algorithm management AM modules, and fixed and justice is A-HASH;
S222 selects to randomly select correspondence in step S210 in the target data X2 of AS modules after a transaction using AES N number of data cell;
S223 utilizes the HASH of N number of data cell in algorithm management AM module calculation procedures S230, and fixed and justice is B-HASH;
S224 judges whether A-HASH=B-HASH is equal, obtains data and truly verifies.
In order to preferably realize the present invention, it is preferable that the data decryption step S300 specifically also includes:
S310 inputs need the ciphertext Y1 decrypted type type and format character feature to select AS modules using AES Appropriate decipherment algorithm ALG is selected in FPE set of algorithms EAS;
S311 passes through model initialization according to ciphertext Y1 type type and format character feature and algorithm ALG feature INIT modules utilize the scattered generation decruption key key of master key MK;
Ciphertext Y1 is decrypted using decipherment algorithm and decruption key key by S312, generation correspondence target data plaintext X1.
In order to preferably realize the present invention, it is preferable that the data authentication step S200 specifically also includes to data owner Checking and rendering step:
S230 data owner's verification steps are specially:Decruption key key is inputted, selects AS modules to judge that decryption is close by AES Key key correctness;
S231 encryption keys key is correct decryption FPE, and target data plaintext X1 and owner's information is presented;
S232 encryption keys key is mistake decryption FPE, and mess code and alarm is presented.
The present invention compared with prior art, with advantages below and beneficial effect:
(1)The present invention can be encrypted protection to data by FPE encryption technologies and select AS modules will by AES Data are handled according to specific encryption or decipherment algorithm, and the corresponding informance related to owner is recorded in initial data In, watermark is formed, prevents that data from illegally being distorted, meanwhile, it is easy to the identification of data, judges the authenticity and validity of data.
(2)The present invention can determine master key MK by INIT modules, and generated and deposited safely at random according to security parameter Storage, during the wrong cipher key used when data deciphering, data will be shown in mess code mode and wrong data information is recorded into number In, when inputting correct key, data can normally show and while owner's information be shown, for data owner grasp data Circulation record, checking data whether be tampered or called.
Brief description of the drawings
Fig. 1 is EAS tree structures;
Fig. 2 is the EAS structures described in embodiment 1;
Fig. 3 is EAS index informations;
Fig. 4 is AlgSelect algorithm schematic diagrames;
Fig. 5 is the module calling figure of ciphering process;
Fig. 6 is the flow chart of ciphering process;
Fig. 7 is owner's Information Authentication flow chart.
Embodiment
The present invention is described in further detail with reference to the preferred embodiments of the present invention, but the embodiment party of the present invention Formula not limited to this.
Before being illustrated to embodiments of the invention, the related terms being related in the present invention are carried out first as follows Explain:
Model initialization module(Initialization, INIT):INIT modules determine Encryption Model master key MK, and MK is according to peace Population parameter is generated and stored safely at random, what deserves to be explained is, if encrypted using network transmission, sender and recipient are common With storage MK.
Algorithm management module(Algorithm Management, AM):AM modules include FPE set of algorithms(Encryption Algorithm Set, EAS), and with addition, deletion and more new algorithm scheduling algorithm management function.
AES selecting module(Algorithm Selection, AS):AS modules are according to data type type and form Binding characteristic feature, selects appropriate reservation form AES ALG, ALG to include in the FPE algorithm sets EAS of model AES Enc and decipherment algorithm Dec.
Key dispersed modules(Key Diversify, KD):KD modules are according to lattice such as data type type, length length The corresponding reservation format algorithms ALG selected in formula feature, and AS modules feature, has the scattered generations of master key MK to retain form Cryptographic work key.Its A Hong factor is dispersion factor, is mainly made up of data format feature and FPE algorithm characteristics.
Preferred embodiment 1:
A kind of recognition methods for realizing data owner in big data transaction, with reference to shown in accompanying drawing 1-7, specifically, including by adding Data encryption step S100, data authentication step S200 and data decryption step S300 that close model is carried out, the encryption mould Type is by the model initialization INIT modules for determining master key MK, the algorithm for adding/deleting and updating algorithm set EAS Management AM modules, the AES selection AS for selecting appropriate AES ALG in algorithm set EAS according to data characteristics Module, key disperse KD modules and reservation form encryption FPE module compositions, and the data encryption step S100 includes to need to add Target data plaintext X1 in close initial data plaintext X is handled by FPE protections, obtains the target data of same format length Ciphertext Y1;The data authentication step S200 is included by algorithm management AM modules using HASH algorithms to target data plaintext X1 Verified, obtain target data plaintext X1 authenticity information and target data plaintext X1 owner's information;The data Decryption step S300 includes target data ciphertext Y1 obtaining target data plaintext X1 and initial data plaintext X by FPE decryption.
In order to preferably realize the present invention, it is preferable that the data encryption step S100 specifically also includes:
S110 selects AS according to the target data plaintext X1 of input type type and format character feature using AES Module selects appropriate AES ALG in form encryption FPE modular algorithm set EAS is retained;
In this step, FPE algorithm sets EAS is subjected to tissue with tree structure in AM modules, as shown in figure 1, making root node For first layer, FPE algorithms are divided into accumulation by the second layer according to data type, and third layer is on the basis of the second layer according to the type The format constraints feature such as data length, scope do specific FPE algorithms of all circles' point correspondence in further division, third layer ALEij
Specifically, TYPE0 is character type string, contains three FPE algorithms, ALG00:FFX,ALG01:BPS,ALG02: RtE.TYPE1 is integer integer, contains two FPE algorithms, ALG10:Prefix, ALG11:FFSEM, as shown in Figure 2.
What deserves to be explained is, the appropriate AES ALG of selection mode can be realized in the following way, but not Being confined to the present embodiment, this is a kind of.
Algorithms selection modules A S is selected suitably according to data type type and form binding characteristic feature in EAS FPE algorithms ALG(Enc, Dec)←AlgSelect(EAS, type, feature), wherein Enc is AES, and Dec is correspondence Decipherment algorithm, either encryption or decrypt, the data selection identical FPE algorithms of same type and feature.AlgSelect Algorithm is shown as shown in Figure 4.
First, according to data type type, indexed file and index in Selecting Index number, that is, determine tree structure In the 2nd node layer in position i, then, entered according to other features such as data length, scope feature in secondary index Row positioning call number, that is, determine that next layer of node i determines position j, the FPEA of the third layer node navigated in tree structure Algorithm ALGij
S120 passes through model initialization INIT moulds according to target data plaintext X1 format character and algorithm ALG feature Block utilizes the scattered generation encryption key key of master key MK;
Described key MK is scattered to generate encryption key key in the present embodiment, is specially:Key is scattered refer to it is high level close Key combines the identifier feature of low one-level(Dispersion factor)The process of the key of low one-level is derived by decentralized algorithm.Using close Key decentralized algorithm generation working key key ← KeyDiversify(MK, factor, E(.)), wherein MK is master key, factor For dispersion factor, key is working key.For being encrypted or decrypting to data every time, according to input data feature and choosing The algorithm characteristics selected constitute dispersion factor, have master key MK to utilize E(.)Scattered generation working key key, it is then close using work Key is encrypted or decrypted to data;Wherein, the data characteristics includes data type and data length;The algorithm characteristics For index information.
Target data plaintext X1 is encrypted using AES Enc and encryption key key by S130, generation correspondence ciphertext Y1。
In order to preferably realize the present invention, it is preferable that the data authentication step S200 specifically also includes complete to data The verification step of property:
S210 randomly selects N number of data cell using AES selection AS modules in target data X1;
S211 calculates the HASH of this N number of data cell using algorithm management AM modules, and fixed and justice is A-HASH;
S212 selects to randomly select corresponding N in step S210 in the target data X2 of AS modules after a transaction using AES Individual data cell;
S213 utilizes the HASH of N number of data cell in algorithm management AM module calculation procedures S230, and fixed and justice is B-HASH;
S214 judges whether A-HASH=B-HASH is equal, obtains data and truly verifies.
What deserves to be explained is, HASH algorithms are a kind of existing algorithms, and " hash " is done in general translation, also have the direct transliteration to be " Hash ", be exactly the input random length(It is called and does preliminary mapping, pre-image), by hashing algorithm, it is transformed into solid The output of measured length, the output is exactly hashed value.This conversion is a kind of compression mapping, it is, the space of hashed value is usual Much smaller than the space of input, different inputs may hash to identical output, it is impossible to come unique from hashed value Determine input value.It is exactly briefly a kind of letter of eap-message digest of message compression by random length to a certain regular length Number.The present embodiment is the one of unit for the technological means for solving the problems, such as use just with HASH algorithms, and utilizes Above-mentioned calculation verifies data, and accordingly, with respect to HASH computational methods, just it is no longer repeated in the present embodiment.
Preferred embodiment 2:
In order to preferably realize the present invention, it is preferable that the data authentication step S200 specifically also includes to file integrality Verification step:
S220 randomly selects N number of data cell using AES selection AS modules in target data X1;
S221 calculates the HASH of this N number of data cell using algorithm management AM modules, and fixed and justice is A-HASH;
S222 selects to randomly select correspondence in step S210 in the target data X2 of AS modules after a transaction using AES N number of data cell;
S223 utilizes the HASH of N number of data cell in algorithm management AM module calculation procedures S230, and fixed and justice is B-HASH;
S224 judges whether A-HASH=B-HASH is equal, obtains data and truly verifies.
In order to preferably realize the present invention, it is preferable that the data decryption step S300 specifically also includes:
S310 inputs need the ciphertext Y1 decrypted type type and format character feature to select AS modules using AES Appropriate decipherment algorithm ALG is selected in FPE set of algorithms EAS;
S311 passes through model initialization according to ciphertext Y1 type type and format character feature and algorithm ALG feature INIT modules utilize the scattered generation decruption key key of master key MK;
Ciphertext Y1 is decrypted using decipherment algorithm and decruption key key by S312, generation correspondence target data plaintext X1.
In order to preferably realize the present invention, it is preferable that the data authentication step S200 specifically also includes to data owner Checking and rendering step:
S230 data owner's verification steps are specially:Decruption key key is inputted, selects AS modules to judge that decryption is close by AES Key key correctness;
S231 encryption keys key is correct decryption FPE, and target data plaintext X1 and owner's information is presented;
S232 encryption keys key is mistake decryption FPE, and mess code and alarm is presented.
It is described above, be only presently preferred embodiments of the present invention, any formal limitation not done to the present invention, it is every according to According to the present invention technical spirit above example is made any simple modification, equivalent variations, each fall within the present invention protection Within the scope of.

Claims (6)

1. a kind of recognition methods for realizing data owner in big data transaction, including the data encryption carried out by Encryption Model are walked Rapid S100, data authentication step S200 and data decryption step S300, it is characterised in that:The Encryption Model is by for determining Master key MK model initialization INIT modules, the algorithm management AM modules for adding/deleting and updating algorithm set EAS, For being selected appropriate AES ALG AES to select AS modules, key point in algorithm set EAS according to data characteristics KD modules and reservation form encryption FPE module compositions are dissipated, the data encryption step S100 includes that the original number of encryption will be needed Handled according to the target data plaintext X1 in plaintext X by FPE protections, obtain the target data ciphertext Y1 of same format length;Institute Stating data authentication step S200 includes verifying target data plaintext X1 using HASH algorithms by algorithm management AM modules, Obtain target data plaintext X1 authenticity information and target data plaintext X1 owner's information;The data decryption step S300 includes target data ciphertext Y1 obtaining target data plaintext X1 and initial data plaintext X by FPE decryption.
2. a kind of recognition methods for realizing data owner in big data transaction according to claim 1, it is characterised in that institute Stating data encryption step S100 specifically also includes:
S110 selects AS according to the target data plaintext X1 of input type type and format character feature using AES Module selects appropriate AES ALG in form encryption FPE modular algorithm set EAS is retained;
S120 passes through model initialization INIT modules profit according to target data plaintext X1 format character and algorithm ALG feature With the scattered generation encryption key key of master key MK;
Target data plaintext X1 is encrypted using AES Enc and encryption key key by S130, generation correspondence ciphertext Y1.
3. a kind of recognition methods for realizing data owner in big data transaction according to claim 1 or 2, its feature exists In the data authentication step S200 specifically also includes the verification step to data integrity:
S210 randomly selects N number of data cell using AES selection AS modules in target data X1;
S211 calculates the HASH of this N number of data cell using algorithm management AM modules, and fixed and justice is A-HASH;
S212 selects to randomly select corresponding N in step S210 in the target data X2 of AS modules after a transaction using AES Individual data cell;
S213 utilizes the HASH of N number of data cell in algorithm management AM module calculation procedures S230, and fixed and justice is B-HASH;
S214 judges whether A-HASH=B-HASH is equal, obtains data and truly verifies.
4. a kind of recognition methods for realizing data owner in big data transaction according to claim 3, it is characterised in that institute Stating data authentication step S200 specifically also includes the verification step to file integrality:
S220 randomly selects N number of data cell using AES selection AS modules in target data X1;
S221 calculates the HASH of this N number of data cell using algorithm management AM modules, and fixed and justice is A-HASH;
S222 selects to randomly select correspondence in step S210 in the target data X2 of AS modules after a transaction using AES N number of data cell;
S223 utilizes the HASH of N number of data cell in algorithm management AM module calculation procedures S230, and fixed and justice is B-HASH;
S224 judges whether A-HASH=B-HASH is equal, obtains data and truly verifies.
5. a kind of recognition methods for realizing data owner in big data transaction according to claim 1 or 2 or 4, its feature It is, the data decryption step S300 specifically also includes:
S310 inputs need the ciphertext Y1 decrypted type type and format character feature to select AS modules using AES Appropriate decipherment algorithm ALG is selected in FPE set of algorithms EAS;
S311 passes through model initialization according to ciphertext Y1 type type and format character feature and algorithm ALG feature INIT modules utilize the scattered generation decruption key key of master key MK;
Ciphertext Y1 is decrypted using decipherment algorithm and decruption key key by S312, generation correspondence target data plaintext X1.
6. a kind of recognition methods for realizing data owner in big data transaction according to claim 5, it is characterised in that institute Stating data authentication step S200 specifically also includes the checking to data owner and rendering step:
S230 data owner's verification steps are specially:Decruption key key is inputted, selects AS modules to judge that decryption is close by AES Key key correctness;
S231 encryption keys key is correct decryption FPE, and target data plaintext X1 and owner's information is presented;
S232 encryption keys key is mistake decryption FPE, and mess code and alarm is presented.
CN201710154307.0A 2017-03-15 2017-03-15 Method for identifying data owner in big data transaction Active CN106973044B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710154307.0A CN106973044B (en) 2017-03-15 2017-03-15 Method for identifying data owner in big data transaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710154307.0A CN106973044B (en) 2017-03-15 2017-03-15 Method for identifying data owner in big data transaction

Publications (2)

Publication Number Publication Date
CN106973044A true CN106973044A (en) 2017-07-21
CN106973044B CN106973044B (en) 2020-09-18

Family

ID=59330178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710154307.0A Active CN106973044B (en) 2017-03-15 2017-03-15 Method for identifying data owner in big data transaction

Country Status (1)

Country Link
CN (1) CN106973044B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197857A (en) * 2007-12-26 2008-06-11 腾讯科技(深圳)有限公司 Document downloading method and device
CN101217728A (en) * 2007-12-29 2008-07-09 北京握奇数据系统有限公司 A blank card for wireless card writing, wireless card writing server and wireless card writing method
CN101393590A (en) * 2008-10-17 2009-03-25 南京邮电大学 Method for making four corner number digital watermarking
CN101404055A (en) * 2008-11-13 2009-04-08 上海维播信息技术有限公司 Media contents copyright protection method
US20140281570A1 (en) * 2013-03-13 2014-09-18 Kabushiki Kaisha Toshiba Method of performing an authentication process between data recording device and host device
CN104363091A (en) * 2014-12-01 2015-02-18 国家计算机网络与信息安全管理中心 Encryption and decryption method capable of automatically retrieving keys and selecting algorithms

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197857A (en) * 2007-12-26 2008-06-11 腾讯科技(深圳)有限公司 Document downloading method and device
CN101217728A (en) * 2007-12-29 2008-07-09 北京握奇数据系统有限公司 A blank card for wireless card writing, wireless card writing server and wireless card writing method
CN101393590A (en) * 2008-10-17 2009-03-25 南京邮电大学 Method for making four corner number digital watermarking
CN101404055A (en) * 2008-11-13 2009-04-08 上海维播信息技术有限公司 Media contents copyright protection method
US20140281570A1 (en) * 2013-03-13 2014-09-18 Kabushiki Kaisha Toshiba Method of performing an authentication process between data recording device and host device
CN104363091A (en) * 2014-12-01 2015-02-18 国家计算机网络与信息安全管理中心 Encryption and decryption method capable of automatically retrieving keys and selecting algorithms

Also Published As

Publication number Publication date
CN106973044B (en) 2020-09-18

Similar Documents

Publication Publication Date Title
AU601935B2 (en) Public key/signature cryptosystem with enhanced digital signature certification
CN109889504B (en) Decentralized data access right transaction method and system
Mironov Hash functions: Theory, attacks, and applications
CN110933045A (en) Block chain digital asset privacy protection method based on commitment
EP0386867A2 (en) Improved public key/signature cryptosystem with enhanced digital signature certification
CN108768652A (en) It is a kind of can the attack of anti-quantum alliance's block chain bottom encryption method
JP2007282295A (en) Cryptographic system and method with key escrow feature
CN111859446A (en) Agricultural product traceability information sharing-privacy protection method and system
CN110955918A (en) Contract text protection method based on RSA encrypted sha-256 digital signature
CN115242553B (en) Data exchange method and system supporting safe multi-party calculation
CN104092686A (en) Privacy protection and data safety access method based on SVW classifier
CN107690079A (en) Privacy of user guard method in live platform
CN110321734A (en) A kind of file verification method and device
CN113079177B (en) Remote sensing data sharing method based on time and decryption frequency limitation
CN113761578A (en) Document true checking method based on block chain
Sivasundari et al. RETRACTED ARTICLE: Hybrid aggregated signcryption scheme using multi-constraints differential evolution algorithm for security
CN117155549A (en) Key distribution method, key distribution device, computer equipment and storage medium
CN115051849B (en) Digital judicial evidence-storing method, evidence-storing device and readable storage medium
KR20120069387A (en) A method for searching keyword based on public key
CN106973044A (en) A kind of recognition methods for realizing data owner in big data transaction
CN110445756B (en) Method for realizing searchable encryption audit logs in cloud storage
CN113570371A (en) Credible electric power transaction clearing method and system based on cryptographic technology
Libed et al. Enhancing MD5 Collision Susceptibility
CN109145642B (en) Data storage method, terminal and database based on CPK digital seal
CN104135470A (en) A method and system for verifying storage integrity of target data

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant