CN109861945A - A kind of distributed code operation and interactive safety method and its system - Google Patents
A kind of distributed code operation and interactive safety method and its system Download PDFInfo
- Publication number
- CN109861945A CN109861945A CN201711169348.3A CN201711169348A CN109861945A CN 109861945 A CN109861945 A CN 109861945A CN 201711169348 A CN201711169348 A CN 201711169348A CN 109861945 A CN109861945 A CN 109861945A
- Authority
- CN
- China
- Prior art keywords
- code
- ciphertext
- server
- interface
- operation result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of operation of distributed code and interaction safety method and its systems, including client browser or application (interface) and web or other kinds of server, it is provided with encrypted file system and function call interception card module and encrypting module in the server, client browser or application (interface) issue code dynamic security to server and execute request, and file system requests encrypting module carries out coding encrypting and generates code ciphertext;Encrypting module returns to operating system after carrying out ciphertext code conversion;Server first proposes to carry out the request of ciphertext code conversion to code operation result to encrypting module;Server by the ciphertext of non-switched code operation result with can show or merge using the ciphertext of (interface) accessible code operation result, fusion results are sent to browser or application (interface).The safety of operation code in effective protection web server of the present invention.
Description
Technical field
The invention belongs to the operation of distribution Web, network, calculating and service code and the technical fields of interaction safety, especially
It is related to a kind of distributed code operation and interactive safety method and its system.
Background technique
Existing distributed network and service be easy it is hacked, even if being mounted with encryption safe in web server
Software still easily loses protective effect by hack, so that the code operation and interaction safety in web server cannot get
Reliable guarantee, especially computer always have an opportunity the plaintext code information for touching code.The prior art is further improved
And raising.
Summary of the invention
Technical problem to be solved by the present invention lies in, provide a kind of operation of distributed code and interaction safety method and its
System protects the safety of web and the code in other kinds of server, it is ensured that code in the memory of server, CPU, to mutual
Networking, client, the memory in browser, in CPU all not the plaintext code of complete set, even wholly without plaintext generation
Code, it is ensured that the safety of code and its execution and client human-computer interaction and application (interface) in server.
The invention is realized in this way providing a kind of distributed code operation and interactive safety method, including following specific
Step:
A, client browser or application interface issue the close cultural security of code dynamic to web or associated server and execute request,
The code includes code in plain text and/or code ciphertext, the safety execute the file system pair that request includes the server
The code carries out coding encrypting in plain text or/and carries out the request of ciphertext conversion dynamic generation code ciphertext to the code ciphertext;
B, the file system carries out coding encrypting or close to the code to the proposition of the encrypting module of server in plain text to the code
Text carries out the request of ciphertext code conversion, and code plaintext or cipher text is sent to encrypting module simultaneously;
C, the encrypting module will after carrying out coding encrypting in plain text to the code or carrying out ciphertext code conversion to the code ciphertext
Executable code ciphertext after conversion returns to the operating system of the server;
D, the server executable code ciphertext is executed, operation and processing, and obtain the close of code operation result
Text;
E, before the ciphertext of the code operation result is pushed to client browser or application (interface), the server is first
It proposes to carry out the request of ciphertext code conversion to the ciphertext of code operation result to encrypting module, and simultaneously by code operation result
Ciphertext is sent to encrypting module;
F, the encrypting module is carried out showing after conversion after ciphertext code conversion or is answered to the ciphertext of code operation result
The server is returned to the ciphertext of (interface) accessible code operation result;
G, the server by the ciphertext of non-switched code operation result and can be shown or using (interface) accessible code
The ciphertext of operation result is merged, then is sent client browser for fusion results or applied (interface), the client
Browser is shown or application (interface) handles operation result corresponding with code request.
The invention is realized in this way providing a kind of distributed code operation and interactive security system, including client is clear
It lookes at device or application (interface), human-computer interaction and web or other kinds of server, encryption file is provided in the server
System, function call interception card module and encrypting module,
The client browser or application (interface) issue the close cultural security of code dynamic to web or other types server and hold
Row request, the code includes code in plain text and/or code ciphertext, the safety execute the file that request includes the server
System carries out coding encrypting in plain text to the code or/and asks to code ciphertext progress ciphertext conversion dynamic generation code ciphertext
It asks;
The file system proposes to carry out the code in plain text coding encrypting or to the code ciphertext to the encrypting module of server
The request of ciphertext code conversion is carried out, and code plaintext or cipher text is sent to encrypting module simultaneously;
The encrypting module carries out coding encrypting in plain text to the code or will turn after carrying out ciphertext code conversion to the code ciphertext
The code ciphertext run after changing returns to the operating system of server;
The server executes the code ciphertext that can be run, operation and processing, and obtains the ciphertext of code operation result;
Before the ciphertext of the code operation result is pushed to client browser or application (interface), the server first to
Encrypting module proposes the ciphertext progress ciphertext code conversion request to code operation result, and simultaneously by the close of code operation result
Text is sent to encrypting module;
The encrypting module is carried out showing after conversion after ciphertext code conversion or is applied to the ciphertext of code operation result
The ciphertext of (interface) accessible code operation result returns to server;
The server is by the ciphertext of non-switched code operation result and can show or transport using (interface) accessible code
The ciphertext of row result is merged, then is sent client browser for fusion results or applied (interface), and the browser is aobvious
Show or handles operation result corresponding with code request using (interface).
Compared with prior art, distributed code of the invention operation and interaction safety method and its system, server
Code is emitted to client after specific software algorithm process or application (interface) executes, and the code of sending still meets agreement
And the semantic requirements of code to be to guarantee the enforceability of code, but key message and code are all encrypted disposable ciphertexts.
Client or application (interface) will issue server, browser after dedicated module coordinates certification to the access request of server
Or application (interface) executes.It also has the following characteristics that simultaneously
1. code has safeguard protection in the memory of web or associated server, CPU, network, including encrypts and/or obscure, enables
Board etc. at most also only has part plaintext code without complete plaintext code, encrypts obtained in the encrypting module each time
Or integrality, the validity of the converted code of encryption are all different and unique, the implementing result of ciphertext code also right and wrong
In plain text, the binary result of its operation of the identical ciphertext code in source is also different, this has root with existing Code obfuscation
This difference.
2. code all has a safeguard protection in the hard disk of client, memory, CPU, browser, network, including encryption and/
Or obscure, is tokenized etc., without complete plaintext code, at most also there was only part plaintext code, each time from server
To encryption or integrality, the validity of the converted code of encryption be all different and unique, the execution knot of ciphertext code
Fruit is also ciphertext, and binary result of its operation of the identical ciphertext code in source is also different, this and existing code
Obscuring has basic difference.
3. encrypted state of the ciphertext code in client or application (interface) and the encryption in web or associated server
Disposable stochastic transformation relationship mathematically is only existed between literary state, can not find web or phase from the ciphertext code in client
Close corresponding code on server.
4. even if can not also find web or correlation code needs to be decrypted into client browser plaintext code execution
Corresponding ciphertext code, does not injure the safety of ciphertext code in web server on server.
5. human-computer interaction is also to be completed by disposable ciphertext code, usability, safety and the body of user are not influenced
The consistency tested.
6. application (interface) is also to be completed by disposable ciphertext code, usability, the safety, one of interface are not influenced
Cause property and integrality.
7. ciphertext code and original plaintext code have same enforceability, one for not influencing the usability of code and executing
Cause property.
8. identical its operation result of ciphertext code in source is secret and transparent for executor (computer (CPU))
, and be also every time it is different, but the effect of overall execution to attendee (such as people, using (interface) and encrypting module
Deng) equivalent, " correct " property is judged by the people that is serviced or computer.
9. disposable safe conversion can be carried out between ciphertext code and ciphertext code, the safety of ciphertext code is not injured
Property.
Detailed description of the invention
Fig. 1 is the schematic illustration of distributed code of the present invention operation and interaction one preferred embodiment of safety method.
Specific embodiment
In order to which technical problems, technical solutions and advantages to be solved are more clearly understood, tie below
Accompanying drawings and embodiments are closed, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only
To explain the present invention, it is not intended to limit the present invention.
It please refers to shown in Fig. 1, distributed code operation and the preferred embodiment of interaction safety method of the present invention, including as follows
Specific steps:
A, client browser or application (interface) issue the close cultural security execution of code dynamic to web or associated server and ask
It asks, the code includes code in plain text and/or code ciphertext, the code include the byte stream generation of executable source code, compiling
At least one of code, the cpu instruction code compiled etc., the safety executes the file system pair that request includes the server
The code carries out coding encrypting in plain text or/and carries out the request of ciphertext conversion dynamic generation code ciphertext etc. to the code ciphertext.
In this step, man-machine using disposable ciphertext between client browser or application (interface) and web or associated server
The interactive or disposable result mode called using (interface) is mutually communicated or is passed Transfer Parameters and request and response.
B, the file system proposes to carry out coding encrypting in plain text to the code to the encrypting module of web or associated server
Or the request of ciphertext code conversion is carried out to the code ciphertext, and code plaintext or cipher text is sent to encrypting module simultaneously.It is described
Code ciphertext includes variable parameter corresponding to code function and code function, is asked for example including soft keyboard, Cookie, token
Ask etc..Variable parameter corresponding to code function and code function is all safe, even if server and client side calculates
Machine CPU does not reach plaintext code, also without plaintext code in memory, only the talent can see understand code implementing result or/
With specific application (interface) ability authentication codes implementing result to mistake.
C, the encrypting module carries out coding encrypting to the code in plain text or carries out ciphertext code conversion to the code ciphertext
Executable code ciphertext after conversion is returned to the operating system of server afterwards.
D, the web server executable code ciphertext is executed, operation and processing, and obtain code operation knot
The ciphertext of fruit.It is described show or using (interface) accessible code operation result be ciphertext, the ciphertext include encryption and/or
Variable parameter corresponding to the code function and code function obscured at random etc..
E, before the ciphertext of the code operation result is pushed to client browser or application (interface), the service
Device first proposes to carry out the request of ciphertext code conversion to the ciphertext of code operation result to encrypting module, and runs code tie simultaneously
The ciphertext of fruit is sent to encrypting module.
F, the encrypting module carries out showing after conversion after ciphertext code conversion the ciphertext of code operation result
Or the ciphertext of application (interface) accessible code operation result returns to the server.It can show or can locate using (interface)
The ciphertext of the code operation result of reason is not limited to: in subcode, ciphertext, webfont, CSS, HTML, js code etc.
At least one of.
G, the server by the ciphertext of non-switched code operation result with can show or using (interface) it is accessible
The ciphertext of code operation result is merged, then is sent client browser for fusion results or applied (interface), the visitor
Family end browser is shown or application (interface) handles operation result corresponding with code request.It is sent to client in this step
End browser or the fusion results of application (interface) are disposably, are merged after refreshing, interactive and implementing result binary system is compiled
Code is not identical every time, and the semanteme of content that is that people sees or receiving using (interface) is to understand and constant.It is clear in client
Look at device or application (interface) in code and its operation be it is safe, without complete real code, without plain code human-computer interaction, implementing result
It is tokenized.The effect and original plaintext code correctness of client browser or application (interface) overall execution are equivalent: computer is held
Line code " correct ", human-computer interaction " correct ", " correct " are equal to " encrypting module can be confirmed " or " people can understand ").
In the present invention, step B and step C can be repeated several times until code ciphertext carries out ciphertext code conversion completely.
A kind of operation of distributed code and interaction security system of the invention, including client browser or application (connect
Mouthful), human-computer interaction and web or other kinds of server, encrypted file system, function call are provided in the server
Card module and encrypting module are intercepted,
The client browser issues the close cultural security of code dynamic to web or other kinds of server using (interface)
Request is executed, the code includes code in plain text and/or code ciphertext, the safety execute the text that request includes the server
Part system carries out coding encrypting in plain text to the code or/and carries out ciphertext conversion dynamic generation code ciphertext etc. to the code ciphertext
Request;
The file system proposes to carry out the code in plain text coding encrypting or to the code ciphertext to the encrypting module of server
The request of ciphertext code conversion is carried out, and code plaintext or cipher text is sent to encrypting module simultaneously;
The encrypting module code carry out in plain text coding encrypting or to this ciphertext code conversion is carried out to code ciphertext after will turn
The code ciphertext run after changing returns to the operating system of server;
The server executes the code ciphertext that can be run, operation and processing, and obtains the ciphertext of code operation result;
Before the ciphertext of the code operation result is pushed to client browser or application (interface), the server first to
Encrypting module proposes the ciphertext progress ciphertext code conversion request to code operation result, and simultaneously by the close of code operation result
Text is sent to encrypting module;
The encrypting module is carried out showing after conversion after ciphertext code conversion or is applied to the ciphertext of code operation result
The ciphertext of (interface) accessible code operation result returns to server;
The server is by the ciphertext of non-switched code operation result and can show or transport using (interface) accessible code
The ciphertext of row result is merged, then is sent client browser for fusion results or applied (interface), and the browser is aobvious
Show or handles operation result corresponding with code request using (interface).
The code is ciphertext, which includes variable parameter corresponding to code function and code function etc..Code
Variable parameter corresponding to function and code function is all safe, even if server and client computers CPU is contacted
Less than plaintext code, also without plaintext code in memory, only the talent, which can see, understands code implementing result or/and specific application
(interface) could authentication codes implementing result to mistake.It is described to show or be using (interface) accessible code operation result
Ciphertext, which includes variable parameter corresponding to encryption and/or the code function and code function obscured at random etc..Hair
The fusion results for being sent to client browser or application (interface) are disposably, merge after refreshing, is interactive and implementing result
Binary coding is not identical every time, that people sees or be that can understand and constant using the semanteme that (interface) receives content.It is described
File system to the encrypting module of associated server propose the code carry out in plain text coding encrypting or to the code ciphertext into
Executable code ciphertext after the request of row ciphertext code conversion returns to operating system and is repeated several times until code ciphertext is complete
It is complete to carry out ciphertext code conversion.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. a kind of distributed code operation and interaction safety method, which is characterized in that comprise the following specific steps that:
A, client browser or application (interface) issue the close cultural security execution of code dynamic to web or associated server and ask
It asks, the code includes code in plain text and/or code ciphertext, the safety execute the file system that request includes the server
It carries out coding encrypting in plain text to the code or/and carries out the request of ciphertext conversion dynamic generation code ciphertext to the code ciphertext;
B, the file system carries out coding encrypting or close to the code to the proposition of the encrypting module of server in plain text to the code
Text carries out the request of ciphertext code conversion, and code plaintext or cipher text is sent to encrypting module simultaneously;
C, the encrypting module will after carrying out coding encrypting in plain text to the code or carrying out ciphertext code conversion to the code ciphertext
Executable code ciphertext after conversion returns to the operating system of the server;
D, the server executable code ciphertext is executed, operation and processing, and obtain the close of code operation result
Text;
E, before the ciphertext of the code operation result is pushed to client browser or application (interface), the server is first
It proposes to carry out the request of ciphertext code conversion to the ciphertext of code operation result to encrypting module, and simultaneously by code operation result
Ciphertext is sent to encrypting module;
F, the encrypting module is carried out showing after conversion after ciphertext code conversion or is answered to the ciphertext of code operation result
Associated server is returned to the ciphertext of (interface) accessible code operation result;
G, the server by the ciphertext of non-switched code operation result and can be shown or using (interface) accessible code
The ciphertext of operation result is merged, then is sent client browser for fusion results or applied (interface), the client
Browser is shown or application (interface) handles operation result corresponding with code request.
2. distributed code operation as described in claim 1 and interaction safety method, which is characterized in that the code is close
Text, the ciphertext include variable parameter corresponding to code function and code function, all can safely be executed, even if clothes
Business device and client computer CPU do not reach plaintext code, and also without plaintext code in memory, the only talent can be seen clear
Implementing result or/and specific application (interface) could authentication result to mistake.
3. distributed code operation as described in claim 1 and interaction safety method, which is characterized in that described to show or answer
Ciphertext with (interface) accessible code operation result, the ciphertext include encryption and/or the code function obscured at random and
Variable parameter corresponding to code function.
4. distributed code operation as described in claim 1 and interaction safety method, which is characterized in that sent in step G
Fusion results to client browser or application (interface) are disposable, fusion, interactive and implementing result two after refreshing
Scale coding is not identical every time, and people, which sees, or the semanteme of content that receives using (interface) is can understand and constant.
5. distributed code operation as described in claim 1 and interaction safety method, which is characterized in that step B and step C are more
It is secondary to be repeated up to relevant code ciphertext and carry out ciphertext code conversion completely.
6. a kind of distributed code operation and interaction security system, which is characterized in that (connect including client browser or application
Mouthful), human-computer interaction and web or other kinds of server, encrypted file system, function call are provided in the server
Card module and encrypting module are intercepted,
The client browser or application (interface) issue the close cultural security of code dynamic to web or other associated servers and hold
Row request, the code includes code in plain text and/or code ciphertext, the safety execute the file that request includes the server
System carries out coding encrypting in plain text to the code or/and asks to code ciphertext progress ciphertext conversion dynamic generation code ciphertext
It asks;
The file system proposes to carry out the code in plain text coding encrypting or to the code ciphertext to the encrypting module of server
The request of ciphertext code conversion is carried out, and code plaintext or cipher text is sent to encrypting module simultaneously;
The encrypting module carries out coding encrypting in plain text to the code or will turn after carrying out ciphertext code conversion to the code ciphertext
The code ciphertext run after changing returns to the operating system of the server;
The server processes and executes the code ciphertext that can be run, and obtains the ciphertext of code operation result;
Before the ciphertext of the code operation result is pushed to client browser or application (interface), the server first to
Encrypting module proposes the ciphertext progress ciphertext code conversion request to code operation result, and simultaneously by the close of code operation result
Text is sent to encrypting module;
The encrypting module is carried out displayable after conversion after ciphertext code conversion or is answered to the ciphertext of code operation result
The ciphertext for the code operation result that can be processed and executed with (interface) returns to the server;
The ciphertext of non-switched code operation result and displayable or application (interface) can be handled execution by the server
The ciphertext of code operation result is merged, then is sent client browser for fusion results or applied (interface), described clear
Device of looking at is shown or application (interface) handles operation result corresponding with code request.
7. distributed code operation as claimed in claim 6 and interaction security system, which is characterized in that the code is close
Text, the ciphertext include variable parameter corresponding to code function and code function, all can safely be executed, even if clothes
Business device and client computer CPU do not reach plaintext code, and also without plaintext code in memory, the only talent can be seen clear
Implementing result or/and it is specific using (interface) could authenticate implementing result to mistake.
8. distributed code as described in claim 1 operation and interaction security system, which is characterized in that it is described displayable or
Ciphertext using (interface) accessible code operation result, the ciphertext include encryption and/or the code function obscured at random with
And variable parameter corresponding to code function.
9. distributed code operation as described in claim 1 and interaction security system, which is characterized in that it is clear to be sent to client
Look at device or application (interface) fusion results be it is disposable, merged after refreshing, interactive and implementing result binary coding it is every
It is secondary not identical, it is that people sees or be that can understand and constant using the semanteme that (interface) receives content.
10. distributed code operation as described in claim 1 and interaction security system, which is characterized in that the file system
It is proposed that the code carries out coding encrypting or carry out ciphertext coding to the code ciphertext to turn in plain text to the encrypting module of associated server
Executable code ciphertext after changing request returns to operating system and is repeated several times until code ciphertext carries out ciphertext volume completely
Code conversion.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711169348.3A CN109861945A (en) | 2017-11-22 | 2017-11-22 | A kind of distributed code operation and interactive safety method and its system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711169348.3A CN109861945A (en) | 2017-11-22 | 2017-11-22 | A kind of distributed code operation and interactive safety method and its system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109861945A true CN109861945A (en) | 2019-06-07 |
Family
ID=66887490
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711169348.3A Withdrawn CN109861945A (en) | 2017-11-22 | 2017-11-22 | A kind of distributed code operation and interactive safety method and its system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109861945A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113206838A (en) * | 2021-04-13 | 2021-08-03 | 武汉理工大学 | Data encryption and decryption method and system for Web system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050262343A1 (en) * | 2003-05-02 | 2005-11-24 | Jorgensen Jimi T | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
CN101694672A (en) * | 2009-10-16 | 2010-04-14 | 华中科技大学 | Distributed safe retrieval system |
US20120189122A1 (en) * | 2011-01-20 | 2012-07-26 | Yi-Li Huang | Method with dynamic keys for mutual authentication in wireless communication environments without prior authentication connection |
CN104166822A (en) * | 2013-05-20 | 2014-11-26 | 阿里巴巴集团控股有限公司 | Data protecting method and device |
CN104885093A (en) * | 2012-12-12 | 2015-09-02 | 思杰系统有限公司 | Encryption-based data access management |
CN105704149A (en) * | 2016-03-24 | 2016-06-22 | 国网江苏省电力公司电力科学研究院 | Safety protection method for power mobile application |
-
2017
- 2017-11-22 CN CN201711169348.3A patent/CN109861945A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050262343A1 (en) * | 2003-05-02 | 2005-11-24 | Jorgensen Jimi T | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
CN101694672A (en) * | 2009-10-16 | 2010-04-14 | 华中科技大学 | Distributed safe retrieval system |
US20120189122A1 (en) * | 2011-01-20 | 2012-07-26 | Yi-Li Huang | Method with dynamic keys for mutual authentication in wireless communication environments without prior authentication connection |
CN104885093A (en) * | 2012-12-12 | 2015-09-02 | 思杰系统有限公司 | Encryption-based data access management |
CN104166822A (en) * | 2013-05-20 | 2014-11-26 | 阿里巴巴集团控股有限公司 | Data protecting method and device |
CN105704149A (en) * | 2016-03-24 | 2016-06-22 | 国网江苏省电力公司电力科学研究院 | Safety protection method for power mobile application |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113206838A (en) * | 2021-04-13 | 2021-08-03 | 武汉理工大学 | Data encryption and decryption method and system for Web system |
CN113206838B (en) * | 2021-04-13 | 2022-07-05 | 武汉理工大学 | Data encryption and decryption method and system for Web system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10511436B1 (en) | Protecting key material using white-box cryptography and split key techniques | |
US9836612B2 (en) | Protecting data | |
US9077710B1 (en) | Distributed storage of password data | |
CN110008745B (en) | Encryption method, computer equipment and computer storage medium | |
CN114900338B (en) | Encryption and decryption method, device, equipment and medium | |
JP5742849B2 (en) | Encrypted database system, client terminal, encrypted database server, natural join method and program | |
CN108154038B (en) | Data processing method and device | |
US9749130B2 (en) | Distributing keys for decrypting client data | |
CN105991563B (en) | Method and device for protecting security of sensitive data and three-party service system | |
CN110889696A (en) | Storage method, device, equipment and medium for alliance block chain secret key based on SGX technology | |
CN110138818B (en) | Method, website application, system, device and service back-end for transmitting parameters | |
WO2023029447A1 (en) | Model protection method, device, apparatus, system and storage medium | |
CN103179129A (en) | Remote attestation method based on cloud computing infrastructure as a service (IaaS) environment | |
CN103414727A (en) | Encryption protection system for input password input box and using method thereof | |
CN111787005A (en) | Dynamic encrypted secure login method and device | |
CN110851800A (en) | Code protection method, device, system and readable storage medium | |
CN113630412B (en) | Resource downloading method, resource downloading device, electronic equipment and storage medium | |
CN105657699A (en) | Safe data transmission method | |
CN115276978A (en) | Data processing method and related device | |
CN114697113A (en) | Hardware accelerator card-based multi-party privacy calculation method, device and system | |
CN109861945A (en) | A kind of distributed code operation and interactive safety method and its system | |
CN114726511A (en) | Data processing method and device | |
CN114036546A (en) | Identity verification method and device based on mobile phone number, computer equipment and medium | |
Ali et al. | Architectural Design for Data Security in Cloud-based Big Data Systems | |
CN109858241A (en) | A kind of single device code security executes and exchange method and its interactive system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190607 |
|
WW01 | Invention patent application withdrawn after publication |