CN107548493B - 保护有向无环图 - Google Patents

保护有向无环图 Download PDF

Info

Publication number
CN107548493B
CN107548493B CN201580039467.XA CN201580039467A CN107548493B CN 107548493 B CN107548493 B CN 107548493B CN 201580039467 A CN201580039467 A CN 201580039467A CN 107548493 B CN107548493 B CN 107548493B
Authority
CN
China
Prior art keywords
node
dag
unique
key
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201580039467.XA
Other languages
English (en)
Chinese (zh)
Other versions
CN107548493A (zh
Inventor
J.格雷戈里
T.希尔
M.克莱因
D.C.劳伦斯
J.沃德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bitcasa Inc
Original Assignee
Bitcasa Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bitcasa Inc filed Critical Bitcasa Inc
Publication of CN107548493A publication Critical patent/CN107548493A/zh
Application granted granted Critical
Publication of CN107548493B publication Critical patent/CN107548493B/zh
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/14Handling requests for interconnection or transfer
    • G06F13/36Handling requests for interconnection or transfer for access to common bus or bus system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/14Handling requests for interconnection or transfer
    • G06F13/36Handling requests for interconnection or transfer for access to common bus or bus system
    • G06F13/368Handling requests for interconnection or transfer for access to common bus or bus system with decentralised access control
    • G06F13/37Handling requests for interconnection or transfer for access to common bus or bus system with decentralised access control using a physical-position-dependent priority, e.g. daisy chain, round robin or token passing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • G06F15/163Interprocessor communication
    • G06F15/173Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star, snowflake
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9024Graphs; Linked lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Mathematical Physics (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
CN201580039467.XA 2014-05-22 2015-05-22 保护有向无环图 Expired - Fee Related CN107548493B (zh)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201462002127P 2014-05-22 2014-05-22
US62/002127 2014-05-22
US14/719287 2015-05-21
US14/719,287 US10164774B2 (en) 2014-05-22 2015-05-21 Securing a directed acyclic graph
PCT/US2015/032288 WO2015179830A1 (en) 2014-05-22 2015-05-22 Securing a directed acyclic graph

Publications (2)

Publication Number Publication Date
CN107548493A CN107548493A (zh) 2018-01-05
CN107548493B true CN107548493B (zh) 2020-11-24

Family

ID=54554872

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580039467.XA Expired - Fee Related CN107548493B (zh) 2014-05-22 2015-05-22 保护有向无环图

Country Status (5)

Country Link
US (1) US10164774B2 (enExample)
EP (1) EP3146438B1 (enExample)
JP (1) JP6698078B2 (enExample)
CN (1) CN107548493B (enExample)
WO (1) WO2015179830A1 (enExample)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9479421B2 (en) * 2014-09-10 2016-10-25 Cisco Technology, Inc. Dynamic installation of local storing mode paths in a non-storing low-power and lossy network
US10698877B2 (en) * 2017-05-12 2020-06-30 Microsoft Technology Licensing, Llc High-performance naming service using an optimistic-concurrency-control in-memory database
US10713086B2 (en) 2018-09-04 2020-07-14 Zhongwei Wu Asynchronous directed acyclic map based distributed transaction network
CN109885259B (zh) * 2019-02-21 2022-05-06 缀初网络技术(上海)有限公司 基于有向无环图的轻量级容量证明方法及存储介质
US11397825B2 (en) 2019-08-09 2022-07-26 Kyndryl, Inc. Encrypted knowledge graph
US11169979B2 (en) * 2019-12-31 2021-11-09 Intuit, Inc. Database-documentation propagation via temporal log backtracking
CN112836078B (zh) * 2021-02-20 2021-10-22 山东省计算中心(国家超级计算济南中心) 一种图上最短路径安全查询方法、装置、系统及存储介质
US12026264B2 (en) 2021-07-17 2024-07-02 International Business Machines Corporation Secure query processing on graph stores
US12417233B2 (en) * 2021-11-30 2025-09-16 Intuit Inc. Multitenancy in extract, transform, load (ETL) pipeline orchestration tools
CN114491625A (zh) * 2022-01-05 2022-05-13 阿里云计算有限公司 数据处理方法、装置、设备和存储介质
CN115865953B (zh) * 2023-02-17 2023-05-16 广州合利宝支付科技有限公司 一种基于跨境支付的分布式存储系统
KR102840693B1 (ko) * 2023-04-17 2025-07-30 중앙대학교 산학협력단 스테가노그래피 방법 및 이를 수행하기 위한 컴퓨팅 장치
US12511392B1 (en) * 2025-08-29 2025-12-30 Halcyon Tech, Inc. Ransomware detection using cryptographic API call graph analysis

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06175905A (ja) * 1992-12-03 1994-06-24 Fujitsu Ltd 暗号化ファイル共有方法
SG77163A1 (en) 1998-03-06 2000-12-19 John Francis Chong A method of implementing an acyclic directed graph structure using a relational database
CA2369304A1 (en) * 2002-01-30 2003-07-30 Cloakware Corporation A protocol to hide cryptographic private keys
US8335915B2 (en) 2002-05-14 2012-12-18 Netapp, Inc. Encryption based security system for network storage
US7096216B2 (en) * 2002-07-20 2006-08-22 Microsoft Corporation Performing operations on a set of objects in a database system
US7593532B2 (en) 2004-04-22 2009-09-22 Netapp, Inc. Management of the retention and/or discarding of stored data
US7853018B2 (en) * 2005-11-10 2010-12-14 Atallah Mikhail J Method and apparatus for hiding a private key
US7895666B1 (en) 2006-09-01 2011-02-22 Hewlett-Packard Development Company, L.P. Data structure representation using hash-based directed acyclic graphs and related method
US8256010B2 (en) * 2009-04-01 2012-08-28 Microsoft Corporation Providing access to a data item using access graphs
US8363662B2 (en) 2010-03-19 2013-01-29 Cisco Technology, Inc. Alternate down paths for directed acyclic graph (DAG) routing
US8451744B2 (en) 2010-08-16 2013-05-28 Cisco Technology, Inc. Partitioning directed acyclic graph (DAG) topologies
GB2486462B (en) 2010-12-16 2019-04-24 Maidsafe Found Distributed file system
JP2012205088A (ja) * 2011-03-25 2012-10-22 Toshiba Corp ノード及びグループ鍵更新方法
TWI546695B (zh) * 2011-12-15 2016-08-21 萬國商業機器公司 刪除儲存系統中之內容

Also Published As

Publication number Publication date
JP6698078B2 (ja) 2020-05-27
EP3146438B1 (en) 2020-10-14
EP3146438A1 (en) 2017-03-29
US20150341167A1 (en) 2015-11-26
US10164774B2 (en) 2018-12-25
EP3146438A4 (en) 2017-12-20
WO2015179830A1 (en) 2015-11-26
JP2017517773A (ja) 2017-06-29
CN107548493A (zh) 2018-01-05

Similar Documents

Publication Publication Date Title
CN107548493B (zh) 保护有向无环图
US11044088B2 (en) System and method for rotating client security keys
US12199988B2 (en) Proxy authorization of a network device
JP6795684B2 (ja) マルウェア検出及びコンテンツアイテムの復元
CN106462718B (zh) 存储设备的快速数据保护
EP2831803B1 (en) Systems and methods for secure third-party data storage
US9779269B1 (en) Storage system comprising per-tenant encryption keys supporting deduplication across multiple tenants
CN105765944B (zh) 第三方批处理授权重复访问资源的请求的方法及系统
US9384359B2 (en) Information firewall
EP4073673B1 (en) Encrypted search with a public key
CN107735807A (zh) 被撤销数据的智能删除
CN107113164B (zh) 加密数据的重复删除的方法、装置和计算机可读介质
JP2022544484A (ja) 暗号化されたナレッジ・グラフ
CN105493436B (zh) 用于向授权用户分发内容项目的方法、内容拥有者设备
WO2016018298A1 (en) Key search token for encrypted data
EP2429146A1 (en) Method and apparatus for authenticating access by a service
CN111291414A (zh) 数据存储方法及装置、计算机装置及存储介质
WO2021228230A1 (zh) 一种基于安全执行环境的数据验证方法及装置
CN113761585B (zh) 一种数据处理方法、装置和系统
CN108632023A (zh) 一种支持非单调访问结构的密文长度固定的属性基可搜索加密方法
HK40093113B (zh) 可信数据处理方法及相关装置
HK40093113A (zh) 可信数据处理方法及相关装置

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201124