CN109510702B - Key storage and use method based on computer feature codes - Google Patents
Key storage and use method based on computer feature codes Download PDFInfo
- Publication number
- CN109510702B CN109510702B CN201811262236.7A CN201811262236A CN109510702B CN 109510702 B CN109510702 B CN 109510702B CN 201811262236 A CN201811262236 A CN 201811262236A CN 109510702 B CN109510702 B CN 109510702B
- Authority
- CN
- China
- Prior art keywords
- key
- computer feature
- feature code
- plaintext
- application software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a key storage and use method based on a computer feature code, wherein a plaintext key encrypted based on the computer feature code is adopted in an encryption process, and a ciphertext file is generated for storage; the decryption process decrypts the ciphertext file to obtain a plaintext key when the application software is started through an agent or a system hook technology, and the plaintext key is set in an application software running environment and is used by the application software. The invention can prevent the sensitive information from being stolen caused by the leakage of the secret key to the greatest extent.
Description
Technical Field
The invention relates to the field of application software system development, in particular to a key storage and use method based on a computer feature code.
Background
In the current network environment, information security accidents are endless, and an information security system is a key for guaranteeing the security of sensitive information in an application system. Most application software systems adopt encryption and decryption mechanisms to protect user information security. However, the system adopts a symmetric or asymmetric encryption and decryption mode, and the encryption and decryption process is required to be participated by the secret key. Thus, the confidentiality of a software system ultimately depends on the security of the keys, which is a very serious problem in the secure custody and use of keys on open computer networks.
The prior common technical proposal comprises:
1. the key is hard coded in the program, the key (plaintext) is written directly in the program code, and the key is used through system constant access.
2. The key is configured in the system configuration file, the key (plaintext) is configured in the system configuration file, and the program code obtains the key by accessing the system configuration file and uses it.
3. The key is saved to a database, the key (plaintext) is saved to the database, and the program code obtains the key by accessing the database and uses it.
4. And (3) encrypting and decrypting the hardware, packaging the encrypting and decrypting process into the hardware, and enabling the software to realize the encrypting and decrypting functions by calling an interface provided by the hardware.
The prior art solutions mostly store the key in the form of plaintext in a code, a configuration file or a database. The technical schemes cannot effectively prevent the situations of decompiling codes, leakage of configuration files by system personnel, dragging of databases and the like, cannot really meet the requirement of safely storing plaintext keys, and further directly influences the confidentiality of the system.
By adopting a hardware encryption mode, the confidentiality of the system can be effectively improved. However, there are a series of problems such as high cost, inconvenient development and use, and compatibility of the system.
Disclosure of Invention
Therefore, the present invention aims to provide a method for storing and using a key based on a computer feature code, which can prevent the sensitive information from being stolen due to the leakage of the key to the greatest extent.
The invention is realized by adopting the following scheme: a key storage and use method based on computer feature codes adopts a plaintext key encrypted based on the computer feature codes in the encryption process, and generates a ciphertext file for storage; the decryption process decrypts the ciphertext file to obtain a plaintext key when the application software is started through an agent or a system hook technology, and the plaintext key is set in an application software running environment and is used by the application software.
Further, the encryption process specifically includes the following steps:
step S11: developing a key encryption executable program, wherein the input parameters of the executable program are plaintext keys to be encrypted, which are input by a key manager;
step S12: the key encryption executable program dynamically acquires the computer feature code;
step S13: taking the computer feature code obtained in the step S12 as a key of a symmetric encryption Algorithm (AES), symmetrically encrypting a plaintext key input by a key manager, and encoding ciphertext by using a BASE64 to obtain a ciphertext character string;
step S14: and (3) storing the ciphertext character string encoded in the step (S13) as a local file, wherein the file is named enc.
Further, in step S12, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
Further, in step S13, the ciphertext character string is obtained by using the following formula:
ciphertext=base 64_enc (aes_enc (computer feature code, plaintext key input by key manager)).
Further, the decryption process specifically includes the following steps:
step S21: developing a key decryption program (dynamic link library), and injecting a decryption program entry into an application software system starting process (a java platform can use a java agent and a net platform can use hook technology);
step S22: the key decryption program dynamically acquires the computer feature code;
step S23: reading an enc.fn file under a local appointed directory;
step S24: taking the computer feature code obtained in the step S22 as a key of a symmetric encryption Algorithm (AES), and performing BASE64 decoding and decryption on the file content read in the step S23 to obtain a plaintext key;
step S25: setting the plaintext key acquired in the step S24 into the running environment of the application software system;
step S26: the application software system can obtain the key and use the key by accessing the running environment variable of the system.
Further, in step S22, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
Further, in step S24, the plaintext key is obtained by the following formula:
plaintext key=aes_dec (computer feature code, BASE64_dec (enc. Fn file content)).
Compared with the prior art, the invention has the following beneficial effects:
1. the application system does not store the secret key in the plaintext, decrypts the secret key in real time by a technical means when the application system is started, and sets the secret key in an application process (only the memory of the application system is visible), so that the risk of the secret key being revealed is guaranteed to the greatest extent.
2. The key ciphertext file is associated with the machine code, namely the one-machine-one-code, and decryption cannot be performed on other machines even if the ciphertext file is stolen.
3. The invention gives consideration to the problems of use cost, development convenience, system compatibility and the like, and is convenient for application and popularization.
Drawings
Fig. 1 is a schematic diagram of an encryption process according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a decryption process according to an embodiment of the invention.
Detailed Description
The invention will be further described with reference to the accompanying drawings and examples.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments in accordance with the present application. As used herein, the singular is also intended to include the plural unless the context clearly indicates otherwise, and furthermore, it is to be understood that the terms "comprises" and/or "comprising" when used in this specification are taken to specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof.
The embodiment provides a key storage and use method based on a computer feature code, wherein a plaintext key encrypted based on the computer feature code is adopted in an encryption process, and a ciphertext file is generated for storage; the decryption process decrypts the ciphertext file to obtain a plaintext key when the application software is started through an agent or a system hook technology, and the plaintext key is set in an application software running environment and is used by the application software.
In this embodiment, the encryption process specifically includes the following steps:
step S11: developing a key encryption executable program, wherein the input parameters of the executable program are plaintext keys to be encrypted, which are input by a key manager;
step S12: the key encryption executable program dynamically acquires the computer feature code;
step S13: taking the computer feature code obtained in the step S12 as a key of a symmetric encryption Algorithm (AES), symmetrically encrypting a plaintext key input by a key manager, and encoding ciphertext by using a BASE64 to obtain a ciphertext character string;
step S14: and (3) storing the ciphertext character string encoded in the step (S13) as a local file, wherein the file is named enc.
In this embodiment, in step S12, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
In this embodiment, in step S13, the following formula is adopted for obtaining the ciphertext character string:
ciphertext=base 64_enc (aes_enc (computer feature code, plaintext key input by key manager)).
In this embodiment, the decryption process specifically includes the following steps:
step S21: developing a key decryption program (dynamic link library), and injecting a decryption program entry into an application software system starting process (a java platform can use a java agent and a net platform can use hook technology);
step S22: the key decryption program dynamically acquires the computer feature code;
step S23: reading an enc.fn file under a local appointed directory;
step S24: taking the computer feature code obtained in the step S22 as a key of a symmetric encryption Algorithm (AES), and performing BASE64 decoding and decryption on the file content read in the step S23 to obtain a plaintext key;
step S25: setting the plaintext key acquired in the step S24 into the running environment of the application software system;
step S26: the application software system can obtain the key and use the key by accessing the running environment variable of the system.
In this embodiment, in step S22, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
In this embodiment, in step S24, the plaintext key is obtained by the following equation:
plaintext key=aes_dec (computer feature code, BASE64_dec (enc. Fn file content)).
The foregoing description is only of the preferred embodiments of the invention, and all changes and modifications that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Claims (4)
1. A method for storing and using a key based on a computer feature code, characterized by comprising the following steps: the encryption process adopts a plaintext key encrypted based on a computer feature code, and generates a ciphertext file for storage; the decryption process decrypts the ciphertext file to obtain a plaintext key when the application software is started through an agent or a system hook technology, and the plaintext key is set in an application software running environment and only the memory of an application system is visible, so that the application software is supplied for use;
the encryption process specifically comprises the following steps:
step S11: developing a key encryption executable program, wherein the input parameters of the executable program are plaintext keys to be encrypted, which are input by a key manager;
step S12: the key encryption executable program dynamically acquires the computer feature code;
step S13: the computer feature code obtained in the step S12 is used as a key of a symmetric encryption algorithm, the plaintext key input by a key manager is symmetrically encrypted, and a ciphertext is encoded by using a BASE64 to obtain a ciphertext character string;
step S14: storing the ciphertext character string after the encoding in the step S13 as a local file, wherein the file is named enc.fn;
the decryption process specifically comprises the following steps:
step S21: developing a key decryption program, and injecting a decryption program entry into an application software system starting process;
step S22: the key decryption program dynamically acquires the computer feature code;
step S23: reading an enc.fn file under a local appointed directory;
step S24: taking the computer feature code obtained in the step S22 as a key of a symmetric encryption algorithm, and performing BASE64 decoding and decryption on the file content read in the step S23 to obtain a plaintext key;
step S25: setting the plaintext key acquired in the step S24 into the running environment of the application software system;
step S26: the application software system can obtain the secret key and use the secret key by accessing the running environment variable of the system;
in step S12, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
2. A method for key storage and use based on computer feature codes as claimed in claim 1, wherein: in step S13, the ciphertext character string is obtained by using the following formula:
ciphertext=base 64_enc (aes_enc (computer feature code, plaintext key input by key manager)).
3. A method for key storage and use based on computer feature codes as claimed in claim 1, wherein: in step S22, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
4. A method for key storage and use based on computer feature codes as claimed in claim 1, wherein: in step S24, the plaintext key is obtained by the following equation:
plaintext key=aes_dec (computer feature code, BASE64_dec (enc. Fn file content)).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811262236.7A CN109510702B (en) | 2018-10-27 | 2018-10-27 | Key storage and use method based on computer feature codes |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811262236.7A CN109510702B (en) | 2018-10-27 | 2018-10-27 | Key storage and use method based on computer feature codes |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109510702A CN109510702A (en) | 2019-03-22 |
CN109510702B true CN109510702B (en) | 2023-05-16 |
Family
ID=65747016
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811262236.7A Active CN109510702B (en) | 2018-10-27 | 2018-10-27 | Key storage and use method based on computer feature codes |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109510702B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111414637A (en) * | 2020-03-27 | 2020-07-14 | 博智安全科技股份有限公司 | Industrial control fingerprint database encryption and decryption method based on machine characteristics |
CN112199641A (en) * | 2020-07-16 | 2021-01-08 | 北京北方华创微电子装备有限公司 | Machine software starting method and device and machine equipment |
CN111818078B (en) * | 2020-07-21 | 2022-06-24 | 成都英孚克斯科技有限公司 | Weighing data safe transmission method and system based on environmental factors |
CN112702167B (en) * | 2020-12-14 | 2022-11-11 | 苏州浪潮智能科技有限公司 | Cluster feature code obtaining method and device and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103745164A (en) * | 2013-12-20 | 2014-04-23 | 中国科学院计算技术研究所 | File secure storage method and system thereof based on environmental identification |
CN104468096A (en) * | 2014-12-01 | 2015-03-25 | 公安部第三研究所 | Method for protecting network electronic identity identifier information based on secret key scattering calculation |
CN108280356A (en) * | 2018-01-17 | 2018-07-13 | 吉浦斯信息咨询(深圳)有限公司 | File encryption-decryption method, device, processing terminal and computer readable storage medium |
CN108513704A (en) * | 2018-04-17 | 2018-09-07 | 福建联迪商用设备有限公司 | The remote distribution method and its system of terminal master key |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW486902B (en) * | 2000-08-11 | 2002-05-11 | Neovue Inc | Method capable of preventing electronic documents from being illegally copied and its system |
CN1905477A (en) * | 2005-07-29 | 2007-01-31 | 东方惠科防伪技术有限责任公司 | Network data isolation system and data transmission method |
US9137659B2 (en) * | 2013-04-25 | 2015-09-15 | FusionPipe Software Solutions Inc. | Method and system for decoupling user authentication and data encryption on mobile devices |
GB2522445A (en) * | 2014-01-24 | 2015-07-29 | Raymond Breen | Secure mobile wireless communications platform |
CN106341372A (en) * | 2015-07-08 | 2017-01-18 | 阿里巴巴集团控股有限公司 | Terminal authentication processing method and device, and terminal authentication method, device and system |
CN105681039B (en) * | 2016-04-15 | 2021-04-13 | 上海上讯信息技术股份有限公司 | Method and device for generating a secret key and corresponding decryption |
CN106487509B (en) * | 2016-11-09 | 2019-01-29 | 北京信安世纪科技股份有限公司 | A kind of method and host equipment generating key |
CN108040048A (en) * | 2017-12-11 | 2018-05-15 | 福建福诺移动通信技术有限公司 | A kind of mobile client end subscriber dynamic secret key encryption communication method based on http protocol |
-
2018
- 2018-10-27 CN CN201811262236.7A patent/CN109510702B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103745164A (en) * | 2013-12-20 | 2014-04-23 | 中国科学院计算技术研究所 | File secure storage method and system thereof based on environmental identification |
CN104468096A (en) * | 2014-12-01 | 2015-03-25 | 公安部第三研究所 | Method for protecting network electronic identity identifier information based on secret key scattering calculation |
CN108280356A (en) * | 2018-01-17 | 2018-07-13 | 吉浦斯信息咨询(深圳)有限公司 | File encryption-decryption method, device, processing terminal and computer readable storage medium |
CN108513704A (en) * | 2018-04-17 | 2018-09-07 | 福建联迪商用设备有限公司 | The remote distribution method and its system of terminal master key |
Also Published As
Publication number | Publication date |
---|---|
CN109510702A (en) | 2019-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109583217B (en) | Internet e-commerce platform user privacy data encryption and decryption method | |
CN109510702B (en) | Key storage and use method based on computer feature codes | |
CN104852925B (en) | Mobile intelligent terminal anti-data-leakage secure storage, backup method | |
US20090262926A1 (en) | Method and apparatus for generating a cryptographic key | |
CN106506159A (en) | Encryption method and equipment for key safety | |
CN102567688B (en) | File confidentiality keeping system and file confidentiality keeping method on Android operating system | |
CN105681039A (en) | Method and device for secret key generation and corresponding decryption | |
WO2006109307A2 (en) | Method, device, and system of selectively accessing data | |
CN103106372A (en) | Lightweight class privacy data encryption method and system for Android system | |
CN103246850A (en) | Method and device for processing file | |
WO2017181968A1 (en) | Method for processing application file, method and device for accessing application file, and storage medium | |
CN114556869B (en) | Key management method for encrypting data, data processing system and storage medium | |
CN101159754A (en) | Internet application management system operating on intelligent mobile terminal | |
CN107196907A (en) | A kind of guard method of Android SO files and device | |
US20140059341A1 (en) | Creating and accessing encrypted web based content in hybrid applications | |
CN106100851B (en) | Password management system, intelligent wristwatch and its cipher management method | |
WO2016112799A1 (en) | File processing method and apparatus | |
CN110855433A (en) | Data encryption method and device based on encryption algorithm and computer equipment | |
CN109302442B (en) | Data storage proving method and related equipment | |
WO2020044095A1 (en) | File encryption method and apparatus, device, terminal, server, and computer-readable storage medium | |
CN112199730A (en) | Method and device for processing application data on terminal and electronic equipment | |
CN107135074B (en) | Advanced security method and device | |
WO2018236351A1 (en) | Symmetrically encrypt a master passphrase key | |
CN1514572A (en) | Distribution type data encryption method | |
JP4338185B2 (en) | How to encrypt / decrypt files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |