CN109510702B - Key storage and use method based on computer feature codes - Google Patents

Key storage and use method based on computer feature codes Download PDF

Info

Publication number
CN109510702B
CN109510702B CN201811262236.7A CN201811262236A CN109510702B CN 109510702 B CN109510702 B CN 109510702B CN 201811262236 A CN201811262236 A CN 201811262236A CN 109510702 B CN109510702 B CN 109510702B
Authority
CN
China
Prior art keywords
key
computer feature
feature code
plaintext
application software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811262236.7A
Other languages
Chinese (zh)
Other versions
CN109510702A (en
Inventor
姚瑞祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Funo Mobile Communication Technology Co ltd
Original Assignee
Fujian Funo Mobile Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Funo Mobile Communication Technology Co ltd filed Critical Fujian Funo Mobile Communication Technology Co ltd
Priority to CN201811262236.7A priority Critical patent/CN109510702B/en
Publication of CN109510702A publication Critical patent/CN109510702A/en
Application granted granted Critical
Publication of CN109510702B publication Critical patent/CN109510702B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a key storage and use method based on a computer feature code, wherein a plaintext key encrypted based on the computer feature code is adopted in an encryption process, and a ciphertext file is generated for storage; the decryption process decrypts the ciphertext file to obtain a plaintext key when the application software is started through an agent or a system hook technology, and the plaintext key is set in an application software running environment and is used by the application software. The invention can prevent the sensitive information from being stolen caused by the leakage of the secret key to the greatest extent.

Description

Key storage and use method based on computer feature codes
Technical Field
The invention relates to the field of application software system development, in particular to a key storage and use method based on a computer feature code.
Background
In the current network environment, information security accidents are endless, and an information security system is a key for guaranteeing the security of sensitive information in an application system. Most application software systems adopt encryption and decryption mechanisms to protect user information security. However, the system adopts a symmetric or asymmetric encryption and decryption mode, and the encryption and decryption process is required to be participated by the secret key. Thus, the confidentiality of a software system ultimately depends on the security of the keys, which is a very serious problem in the secure custody and use of keys on open computer networks.
The prior common technical proposal comprises:
1. the key is hard coded in the program, the key (plaintext) is written directly in the program code, and the key is used through system constant access.
2. The key is configured in the system configuration file, the key (plaintext) is configured in the system configuration file, and the program code obtains the key by accessing the system configuration file and uses it.
3. The key is saved to a database, the key (plaintext) is saved to the database, and the program code obtains the key by accessing the database and uses it.
4. And (3) encrypting and decrypting the hardware, packaging the encrypting and decrypting process into the hardware, and enabling the software to realize the encrypting and decrypting functions by calling an interface provided by the hardware.
The prior art solutions mostly store the key in the form of plaintext in a code, a configuration file or a database. The technical schemes cannot effectively prevent the situations of decompiling codes, leakage of configuration files by system personnel, dragging of databases and the like, cannot really meet the requirement of safely storing plaintext keys, and further directly influences the confidentiality of the system.
By adopting a hardware encryption mode, the confidentiality of the system can be effectively improved. However, there are a series of problems such as high cost, inconvenient development and use, and compatibility of the system.
Disclosure of Invention
Therefore, the present invention aims to provide a method for storing and using a key based on a computer feature code, which can prevent the sensitive information from being stolen due to the leakage of the key to the greatest extent.
The invention is realized by adopting the following scheme: a key storage and use method based on computer feature codes adopts a plaintext key encrypted based on the computer feature codes in the encryption process, and generates a ciphertext file for storage; the decryption process decrypts the ciphertext file to obtain a plaintext key when the application software is started through an agent or a system hook technology, and the plaintext key is set in an application software running environment and is used by the application software.
Further, the encryption process specifically includes the following steps:
step S11: developing a key encryption executable program, wherein the input parameters of the executable program are plaintext keys to be encrypted, which are input by a key manager;
step S12: the key encryption executable program dynamically acquires the computer feature code;
step S13: taking the computer feature code obtained in the step S12 as a key of a symmetric encryption Algorithm (AES), symmetrically encrypting a plaintext key input by a key manager, and encoding ciphertext by using a BASE64 to obtain a ciphertext character string;
step S14: and (3) storing the ciphertext character string encoded in the step (S13) as a local file, wherein the file is named enc.
Further, in step S12, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
Further, in step S13, the ciphertext character string is obtained by using the following formula:
ciphertext=base 64_enc (aes_enc (computer feature code, plaintext key input by key manager)).
Further, the decryption process specifically includes the following steps:
step S21: developing a key decryption program (dynamic link library), and injecting a decryption program entry into an application software system starting process (a java platform can use a java agent and a net platform can use hook technology);
step S22: the key decryption program dynamically acquires the computer feature code;
step S23: reading an enc.fn file under a local appointed directory;
step S24: taking the computer feature code obtained in the step S22 as a key of a symmetric encryption Algorithm (AES), and performing BASE64 decoding and decryption on the file content read in the step S23 to obtain a plaintext key;
step S25: setting the plaintext key acquired in the step S24 into the running environment of the application software system;
step S26: the application software system can obtain the key and use the key by accessing the running environment variable of the system.
Further, in step S22, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
Further, in step S24, the plaintext key is obtained by the following formula:
plaintext key=aes_dec (computer feature code, BASE64_dec (enc. Fn file content)).
Compared with the prior art, the invention has the following beneficial effects:
1. the application system does not store the secret key in the plaintext, decrypts the secret key in real time by a technical means when the application system is started, and sets the secret key in an application process (only the memory of the application system is visible), so that the risk of the secret key being revealed is guaranteed to the greatest extent.
2. The key ciphertext file is associated with the machine code, namely the one-machine-one-code, and decryption cannot be performed on other machines even if the ciphertext file is stolen.
3. The invention gives consideration to the problems of use cost, development convenience, system compatibility and the like, and is convenient for application and popularization.
Drawings
Fig. 1 is a schematic diagram of an encryption process according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a decryption process according to an embodiment of the invention.
Detailed Description
The invention will be further described with reference to the accompanying drawings and examples.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments in accordance with the present application. As used herein, the singular is also intended to include the plural unless the context clearly indicates otherwise, and furthermore, it is to be understood that the terms "comprises" and/or "comprising" when used in this specification are taken to specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof.
The embodiment provides a key storage and use method based on a computer feature code, wherein a plaintext key encrypted based on the computer feature code is adopted in an encryption process, and a ciphertext file is generated for storage; the decryption process decrypts the ciphertext file to obtain a plaintext key when the application software is started through an agent or a system hook technology, and the plaintext key is set in an application software running environment and is used by the application software.
In this embodiment, the encryption process specifically includes the following steps:
step S11: developing a key encryption executable program, wherein the input parameters of the executable program are plaintext keys to be encrypted, which are input by a key manager;
step S12: the key encryption executable program dynamically acquires the computer feature code;
step S13: taking the computer feature code obtained in the step S12 as a key of a symmetric encryption Algorithm (AES), symmetrically encrypting a plaintext key input by a key manager, and encoding ciphertext by using a BASE64 to obtain a ciphertext character string;
step S14: and (3) storing the ciphertext character string encoded in the step (S13) as a local file, wherein the file is named enc.
In this embodiment, in step S12, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
In this embodiment, in step S13, the following formula is adopted for obtaining the ciphertext character string:
ciphertext=base 64_enc (aes_enc (computer feature code, plaintext key input by key manager)).
In this embodiment, the decryption process specifically includes the following steps:
step S21: developing a key decryption program (dynamic link library), and injecting a decryption program entry into an application software system starting process (a java platform can use a java agent and a net platform can use hook technology);
step S22: the key decryption program dynamically acquires the computer feature code;
step S23: reading an enc.fn file under a local appointed directory;
step S24: taking the computer feature code obtained in the step S22 as a key of a symmetric encryption Algorithm (AES), and performing BASE64 decoding and decryption on the file content read in the step S23 to obtain a plaintext key;
step S25: setting the plaintext key acquired in the step S24 into the running environment of the application software system;
step S26: the application software system can obtain the key and use the key by accessing the running environment variable of the system.
In this embodiment, in step S22, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
In this embodiment, in step S24, the plaintext key is obtained by the following equation:
plaintext key=aes_dec (computer feature code, BASE64_dec (enc. Fn file content)).
The foregoing description is only of the preferred embodiments of the invention, and all changes and modifications that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.

Claims (4)

1. A method for storing and using a key based on a computer feature code, characterized by comprising the following steps: the encryption process adopts a plaintext key encrypted based on a computer feature code, and generates a ciphertext file for storage; the decryption process decrypts the ciphertext file to obtain a plaintext key when the application software is started through an agent or a system hook technology, and the plaintext key is set in an application software running environment and only the memory of an application system is visible, so that the application software is supplied for use;
the encryption process specifically comprises the following steps:
step S11: developing a key encryption executable program, wherein the input parameters of the executable program are plaintext keys to be encrypted, which are input by a key manager;
step S12: the key encryption executable program dynamically acquires the computer feature code;
step S13: the computer feature code obtained in the step S12 is used as a key of a symmetric encryption algorithm, the plaintext key input by a key manager is symmetrically encrypted, and a ciphertext is encoded by using a BASE64 to obtain a ciphertext character string;
step S14: storing the ciphertext character string after the encoding in the step S13 as a local file, wherein the file is named enc.fn;
the decryption process specifically comprises the following steps:
step S21: developing a key decryption program, and injecting a decryption program entry into an application software system starting process;
step S22: the key decryption program dynamically acquires the computer feature code;
step S23: reading an enc.fn file under a local appointed directory;
step S24: taking the computer feature code obtained in the step S22 as a key of a symmetric encryption algorithm, and performing BASE64 decoding and decryption on the file content read in the step S23 to obtain a plaintext key;
step S25: setting the plaintext key acquired in the step S24 into the running environment of the application software system;
step S26: the application software system can obtain the secret key and use the secret key by accessing the running environment variable of the system;
in step S12, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
2. A method for key storage and use based on computer feature codes as claimed in claim 1, wherein: in step S13, the ciphertext character string is obtained by using the following formula:
ciphertext=base 64_enc (aes_enc (computer feature code, plaintext key input by key manager)).
3. A method for key storage and use based on computer feature codes as claimed in claim 1, wherein: in step S22, the calculation formula of the computer feature code is as follows:
computer feature code=md5 (MD 5 (motherboard serial number) +md5 (CPU serial number) +md5 (hard disk serial number) +md5 (real network card MAC address) +md5 (current system user identification)).
4. A method for key storage and use based on computer feature codes as claimed in claim 1, wherein: in step S24, the plaintext key is obtained by the following equation:
plaintext key=aes_dec (computer feature code, BASE64_dec (enc. Fn file content)).
CN201811262236.7A 2018-10-27 2018-10-27 Key storage and use method based on computer feature codes Active CN109510702B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811262236.7A CN109510702B (en) 2018-10-27 2018-10-27 Key storage and use method based on computer feature codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811262236.7A CN109510702B (en) 2018-10-27 2018-10-27 Key storage and use method based on computer feature codes

Publications (2)

Publication Number Publication Date
CN109510702A CN109510702A (en) 2019-03-22
CN109510702B true CN109510702B (en) 2023-05-16

Family

ID=65747016

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811262236.7A Active CN109510702B (en) 2018-10-27 2018-10-27 Key storage and use method based on computer feature codes

Country Status (1)

Country Link
CN (1) CN109510702B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414637A (en) * 2020-03-27 2020-07-14 博智安全科技股份有限公司 Industrial control fingerprint database encryption and decryption method based on machine characteristics
CN112199641A (en) * 2020-07-16 2021-01-08 北京北方华创微电子装备有限公司 Machine software starting method and device and machine equipment
CN111818078B (en) * 2020-07-21 2022-06-24 成都英孚克斯科技有限公司 Weighing data safe transmission method and system based on environmental factors
CN112702167B (en) * 2020-12-14 2022-11-11 苏州浪潮智能科技有限公司 Cluster feature code obtaining method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745164A (en) * 2013-12-20 2014-04-23 中国科学院计算技术研究所 File secure storage method and system thereof based on environmental identification
CN104468096A (en) * 2014-12-01 2015-03-25 公安部第三研究所 Method for protecting network electronic identity identifier information based on secret key scattering calculation
CN108280356A (en) * 2018-01-17 2018-07-13 吉浦斯信息咨询(深圳)有限公司 File encryption-decryption method, device, processing terminal and computer readable storage medium
CN108513704A (en) * 2018-04-17 2018-09-07 福建联迪商用设备有限公司 The remote distribution method and its system of terminal master key

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW486902B (en) * 2000-08-11 2002-05-11 Neovue Inc Method capable of preventing electronic documents from being illegally copied and its system
CN1905477A (en) * 2005-07-29 2007-01-31 东方惠科防伪技术有限责任公司 Network data isolation system and data transmission method
US9137659B2 (en) * 2013-04-25 2015-09-15 FusionPipe Software Solutions Inc. Method and system for decoupling user authentication and data encryption on mobile devices
GB2522445A (en) * 2014-01-24 2015-07-29 Raymond Breen Secure mobile wireless communications platform
CN106341372A (en) * 2015-07-08 2017-01-18 阿里巴巴集团控股有限公司 Terminal authentication processing method and device, and terminal authentication method, device and system
CN105681039B (en) * 2016-04-15 2021-04-13 上海上讯信息技术股份有限公司 Method and device for generating a secret key and corresponding decryption
CN106487509B (en) * 2016-11-09 2019-01-29 北京信安世纪科技股份有限公司 A kind of method and host equipment generating key
CN108040048A (en) * 2017-12-11 2018-05-15 福建福诺移动通信技术有限公司 A kind of mobile client end subscriber dynamic secret key encryption communication method based on http protocol

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745164A (en) * 2013-12-20 2014-04-23 中国科学院计算技术研究所 File secure storage method and system thereof based on environmental identification
CN104468096A (en) * 2014-12-01 2015-03-25 公安部第三研究所 Method for protecting network electronic identity identifier information based on secret key scattering calculation
CN108280356A (en) * 2018-01-17 2018-07-13 吉浦斯信息咨询(深圳)有限公司 File encryption-decryption method, device, processing terminal and computer readable storage medium
CN108513704A (en) * 2018-04-17 2018-09-07 福建联迪商用设备有限公司 The remote distribution method and its system of terminal master key

Also Published As

Publication number Publication date
CN109510702A (en) 2019-03-22

Similar Documents

Publication Publication Date Title
CN109583217B (en) Internet e-commerce platform user privacy data encryption and decryption method
CN109510702B (en) Key storage and use method based on computer feature codes
CN104852925B (en) Mobile intelligent terminal anti-data-leakage secure storage, backup method
US20090262926A1 (en) Method and apparatus for generating a cryptographic key
CN106506159A (en) Encryption method and equipment for key safety
CN102567688B (en) File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN105681039A (en) Method and device for secret key generation and corresponding decryption
WO2006109307A2 (en) Method, device, and system of selectively accessing data
CN103106372A (en) Lightweight class privacy data encryption method and system for Android system
CN103246850A (en) Method and device for processing file
WO2017181968A1 (en) Method for processing application file, method and device for accessing application file, and storage medium
CN114556869B (en) Key management method for encrypting data, data processing system and storage medium
CN101159754A (en) Internet application management system operating on intelligent mobile terminal
CN107196907A (en) A kind of guard method of Android SO files and device
US20140059341A1 (en) Creating and accessing encrypted web based content in hybrid applications
CN106100851B (en) Password management system, intelligent wristwatch and its cipher management method
WO2016112799A1 (en) File processing method and apparatus
CN110855433A (en) Data encryption method and device based on encryption algorithm and computer equipment
CN109302442B (en) Data storage proving method and related equipment
WO2020044095A1 (en) File encryption method and apparatus, device, terminal, server, and computer-readable storage medium
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
CN107135074B (en) Advanced security method and device
WO2018236351A1 (en) Symmetrically encrypt a master passphrase key
CN1514572A (en) Distribution type data encryption method
JP4338185B2 (en) How to encrypt / decrypt files

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant