CN109510702A - A method of it key storage based on computer characteristic code and uses - Google Patents
A method of it key storage based on computer characteristic code and uses Download PDFInfo
- Publication number
- CN109510702A CN109510702A CN201811262236.7A CN201811262236A CN109510702A CN 109510702 A CN109510702 A CN 109510702A CN 201811262236 A CN201811262236 A CN 201811262236A CN 109510702 A CN109510702 A CN 109510702A
- Authority
- CN
- China
- Prior art keywords
- key
- characteristic code
- computer characteristic
- clear text
- application software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of key storage based on computer characteristic code and the methods used, and ciphering process uses the clear text key based on computer characteristic code encryption, and generates cryptograph files and stored;Decrypting process decrypts cryptograph files by agency or system hook technology when application software initiated and obtains clear text key, and clear text key is arranged into application software running environment, uses for application software.The present invention utmostly can prevent Key Exposure from sensitive information being caused to be stolen.
Description
Technical field
The present invention relates to application software system development field, especially a kind of key storage based on computer characteristic code and
The method used.
Background technique
Under current network environment, information security accident emerges one after another, and information security system is to guarantee sensitivity in application system
The key of information security.Most of application software systems all can protect user information safety using encryption and decryption mechanism.But it is
No matter system requires key participate in encryption process using symmetrical or asymmetric encryption and decryption mode.Therefore, the guarantor of software systems
Close property finally depends primarily on the safety of key, the safe keeping and the use of key is one on open computer network
Very severe problem.
Existing common technique scheme includes:
1, in a program, key (plaintext) is directly programmed in program code for key hard coded, is made by the access of system constant
Use key.
2, cipher key configuration is in system configuration file, by key (plaintext) configuration in system configuration file, program code
Key is obtained by access system configuration file and is used.
3, key is saved in database, and key (plaintext) is saved in database, and program code passes through access data
Library obtains key and uses.
4, encryption process is encapsulated into hardware by hardware enciphering and deciphering, and software is realized by the interface for calling hardware to provide
Encryption and decryption functions.
Key is stored in code, configuration file or database by existing technical solution in the form of plaintext mostly.
These technical solutions can not effectively prevent code decompiling, system personnel leakage configuration file, database from being dragged the situations such as library, nothing
Method is really achieved the requirement of secure storage clear text key, and then directly affects system security.
Using hardware cipher mode, though it can effective lifting system confidentiality.But there is also at high cost, exploitation and using not
There is a series of problems, such as compatibility in convenient, system.
Summary of the invention
In view of this, the purpose of the present invention is to propose to a kind of key storage based on computer characteristic code and the sides used
Method utmostly can prevent Key Exposure from sensitive information being caused to be stolen.
The present invention is realized using following scheme: a method of it key storage based on computer characteristic code and uses, adds
Close process uses the clear text key based on computer characteristic code encryption, and generates cryptograph files and stored;Decrypting process passes through
Agency or system hook technology decrypt cryptograph files when application software initiated and obtain clear text key, and clear text key is arranged
Into application software running environment, used for application software.
Further, the ciphering process specifically includes the following steps:
Step S11: exploitation key encrypts executable program, and the input parameter of executable program is the to be added of key administrator's input
Close clear text key;
Step S12: key encrypts executable program dynamic acquisition computer characteristic code;
Step S13: the computer characteristic code that step S12 is got is as the key of symmetric encipherment algorithm (AES), to key pipe
The clear text key of reason person's input carries out symmetric cryptography, and is encoded using BASE64 to ciphertext, obtains ciphertext character string;
Step S14: the ciphertext character string after step S13 coding is saved as into local file, file designation enc.fn.
Further, in step S12, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5
MAC Address of Network Card)+MD5 (current system user mark)).
Further, in step S13, the acquisition of the ciphertext character string uses following formula:
Ciphertext=BASE64_ENC (AES_ENC (computer characteristic code, the clear text key of Key manager's input)).
Further, the decrypting process specifically includes the following steps:
Step S21: decryption program entrance is injected into application software system starting by exploitation key decryption program (dynamic link library)
In process (java agent can be used in java platform, and hook technology can be used in net platform);
Step S22: key decryption program dynamic acquisition computer characteristic code;
Step S23: the enc.fn file under locally specified catalogue is read;
Step S24: the computer characteristic code that step S22 is got is as the key of symmetric encipherment algorithm (AES), to step
The file content that S23 is read carries out BASE64 decoding and decrypts, and obtains clear text key;
Step S25: the clear text key that step S24 is got is arranged into the running environment of application software system;
Step S26: application software system can obtain key enforcement of going forward side by side by the running environment variable of access system and use.
Further, in step S22, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5
MAC Address of Network Card)+MD5 (current system user mark)).
Further, in step S24, the acquisition of clear text key uses following formula:
Clear text key=AES_DEC (computer characteristic code, BASE64_DEC (enc.fn file content)).
Compared with prior art, the invention has the following beneficial effects:
1, not stored in clear key in application system of the invention, is obtained by technological means real time decrypting when the application system starts up
To key and it is arranged into application process (only application system memory is visible), has utmostly ensured the risk that key is leaked.
2, key cryptograph files of the invention are associated with " one yard of a machine " with machine code, can not cryptograph files are stolen
It is decrypted on other machines.
3, the present invention takes into account the problems such as use cost, exploitation convenience, system compatibility, is convenient for application and promotion.
Detailed description of the invention
Fig. 1 is the ciphering process flow diagram of the embodiment of the present invention.
Fig. 2 is the decrypting process flow diagram of the embodiment of the present invention.
Specific embodiment
The present invention will be further described with reference to the accompanying drawings and embodiments.
It is noted that described further below be all exemplary, it is intended to provide further instruction to the application.Unless another
It indicates, all technical and scientific terms used herein has usual with the application person of an ordinary skill in the technical field
The identical meanings of understanding.
It should be noted that term used herein above is merely to describe specific embodiment, and be not intended to restricted root
According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singular
Also it is intended to include plural form, additionally, it should be understood that, when in the present specification using term "comprising" and/or " packet
Include " when, indicate existing characteristics, step, operation, device, component and/or their combination.
A kind of method for present embodiments providing the key storage based on computer characteristic code and using, ciphering process use
Based on the clear text key of computer characteristic code encryption, and generates cryptograph files and stored;Decrypting process is by agency or is
System hook technology decrypts cryptograph files when application software initiated and obtains clear text key, and clear text key is arranged to application software
In running environment, used for application software.
In the present embodiment, the ciphering process specifically includes the following steps:
Step S11: exploitation key encrypts executable program, and the input parameter of executable program is the to be added of key administrator's input
Close clear text key;
Step S12: key encrypts executable program dynamic acquisition computer characteristic code;
Step S13: the computer characteristic code that step S12 is got is as the key of symmetric encipherment algorithm (AES), to key pipe
The clear text key of reason person's input carries out symmetric cryptography, and is encoded using BASE64 to ciphertext, obtains ciphertext character string;
Step S14: the ciphertext character string after step S13 coding is saved as into local file, file designation enc.fn.
In the present embodiment, in step S12, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5
MAC Address of Network Card)+MD5 (current system user mark)).
In the present embodiment, in step S13, the acquisition of the ciphertext character string uses following formula:
Ciphertext=BASE64_ENC (AES_ENC (computer characteristic code, the clear text key of Key manager's input)).
In the present embodiment, the decrypting process specifically includes the following steps:
Step S21: decryption program entrance is injected into application software system starting by exploitation key decryption program (dynamic link library)
In process (java agent can be used in java platform, and hook technology can be used in net platform);
Step S22: key decryption program dynamic acquisition computer characteristic code;
Step S23: the enc.fn file under locally specified catalogue is read;
Step S24: the computer characteristic code that step S22 is got is as the key of symmetric encipherment algorithm (AES), to step
The file content that S23 is read carries out BASE64 decoding and decrypts, and obtains clear text key;
Step S25: the clear text key that step S24 is got is arranged into the running environment of application software system;
Step S26: application software system can obtain key enforcement of going forward side by side by the running environment variable of access system and use.
In the present embodiment, in step S22, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5
MAC Address of Network Card)+MD5 (current system user mark)).
In the present embodiment, in step S24, the acquisition of clear text key uses following formula:
Clear text key=AES_DEC (computer characteristic code, BASE64_DEC (enc.fn file content)).
The foregoing is merely presently preferred embodiments of the present invention, all equivalent changes done according to scope of the present invention patent with
Modification, is all covered by the present invention.
Claims (7)
1. a kind of key storage based on computer characteristic code and the method used, it is characterised in that: ciphering process is using being based on
The clear text key of computer characteristic code encryption, and generate cryptograph files and stored;Decrypting process passes through agency or system
Hook technology decrypts cryptograph files when application software initiated and obtains clear text key, and clear text key setting is transported to application software
In row environment, used for application software.
2. a kind of key storage based on computer characteristic code according to claim 1 and the method used, feature exist
In: the ciphering process specifically includes the following steps:
Step S11: exploitation key encrypts executable program, and the input parameter of executable program is the to be added of key administrator's input
Close clear text key;
Step S12: key encrypts executable program dynamic acquisition computer characteristic code;
Step S13: the computer characteristic code that step S12 is got is as the key of symmetric encipherment algorithm, to key administrator
The clear text key of input carries out symmetric cryptography, and is encoded using BASE64 to ciphertext, obtains ciphertext character string;
Step S14: the ciphertext character string after step S13 coding is saved as into local file, file designation enc.fn.
3. a kind of key storage based on computer characteristic code according to claim 2 and the method used, feature exist
In: in step S12, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5
MAC Address of Network Card)+MD5 (current system user mark)).
4. a kind of key storage based on computer characteristic code according to claim 2 and the method used, feature exist
In: in step S13, the acquisition of the ciphertext character string uses following formula:
Ciphertext=BASE64_ENC (AES_ENC (computer characteristic code, the clear text key of Key manager's input)).
5. a kind of key storage based on computer characteristic code according to claim 1 and the method used, feature exist
In: the decrypting process specifically includes the following steps:
Step S21: decryption program entrance is injected into application software system launching process by exploitation key decryption program;
Step S22: key decryption program dynamic acquisition computer characteristic code;
Step S23: the enc.fn file under locally specified catalogue is read;
Step S24: the computer characteristic code that step S22 is got reads step S23 as the key of symmetric encipherment algorithm
To file content BASE64 decoding and decrypt, obtain clear text key;
Step S25: the clear text key that step S24 is got is arranged into the running environment of application software system;
Step S26: application software system can obtain key enforcement of going forward side by side by the running environment variable of access system and use.
6. a kind of key storage based on computer characteristic code according to claim 5 and the method used, feature exist
In: in step S22, the calculation formula of computer characteristic code is as follows:
(MD5 (mainboard sequence number)+MD5 (CPU sequence number)+MD5 (hard disk serial number)+MD5 is (true for computer characteristic code=MD5
MAC Address of Network Card)+MD5 (current system user mark)).
7. a kind of key storage based on computer characteristic code according to claim 5 and the method used, feature exist
In: in step S24, the acquisition of clear text key uses following formula:
Clear text key=AES_DEC (computer characteristic code, BASE64_DEC (enc.fn file content)).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811262236.7A CN109510702B (en) | 2018-10-27 | 2018-10-27 | Key storage and use method based on computer feature codes |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811262236.7A CN109510702B (en) | 2018-10-27 | 2018-10-27 | Key storage and use method based on computer feature codes |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109510702A true CN109510702A (en) | 2019-03-22 |
CN109510702B CN109510702B (en) | 2023-05-16 |
Family
ID=65747016
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811262236.7A Active CN109510702B (en) | 2018-10-27 | 2018-10-27 | Key storage and use method based on computer feature codes |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109510702B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111414637A (en) * | 2020-03-27 | 2020-07-14 | 博智安全科技股份有限公司 | Industrial control fingerprint database encryption and decryption method based on machine characteristics |
CN111818078A (en) * | 2020-07-21 | 2020-10-23 | 成都英孚克斯科技有限公司 | Weighing data safe transmission method and system based on environmental factors |
CN112199641A (en) * | 2020-07-16 | 2021-01-08 | 北京北方华创微电子装备有限公司 | Machine software starting method and device and machine equipment |
WO2022127294A1 (en) * | 2020-12-14 | 2022-06-23 | 苏州浪潮智能科技有限公司 | Cluster feature code obtainment method and apparatus, and electronic device |
CN118413391A (en) * | 2024-06-26 | 2024-07-30 | 合众新能源汽车股份有限公司 | Method, system, equipment and medium for encrypting and decrypting prefabricated file of intelligent driving controller |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020034304A1 (en) * | 2000-08-11 | 2002-03-21 | Ta-Kuang Yang | Method of preventing illegal copying of an electronic document |
CN1905477A (en) * | 2005-07-29 | 2007-01-31 | 东方惠科防伪技术有限责任公司 | Network data isolation system and data transmission method |
CN103745164A (en) * | 2013-12-20 | 2014-04-23 | 中国科学院计算技术研究所 | File secure storage method and system thereof based on environmental identification |
US20140321641A1 (en) * | 2013-04-25 | 2014-10-30 | FusionPipe Software Solutions Inc. | Method and system for decoupling user authentication and data encryption on mobile devices |
CN104468096A (en) * | 2014-12-01 | 2015-03-25 | 公安部第三研究所 | Method for protecting network electronic identity identifier information based on secret key scattering calculation |
EP2908493A2 (en) * | 2014-01-24 | 2015-08-19 | Actus Mobile Solutions Limited | Secure communication systems |
CN105681039A (en) * | 2016-04-15 | 2016-06-15 | 上海上讯信息技术股份有限公司 | Method and device for secret key generation and corresponding decryption |
CN106341372A (en) * | 2015-07-08 | 2017-01-18 | 阿里巴巴集团控股有限公司 | Terminal authentication processing method and device, and terminal authentication method, device and system |
CN106487509A (en) * | 2016-11-09 | 2017-03-08 | 北京信安世纪科技有限公司 | A kind of method for generating key and host equipment |
CN108040048A (en) * | 2017-12-11 | 2018-05-15 | 福建福诺移动通信技术有限公司 | A kind of mobile client end subscriber dynamic secret key encryption communication method based on http protocol |
CN108280356A (en) * | 2018-01-17 | 2018-07-13 | 吉浦斯信息咨询(深圳)有限公司 | File encryption-decryption method, device, processing terminal and computer readable storage medium |
CN108513704A (en) * | 2018-04-17 | 2018-09-07 | 福建联迪商用设备有限公司 | The remote distribution method and its system of terminal master key |
-
2018
- 2018-10-27 CN CN201811262236.7A patent/CN109510702B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020034304A1 (en) * | 2000-08-11 | 2002-03-21 | Ta-Kuang Yang | Method of preventing illegal copying of an electronic document |
CN1905477A (en) * | 2005-07-29 | 2007-01-31 | 东方惠科防伪技术有限责任公司 | Network data isolation system and data transmission method |
US20140321641A1 (en) * | 2013-04-25 | 2014-10-30 | FusionPipe Software Solutions Inc. | Method and system for decoupling user authentication and data encryption on mobile devices |
CN103745164A (en) * | 2013-12-20 | 2014-04-23 | 中国科学院计算技术研究所 | File secure storage method and system thereof based on environmental identification |
EP2908493A2 (en) * | 2014-01-24 | 2015-08-19 | Actus Mobile Solutions Limited | Secure communication systems |
US20180062840A1 (en) * | 2014-12-01 | 2018-03-01 | The Third Institute Of The Ministry Of Public Security | Method for realizing network electronic identity identification information protection based on key dispersion calculation |
CN104468096A (en) * | 2014-12-01 | 2015-03-25 | 公安部第三研究所 | Method for protecting network electronic identity identifier information based on secret key scattering calculation |
CN106341372A (en) * | 2015-07-08 | 2017-01-18 | 阿里巴巴集团控股有限公司 | Terminal authentication processing method and device, and terminal authentication method, device and system |
CN105681039A (en) * | 2016-04-15 | 2016-06-15 | 上海上讯信息技术股份有限公司 | Method and device for secret key generation and corresponding decryption |
CN106487509A (en) * | 2016-11-09 | 2017-03-08 | 北京信安世纪科技有限公司 | A kind of method for generating key and host equipment |
CN108040048A (en) * | 2017-12-11 | 2018-05-15 | 福建福诺移动通信技术有限公司 | A kind of mobile client end subscriber dynamic secret key encryption communication method based on http protocol |
CN108280356A (en) * | 2018-01-17 | 2018-07-13 | 吉浦斯信息咨询(深圳)有限公司 | File encryption-decryption method, device, processing terminal and computer readable storage medium |
CN108513704A (en) * | 2018-04-17 | 2018-09-07 | 福建联迪商用设备有限公司 | The remote distribution method and its system of terminal master key |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111414637A (en) * | 2020-03-27 | 2020-07-14 | 博智安全科技股份有限公司 | Industrial control fingerprint database encryption and decryption method based on machine characteristics |
CN112199641A (en) * | 2020-07-16 | 2021-01-08 | 北京北方华创微电子装备有限公司 | Machine software starting method and device and machine equipment |
CN111818078A (en) * | 2020-07-21 | 2020-10-23 | 成都英孚克斯科技有限公司 | Weighing data safe transmission method and system based on environmental factors |
WO2022127294A1 (en) * | 2020-12-14 | 2022-06-23 | 苏州浪潮智能科技有限公司 | Cluster feature code obtainment method and apparatus, and electronic device |
US11784802B1 (en) | 2020-12-14 | 2023-10-10 | Inspur Suzhou Intelligent Technology Co., Ltd. | Cluster feature code obtainment method and apparatus, and electronic device |
CN118413391A (en) * | 2024-06-26 | 2024-07-30 | 合众新能源汽车股份有限公司 | Method, system, equipment and medium for encrypting and decrypting prefabricated file of intelligent driving controller |
Also Published As
Publication number | Publication date |
---|---|
CN109510702B (en) | 2023-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109583217B (en) | Internet e-commerce platform user privacy data encryption and decryption method | |
CN100487715C (en) | Date safety storing system, device and method | |
CN105681039B (en) | Method and device for generating a secret key and corresponding decryption | |
CN109510702A (en) | A method of it key storage based on computer characteristic code and uses | |
CN102567688B (en) | File confidentiality keeping system and file confidentiality keeping method on Android operating system | |
CN110868291B (en) | Data encryption transmission method, device, system and storage medium | |
KR101436536B1 (en) | File server, file transfer method thereof and file tamperproof system | |
CN103248650A (en) | Document download method and system | |
US20150256343A1 (en) | Securely Generating and Storing Passwords in a Computer System | |
CN108134671A (en) | A kind of transparent encryption system and its encipher-decipher method based on quantum true random number | |
CN109218295A (en) | Document protection method, device, computer equipment and storage medium | |
CN102024123A (en) | Method and device for importing mirror image of virtual machine in cloud calculation | |
JP2010517449A (en) | Secret protection for untrusted recipients | |
CN104660590A (en) | Cloud storage scheme for file encryption security | |
CN114282189A (en) | Data security storage method, system, client and server | |
CN103532712B (en) | digital media file protection method, system and client | |
CN103605927A (en) | Encryption and decryption method based on embedded Linux system | |
CN104392153A (en) | Software protection method and system | |
CN107276961A (en) | A kind of method and device based on cipher algorithm encryption and ciphertext data | |
CN108809889B (en) | Data deterministic deletion method based on data block random position negation | |
CN109784072A (en) | Security file management method and system | |
CN113691373B (en) | Anti-quantum key escrow system and method based on alliance block chain | |
CN109510704A (en) | A kind of digital cipher protection system and method based on IOS system | |
KR101329789B1 (en) | Encryption Method of Database of Mobile Communication Device | |
CN111343421B (en) | Video sharing method and system based on white-box encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |