CN109510702A - A method of it key storage based on computer characteristic code and uses - Google Patents

A method of it key storage based on computer characteristic code and uses Download PDF

Info

Publication number
CN109510702A
CN109510702A CN201811262236.7A CN201811262236A CN109510702A CN 109510702 A CN109510702 A CN 109510702A CN 201811262236 A CN201811262236 A CN 201811262236A CN 109510702 A CN109510702 A CN 109510702A
Authority
CN
China
Prior art keywords
key
characteristic code
computer characteristic
clear text
application software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811262236.7A
Other languages
Chinese (zh)
Other versions
CN109510702B (en
Inventor
姚瑞祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Fork Mobile Communication Technology Co Ltd
Original Assignee
Fujian Fork Mobile Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Fork Mobile Communication Technology Co Ltd filed Critical Fujian Fork Mobile Communication Technology Co Ltd
Priority to CN201811262236.7A priority Critical patent/CN109510702B/en
Publication of CN109510702A publication Critical patent/CN109510702A/en
Application granted granted Critical
Publication of CN109510702B publication Critical patent/CN109510702B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of key storage based on computer characteristic code and the methods used, and ciphering process uses the clear text key based on computer characteristic code encryption, and generates cryptograph files and stored;Decrypting process decrypts cryptograph files by agency or system hook technology when application software initiated and obtains clear text key, and clear text key is arranged into application software running environment, uses for application software.The present invention utmostly can prevent Key Exposure from sensitive information being caused to be stolen.

Description

A method of it key storage based on computer characteristic code and uses
Technical field
The present invention relates to application software system development field, especially a kind of key storage based on computer characteristic code and The method used.
Background technique
Under current network environment, information security accident emerges one after another, and information security system is to guarantee sensitivity in application system The key of information security.Most of application software systems all can protect user information safety using encryption and decryption mechanism.But it is No matter system requires key participate in encryption process using symmetrical or asymmetric encryption and decryption mode.Therefore, the guarantor of software systems Close property finally depends primarily on the safety of key, the safe keeping and the use of key is one on open computer network Very severe problem.
Existing common technique scheme includes:
1, in a program, key (plaintext) is directly programmed in program code for key hard coded, is made by the access of system constant Use key.
2, cipher key configuration is in system configuration file, by key (plaintext) configuration in system configuration file, program code Key is obtained by access system configuration file and is used.
3, key is saved in database, and key (plaintext) is saved in database, and program code passes through access data Library obtains key and uses.
4, encryption process is encapsulated into hardware by hardware enciphering and deciphering, and software is realized by the interface for calling hardware to provide Encryption and decryption functions.
Key is stored in code, configuration file or database by existing technical solution in the form of plaintext mostly. These technical solutions can not effectively prevent code decompiling, system personnel leakage configuration file, database from being dragged the situations such as library, nothing Method is really achieved the requirement of secure storage clear text key, and then directly affects system security.
Using hardware cipher mode, though it can effective lifting system confidentiality.But there is also at high cost, exploitation and using not There is a series of problems, such as compatibility in convenient, system.
Summary of the invention
In view of this, the purpose of the present invention is to propose to a kind of key storage based on computer characteristic code and the sides used Method utmostly can prevent Key Exposure from sensitive information being caused to be stolen.
The present invention is realized using following scheme: a method of it key storage based on computer characteristic code and uses, adds Close process uses the clear text key based on computer characteristic code encryption, and generates cryptograph files and stored;Decrypting process passes through Agency or system hook technology decrypt cryptograph files when application software initiated and obtain clear text key, and clear text key is arranged Into application software running environment, used for application software.
Further, the ciphering process specifically includes the following steps:
Step S11: exploitation key encrypts executable program, and the input parameter of executable program is the to be added of key administrator's input Close clear text key;
Step S12: key encrypts executable program dynamic acquisition computer characteristic code;
Step S13: the computer characteristic code that step S12 is got is as the key of symmetric encipherment algorithm (AES), to key pipe The clear text key of reason person's input carries out symmetric cryptography, and is encoded using BASE64 to ciphertext, obtains ciphertext character string;
Step S14: the ciphertext character string after step S13 coding is saved as into local file, file designation enc.fn.
Further, in step S12, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5 MAC Address of Network Card)+MD5 (current system user mark)).
Further, in step S13, the acquisition of the ciphertext character string uses following formula:
Ciphertext=BASE64_ENC (AES_ENC (computer characteristic code, the clear text key of Key manager's input)).
Further, the decrypting process specifically includes the following steps:
Step S21: decryption program entrance is injected into application software system starting by exploitation key decryption program (dynamic link library) In process (java agent can be used in java platform, and hook technology can be used in net platform);
Step S22: key decryption program dynamic acquisition computer characteristic code;
Step S23: the enc.fn file under locally specified catalogue is read;
Step S24: the computer characteristic code that step S22 is got is as the key of symmetric encipherment algorithm (AES), to step The file content that S23 is read carries out BASE64 decoding and decrypts, and obtains clear text key;
Step S25: the clear text key that step S24 is got is arranged into the running environment of application software system;
Step S26: application software system can obtain key enforcement of going forward side by side by the running environment variable of access system and use.
Further, in step S22, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5 MAC Address of Network Card)+MD5 (current system user mark)).
Further, in step S24, the acquisition of clear text key uses following formula:
Clear text key=AES_DEC (computer characteristic code, BASE64_DEC (enc.fn file content)).
Compared with prior art, the invention has the following beneficial effects:
1, not stored in clear key in application system of the invention, is obtained by technological means real time decrypting when the application system starts up To key and it is arranged into application process (only application system memory is visible), has utmostly ensured the risk that key is leaked.
2, key cryptograph files of the invention are associated with " one yard of a machine " with machine code, can not cryptograph files are stolen It is decrypted on other machines.
3, the present invention takes into account the problems such as use cost, exploitation convenience, system compatibility, is convenient for application and promotion.
Detailed description of the invention
Fig. 1 is the ciphering process flow diagram of the embodiment of the present invention.
Fig. 2 is the decrypting process flow diagram of the embodiment of the present invention.
Specific embodiment
The present invention will be further described with reference to the accompanying drawings and embodiments.
It is noted that described further below be all exemplary, it is intended to provide further instruction to the application.Unless another It indicates, all technical and scientific terms used herein has usual with the application person of an ordinary skill in the technical field The identical meanings of understanding.
It should be noted that term used herein above is merely to describe specific embodiment, and be not intended to restricted root According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singular Also it is intended to include plural form, additionally, it should be understood that, when in the present specification using term "comprising" and/or " packet Include " when, indicate existing characteristics, step, operation, device, component and/or their combination.
A kind of method for present embodiments providing the key storage based on computer characteristic code and using, ciphering process use Based on the clear text key of computer characteristic code encryption, and generates cryptograph files and stored;Decrypting process is by agency or is System hook technology decrypts cryptograph files when application software initiated and obtains clear text key, and clear text key is arranged to application software In running environment, used for application software.
In the present embodiment, the ciphering process specifically includes the following steps:
Step S11: exploitation key encrypts executable program, and the input parameter of executable program is the to be added of key administrator's input Close clear text key;
Step S12: key encrypts executable program dynamic acquisition computer characteristic code;
Step S13: the computer characteristic code that step S12 is got is as the key of symmetric encipherment algorithm (AES), to key pipe The clear text key of reason person's input carries out symmetric cryptography, and is encoded using BASE64 to ciphertext, obtains ciphertext character string;
Step S14: the ciphertext character string after step S13 coding is saved as into local file, file designation enc.fn.
In the present embodiment, in step S12, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5 MAC Address of Network Card)+MD5 (current system user mark)).
In the present embodiment, in step S13, the acquisition of the ciphertext character string uses following formula:
Ciphertext=BASE64_ENC (AES_ENC (computer characteristic code, the clear text key of Key manager's input)).
In the present embodiment, the decrypting process specifically includes the following steps:
Step S21: decryption program entrance is injected into application software system starting by exploitation key decryption program (dynamic link library) In process (java agent can be used in java platform, and hook technology can be used in net platform);
Step S22: key decryption program dynamic acquisition computer characteristic code;
Step S23: the enc.fn file under locally specified catalogue is read;
Step S24: the computer characteristic code that step S22 is got is as the key of symmetric encipherment algorithm (AES), to step The file content that S23 is read carries out BASE64 decoding and decrypts, and obtains clear text key;
Step S25: the clear text key that step S24 is got is arranged into the running environment of application software system;
Step S26: application software system can obtain key enforcement of going forward side by side by the running environment variable of access system and use.
In the present embodiment, in step S22, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5 MAC Address of Network Card)+MD5 (current system user mark)).
In the present embodiment, in step S24, the acquisition of clear text key uses following formula:
Clear text key=AES_DEC (computer characteristic code, BASE64_DEC (enc.fn file content)).
The foregoing is merely presently preferred embodiments of the present invention, all equivalent changes done according to scope of the present invention patent with Modification, is all covered by the present invention.

Claims (7)

1. a kind of key storage based on computer characteristic code and the method used, it is characterised in that: ciphering process is using being based on The clear text key of computer characteristic code encryption, and generate cryptograph files and stored;Decrypting process passes through agency or system Hook technology decrypts cryptograph files when application software initiated and obtains clear text key, and clear text key setting is transported to application software In row environment, used for application software.
2. a kind of key storage based on computer characteristic code according to claim 1 and the method used, feature exist In: the ciphering process specifically includes the following steps:
Step S11: exploitation key encrypts executable program, and the input parameter of executable program is the to be added of key administrator's input Close clear text key;
Step S12: key encrypts executable program dynamic acquisition computer characteristic code;
Step S13: the computer characteristic code that step S12 is got is as the key of symmetric encipherment algorithm, to key administrator The clear text key of input carries out symmetric cryptography, and is encoded using BASE64 to ciphertext, obtains ciphertext character string;
Step S14: the ciphertext character string after step S13 coding is saved as into local file, file designation enc.fn.
3. a kind of key storage based on computer characteristic code according to claim 2 and the method used, feature exist In: in step S12, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5 MAC Address of Network Card)+MD5 (current system user mark)).
4. a kind of key storage based on computer characteristic code according to claim 2 and the method used, feature exist In: in step S13, the acquisition of the ciphertext character string uses following formula:
Ciphertext=BASE64_ENC (AES_ENC (computer characteristic code, the clear text key of Key manager's input)).
5. a kind of key storage based on computer characteristic code according to claim 1 and the method used, feature exist In: the decrypting process specifically includes the following steps:
Step S21: decryption program entrance is injected into application software system launching process by exploitation key decryption program;
Step S22: key decryption program dynamic acquisition computer characteristic code;
Step S23: the enc.fn file under locally specified catalogue is read;
Step S24: the computer characteristic code that step S22 is got reads step S23 as the key of symmetric encipherment algorithm To file content BASE64 decoding and decrypt, obtain clear text key;
Step S25: the clear text key that step S24 is got is arranged into the running environment of application software system;
Step S26: application software system can obtain key enforcement of going forward side by side by the running environment variable of access system and use.
6. a kind of key storage based on computer characteristic code according to claim 5 and the method used, feature exist In: in step S22, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5 MAC Address of Network Card)+MD5 (current system user mark)).
7. a kind of key storage based on computer characteristic code according to claim 5 and the method used, feature exist In: in step S24, the acquisition of clear text key uses following formula:
Clear text key=AES_DEC (computer characteristic code, BASE64_DEC (enc.fn file content)).
CN201811262236.7A 2018-10-27 2018-10-27 Key storage and use method based on computer feature codes Active CN109510702B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811262236.7A CN109510702B (en) 2018-10-27 2018-10-27 Key storage and use method based on computer feature codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811262236.7A CN109510702B (en) 2018-10-27 2018-10-27 Key storage and use method based on computer feature codes

Publications (2)

Publication Number Publication Date
CN109510702A true CN109510702A (en) 2019-03-22
CN109510702B CN109510702B (en) 2023-05-16

Family

ID=65747016

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811262236.7A Active CN109510702B (en) 2018-10-27 2018-10-27 Key storage and use method based on computer feature codes

Country Status (1)

Country Link
CN (1) CN109510702B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414637A (en) * 2020-03-27 2020-07-14 博智安全科技股份有限公司 Industrial control fingerprint database encryption and decryption method based on machine characteristics
CN111818078A (en) * 2020-07-21 2020-10-23 成都英孚克斯科技有限公司 Weighing data safe transmission method and system based on environmental factors
CN112199641A (en) * 2020-07-16 2021-01-08 北京北方华创微电子装备有限公司 Machine software starting method and device and machine equipment
WO2022127294A1 (en) * 2020-12-14 2022-06-23 苏州浪潮智能科技有限公司 Cluster feature code obtainment method and apparatus, and electronic device
CN118413391A (en) * 2024-06-26 2024-07-30 合众新能源汽车股份有限公司 Method, system, equipment and medium for encrypting and decrypting prefabricated file of intelligent driving controller

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020034304A1 (en) * 2000-08-11 2002-03-21 Ta-Kuang Yang Method of preventing illegal copying of an electronic document
CN1905477A (en) * 2005-07-29 2007-01-31 东方惠科防伪技术有限责任公司 Network data isolation system and data transmission method
CN103745164A (en) * 2013-12-20 2014-04-23 中国科学院计算技术研究所 File secure storage method and system thereof based on environmental identification
US20140321641A1 (en) * 2013-04-25 2014-10-30 FusionPipe Software Solutions Inc. Method and system for decoupling user authentication and data encryption on mobile devices
CN104468096A (en) * 2014-12-01 2015-03-25 公安部第三研究所 Method for protecting network electronic identity identifier information based on secret key scattering calculation
EP2908493A2 (en) * 2014-01-24 2015-08-19 Actus Mobile Solutions Limited Secure communication systems
CN105681039A (en) * 2016-04-15 2016-06-15 上海上讯信息技术股份有限公司 Method and device for secret key generation and corresponding decryption
CN106341372A (en) * 2015-07-08 2017-01-18 阿里巴巴集团控股有限公司 Terminal authentication processing method and device, and terminal authentication method, device and system
CN106487509A (en) * 2016-11-09 2017-03-08 北京信安世纪科技有限公司 A kind of method for generating key and host equipment
CN108040048A (en) * 2017-12-11 2018-05-15 福建福诺移动通信技术有限公司 A kind of mobile client end subscriber dynamic secret key encryption communication method based on http protocol
CN108280356A (en) * 2018-01-17 2018-07-13 吉浦斯信息咨询(深圳)有限公司 File encryption-decryption method, device, processing terminal and computer readable storage medium
CN108513704A (en) * 2018-04-17 2018-09-07 福建联迪商用设备有限公司 The remote distribution method and its system of terminal master key

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020034304A1 (en) * 2000-08-11 2002-03-21 Ta-Kuang Yang Method of preventing illegal copying of an electronic document
CN1905477A (en) * 2005-07-29 2007-01-31 东方惠科防伪技术有限责任公司 Network data isolation system and data transmission method
US20140321641A1 (en) * 2013-04-25 2014-10-30 FusionPipe Software Solutions Inc. Method and system for decoupling user authentication and data encryption on mobile devices
CN103745164A (en) * 2013-12-20 2014-04-23 中国科学院计算技术研究所 File secure storage method and system thereof based on environmental identification
EP2908493A2 (en) * 2014-01-24 2015-08-19 Actus Mobile Solutions Limited Secure communication systems
US20180062840A1 (en) * 2014-12-01 2018-03-01 The Third Institute Of The Ministry Of Public Security Method for realizing network electronic identity identification information protection based on key dispersion calculation
CN104468096A (en) * 2014-12-01 2015-03-25 公安部第三研究所 Method for protecting network electronic identity identifier information based on secret key scattering calculation
CN106341372A (en) * 2015-07-08 2017-01-18 阿里巴巴集团控股有限公司 Terminal authentication processing method and device, and terminal authentication method, device and system
CN105681039A (en) * 2016-04-15 2016-06-15 上海上讯信息技术股份有限公司 Method and device for secret key generation and corresponding decryption
CN106487509A (en) * 2016-11-09 2017-03-08 北京信安世纪科技有限公司 A kind of method for generating key and host equipment
CN108040048A (en) * 2017-12-11 2018-05-15 福建福诺移动通信技术有限公司 A kind of mobile client end subscriber dynamic secret key encryption communication method based on http protocol
CN108280356A (en) * 2018-01-17 2018-07-13 吉浦斯信息咨询(深圳)有限公司 File encryption-decryption method, device, processing terminal and computer readable storage medium
CN108513704A (en) * 2018-04-17 2018-09-07 福建联迪商用设备有限公司 The remote distribution method and its system of terminal master key

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414637A (en) * 2020-03-27 2020-07-14 博智安全科技股份有限公司 Industrial control fingerprint database encryption and decryption method based on machine characteristics
CN112199641A (en) * 2020-07-16 2021-01-08 北京北方华创微电子装备有限公司 Machine software starting method and device and machine equipment
CN111818078A (en) * 2020-07-21 2020-10-23 成都英孚克斯科技有限公司 Weighing data safe transmission method and system based on environmental factors
WO2022127294A1 (en) * 2020-12-14 2022-06-23 苏州浪潮智能科技有限公司 Cluster feature code obtainment method and apparatus, and electronic device
US11784802B1 (en) 2020-12-14 2023-10-10 Inspur Suzhou Intelligent Technology Co., Ltd. Cluster feature code obtainment method and apparatus, and electronic device
CN118413391A (en) * 2024-06-26 2024-07-30 合众新能源汽车股份有限公司 Method, system, equipment and medium for encrypting and decrypting prefabricated file of intelligent driving controller

Also Published As

Publication number Publication date
CN109510702B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
CN109583217B (en) Internet e-commerce platform user privacy data encryption and decryption method
CN100487715C (en) Date safety storing system, device and method
CN105681039B (en) Method and device for generating a secret key and corresponding decryption
CN109510702A (en) A method of it key storage based on computer characteristic code and uses
CN102567688B (en) File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN110868291B (en) Data encryption transmission method, device, system and storage medium
KR101436536B1 (en) File server, file transfer method thereof and file tamperproof system
CN103248650A (en) Document download method and system
US20150256343A1 (en) Securely Generating and Storing Passwords in a Computer System
CN108134671A (en) A kind of transparent encryption system and its encipher-decipher method based on quantum true random number
CN109218295A (en) Document protection method, device, computer equipment and storage medium
CN102024123A (en) Method and device for importing mirror image of virtual machine in cloud calculation
JP2010517449A (en) Secret protection for untrusted recipients
CN104660590A (en) Cloud storage scheme for file encryption security
CN114282189A (en) Data security storage method, system, client and server
CN103532712B (en) digital media file protection method, system and client
CN103605927A (en) Encryption and decryption method based on embedded Linux system
CN104392153A (en) Software protection method and system
CN107276961A (en) A kind of method and device based on cipher algorithm encryption and ciphertext data
CN108809889B (en) Data deterministic deletion method based on data block random position negation
CN109784072A (en) Security file management method and system
CN113691373B (en) Anti-quantum key escrow system and method based on alliance block chain
CN109510704A (en) A kind of digital cipher protection system and method based on IOS system
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device
CN111343421B (en) Video sharing method and system based on white-box encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant