CN109861945A - A kind of distributed code operation and interactive safety method and its system - Google Patents

A kind of distributed code operation and interactive safety method and its system Download PDF

Info

Publication number
CN109861945A
CN109861945A CN201711169348.3A CN201711169348A CN109861945A CN 109861945 A CN109861945 A CN 109861945A CN 201711169348 A CN201711169348 A CN 201711169348A CN 109861945 A CN109861945 A CN 109861945A
Authority
CN
China
Prior art keywords
code
ciphertext
server
interface
operation result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711169348.3A
Other languages
Chinese (zh)
Inventor
曹耀和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Zhibei Information Technology Co Ltd
Original Assignee
Zhejiang Zhibei Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Zhibei Information Technology Co Ltd filed Critical Zhejiang Zhibei Information Technology Co Ltd
Priority to CN201711169348.3A priority Critical patent/CN109861945A/en
Publication of CN109861945A publication Critical patent/CN109861945A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of operation of distributed code and interaction safety method and its systems, including client browser or application (interface) and web or other kinds of server, it is provided with encrypted file system and function call interception card module and encrypting module in the server, client browser or application (interface) issue code dynamic security to server and execute request, and file system requests encrypting module carries out coding encrypting and generates code ciphertext;Encrypting module returns to operating system after carrying out ciphertext code conversion;Server first proposes to carry out the request of ciphertext code conversion to code operation result to encrypting module;Server by the ciphertext of non-switched code operation result with can show or merge using the ciphertext of (interface) accessible code operation result, fusion results are sent to browser or application (interface).The safety of operation code in effective protection web server of the present invention.

Description

A kind of distributed code operation and interactive safety method and its system
Technical field
The invention belongs to the operation of distribution Web, network, calculating and service code and the technical fields of interaction safety, especially It is related to a kind of distributed code operation and interactive safety method and its system.
Background technique
Existing distributed network and service be easy it is hacked, even if being mounted with encryption safe in web server Software still easily loses protective effect by hack, so that the code operation and interaction safety in web server cannot get Reliable guarantee, especially computer always have an opportunity the plaintext code information for touching code.The prior art is further improved And raising.
Summary of the invention
Technical problem to be solved by the present invention lies in, provide a kind of operation of distributed code and interaction safety method and its System protects the safety of web and the code in other kinds of server, it is ensured that code in the memory of server, CPU, to mutual Networking, client, the memory in browser, in CPU all not the plaintext code of complete set, even wholly without plaintext generation Code, it is ensured that the safety of code and its execution and client human-computer interaction and application (interface) in server.
The invention is realized in this way providing a kind of distributed code operation and interactive safety method, including following specific Step:
A, client browser or application interface issue the close cultural security of code dynamic to web or associated server and execute request, The code includes code in plain text and/or code ciphertext, the safety execute the file system pair that request includes the server The code carries out coding encrypting in plain text or/and carries out the request of ciphertext conversion dynamic generation code ciphertext to the code ciphertext;
B, the file system carries out coding encrypting or close to the code to the proposition of the encrypting module of server in plain text to the code Text carries out the request of ciphertext code conversion, and code plaintext or cipher text is sent to encrypting module simultaneously;
C, the encrypting module will after carrying out coding encrypting in plain text to the code or carrying out ciphertext code conversion to the code ciphertext Executable code ciphertext after conversion returns to the operating system of the server;
D, the server executable code ciphertext is executed, operation and processing, and obtain the close of code operation result Text;
E, before the ciphertext of the code operation result is pushed to client browser or application (interface), the server is first It proposes to carry out the request of ciphertext code conversion to the ciphertext of code operation result to encrypting module, and simultaneously by code operation result Ciphertext is sent to encrypting module;
F, the encrypting module is carried out showing after conversion after ciphertext code conversion or is answered to the ciphertext of code operation result The server is returned to the ciphertext of (interface) accessible code operation result;
G, the server by the ciphertext of non-switched code operation result and can be shown or using (interface) accessible code The ciphertext of operation result is merged, then is sent client browser for fusion results or applied (interface), the client Browser is shown or application (interface) handles operation result corresponding with code request.
The invention is realized in this way providing a kind of distributed code operation and interactive security system, including client is clear It lookes at device or application (interface), human-computer interaction and web or other kinds of server, encryption file is provided in the server System, function call interception card module and encrypting module,
The client browser or application (interface) issue the close cultural security of code dynamic to web or other types server and hold Row request, the code includes code in plain text and/or code ciphertext, the safety execute the file that request includes the server System carries out coding encrypting in plain text to the code or/and asks to code ciphertext progress ciphertext conversion dynamic generation code ciphertext It asks;
The file system proposes to carry out the code in plain text coding encrypting or to the code ciphertext to the encrypting module of server The request of ciphertext code conversion is carried out, and code plaintext or cipher text is sent to encrypting module simultaneously;
The encrypting module carries out coding encrypting in plain text to the code or will turn after carrying out ciphertext code conversion to the code ciphertext The code ciphertext run after changing returns to the operating system of server;
The server executes the code ciphertext that can be run, operation and processing, and obtains the ciphertext of code operation result;
Before the ciphertext of the code operation result is pushed to client browser or application (interface), the server first to Encrypting module proposes the ciphertext progress ciphertext code conversion request to code operation result, and simultaneously by the close of code operation result Text is sent to encrypting module;
The encrypting module is carried out showing after conversion after ciphertext code conversion or is applied to the ciphertext of code operation result The ciphertext of (interface) accessible code operation result returns to server;
The server is by the ciphertext of non-switched code operation result and can show or transport using (interface) accessible code The ciphertext of row result is merged, then is sent client browser for fusion results or applied (interface), and the browser is aobvious Show or handles operation result corresponding with code request using (interface).
Compared with prior art, distributed code of the invention operation and interaction safety method and its system, server Code is emitted to client after specific software algorithm process or application (interface) executes, and the code of sending still meets agreement And the semantic requirements of code to be to guarantee the enforceability of code, but key message and code are all encrypted disposable ciphertexts. Client or application (interface) will issue server, browser after dedicated module coordinates certification to the access request of server Or application (interface) executes.It also has the following characteristics that simultaneously
1. code has safeguard protection in the memory of web or associated server, CPU, network, including encrypts and/or obscure, enables Board etc. at most also only has part plaintext code without complete plaintext code, encrypts obtained in the encrypting module each time Or integrality, the validity of the converted code of encryption are all different and unique, the implementing result of ciphertext code also right and wrong In plain text, the binary result of its operation of the identical ciphertext code in source is also different, this has root with existing Code obfuscation This difference.
2. code all has a safeguard protection in the hard disk of client, memory, CPU, browser, network, including encryption and/ Or obscure, is tokenized etc., without complete plaintext code, at most also there was only part plaintext code, each time from server To encryption or integrality, the validity of the converted code of encryption be all different and unique, the execution knot of ciphertext code Fruit is also ciphertext, and binary result of its operation of the identical ciphertext code in source is also different, this and existing code Obscuring has basic difference.
3. encrypted state of the ciphertext code in client or application (interface) and the encryption in web or associated server Disposable stochastic transformation relationship mathematically is only existed between literary state, can not find web or phase from the ciphertext code in client Close corresponding code on server.
4. even if can not also find web or correlation code needs to be decrypted into client browser plaintext code execution Corresponding ciphertext code, does not injure the safety of ciphertext code in web server on server.
5. human-computer interaction is also to be completed by disposable ciphertext code, usability, safety and the body of user are not influenced The consistency tested.
6. application (interface) is also to be completed by disposable ciphertext code, usability, the safety, one of interface are not influenced Cause property and integrality.
7. ciphertext code and original plaintext code have same enforceability, one for not influencing the usability of code and executing Cause property.
8. identical its operation result of ciphertext code in source is secret and transparent for executor (computer (CPU)) , and be also every time it is different, but the effect of overall execution to attendee (such as people, using (interface) and encrypting module Deng) equivalent, " correct " property is judged by the people that is serviced or computer.
9. disposable safe conversion can be carried out between ciphertext code and ciphertext code, the safety of ciphertext code is not injured Property.
Detailed description of the invention
Fig. 1 is the schematic illustration of distributed code of the present invention operation and interaction one preferred embodiment of safety method.
Specific embodiment
In order to which technical problems, technical solutions and advantages to be solved are more clearly understood, tie below Accompanying drawings and embodiments are closed, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only To explain the present invention, it is not intended to limit the present invention.
It please refers to shown in Fig. 1, distributed code operation and the preferred embodiment of interaction safety method of the present invention, including as follows Specific steps:
A, client browser or application (interface) issue the close cultural security execution of code dynamic to web or associated server and ask It asks, the code includes code in plain text and/or code ciphertext, the code include the byte stream generation of executable source code, compiling At least one of code, the cpu instruction code compiled etc., the safety executes the file system pair that request includes the server The code carries out coding encrypting in plain text or/and carries out the request of ciphertext conversion dynamic generation code ciphertext etc. to the code ciphertext. In this step, man-machine using disposable ciphertext between client browser or application (interface) and web or associated server The interactive or disposable result mode called using (interface) is mutually communicated or is passed Transfer Parameters and request and response.
B, the file system proposes to carry out coding encrypting in plain text to the code to the encrypting module of web or associated server Or the request of ciphertext code conversion is carried out to the code ciphertext, and code plaintext or cipher text is sent to encrypting module simultaneously.It is described Code ciphertext includes variable parameter corresponding to code function and code function, is asked for example including soft keyboard, Cookie, token Ask etc..Variable parameter corresponding to code function and code function is all safe, even if server and client side calculates Machine CPU does not reach plaintext code, also without plaintext code in memory, only the talent can see understand code implementing result or/ With specific application (interface) ability authentication codes implementing result to mistake.
C, the encrypting module carries out coding encrypting to the code in plain text or carries out ciphertext code conversion to the code ciphertext Executable code ciphertext after conversion is returned to the operating system of server afterwards.
D, the web server executable code ciphertext is executed, operation and processing, and obtain code operation knot The ciphertext of fruit.It is described show or using (interface) accessible code operation result be ciphertext, the ciphertext include encryption and/or Variable parameter corresponding to the code function and code function obscured at random etc..
E, before the ciphertext of the code operation result is pushed to client browser or application (interface), the service Device first proposes to carry out the request of ciphertext code conversion to the ciphertext of code operation result to encrypting module, and runs code tie simultaneously The ciphertext of fruit is sent to encrypting module.
F, the encrypting module carries out showing after conversion after ciphertext code conversion the ciphertext of code operation result Or the ciphertext of application (interface) accessible code operation result returns to the server.It can show or can locate using (interface) The ciphertext of the code operation result of reason is not limited to: in subcode, ciphertext, webfont, CSS, HTML, js code etc. At least one of.
G, the server by the ciphertext of non-switched code operation result with can show or using (interface) it is accessible The ciphertext of code operation result is merged, then is sent client browser for fusion results or applied (interface), the visitor Family end browser is shown or application (interface) handles operation result corresponding with code request.It is sent to client in this step End browser or the fusion results of application (interface) are disposably, are merged after refreshing, interactive and implementing result binary system is compiled Code is not identical every time, and the semanteme of content that is that people sees or receiving using (interface) is to understand and constant.It is clear in client Look at device or application (interface) in code and its operation be it is safe, without complete real code, without plain code human-computer interaction, implementing result It is tokenized.The effect and original plaintext code correctness of client browser or application (interface) overall execution are equivalent: computer is held Line code " correct ", human-computer interaction " correct ", " correct " are equal to " encrypting module can be confirmed " or " people can understand ").
In the present invention, step B and step C can be repeated several times until code ciphertext carries out ciphertext code conversion completely.
A kind of operation of distributed code and interaction security system of the invention, including client browser or application (connect Mouthful), human-computer interaction and web or other kinds of server, encrypted file system, function call are provided in the server Card module and encrypting module are intercepted,
The client browser issues the close cultural security of code dynamic to web or other kinds of server using (interface) Request is executed, the code includes code in plain text and/or code ciphertext, the safety execute the text that request includes the server Part system carries out coding encrypting in plain text to the code or/and carries out ciphertext conversion dynamic generation code ciphertext etc. to the code ciphertext Request;
The file system proposes to carry out the code in plain text coding encrypting or to the code ciphertext to the encrypting module of server The request of ciphertext code conversion is carried out, and code plaintext or cipher text is sent to encrypting module simultaneously;
The encrypting module code carry out in plain text coding encrypting or to this ciphertext code conversion is carried out to code ciphertext after will turn The code ciphertext run after changing returns to the operating system of server;
The server executes the code ciphertext that can be run, operation and processing, and obtains the ciphertext of code operation result;
Before the ciphertext of the code operation result is pushed to client browser or application (interface), the server first to Encrypting module proposes the ciphertext progress ciphertext code conversion request to code operation result, and simultaneously by the close of code operation result Text is sent to encrypting module;
The encrypting module is carried out showing after conversion after ciphertext code conversion or is applied to the ciphertext of code operation result The ciphertext of (interface) accessible code operation result returns to server;
The server is by the ciphertext of non-switched code operation result and can show or transport using (interface) accessible code The ciphertext of row result is merged, then is sent client browser for fusion results or applied (interface), and the browser is aobvious Show or handles operation result corresponding with code request using (interface).
The code is ciphertext, which includes variable parameter corresponding to code function and code function etc..Code Variable parameter corresponding to function and code function is all safe, even if server and client computers CPU is contacted Less than plaintext code, also without plaintext code in memory, only the talent, which can see, understands code implementing result or/and specific application (interface) could authentication codes implementing result to mistake.It is described to show or be using (interface) accessible code operation result Ciphertext, which includes variable parameter corresponding to encryption and/or the code function and code function obscured at random etc..Hair The fusion results for being sent to client browser or application (interface) are disposably, merge after refreshing, is interactive and implementing result Binary coding is not identical every time, that people sees or be that can understand and constant using the semanteme that (interface) receives content.It is described File system to the encrypting module of associated server propose the code carry out in plain text coding encrypting or to the code ciphertext into Executable code ciphertext after the request of row ciphertext code conversion returns to operating system and is repeated several times until code ciphertext is complete It is complete to carry out ciphertext code conversion.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (10)

1. a kind of distributed code operation and interaction safety method, which is characterized in that comprise the following specific steps that:
A, client browser or application (interface) issue the close cultural security execution of code dynamic to web or associated server and ask It asks, the code includes code in plain text and/or code ciphertext, the safety execute the file system that request includes the server It carries out coding encrypting in plain text to the code or/and carries out the request of ciphertext conversion dynamic generation code ciphertext to the code ciphertext;
B, the file system carries out coding encrypting or close to the code to the proposition of the encrypting module of server in plain text to the code Text carries out the request of ciphertext code conversion, and code plaintext or cipher text is sent to encrypting module simultaneously;
C, the encrypting module will after carrying out coding encrypting in plain text to the code or carrying out ciphertext code conversion to the code ciphertext Executable code ciphertext after conversion returns to the operating system of the server;
D, the server executable code ciphertext is executed, operation and processing, and obtain the close of code operation result Text;
E, before the ciphertext of the code operation result is pushed to client browser or application (interface), the server is first It proposes to carry out the request of ciphertext code conversion to the ciphertext of code operation result to encrypting module, and simultaneously by code operation result Ciphertext is sent to encrypting module;
F, the encrypting module is carried out showing after conversion after ciphertext code conversion or is answered to the ciphertext of code operation result Associated server is returned to the ciphertext of (interface) accessible code operation result;
G, the server by the ciphertext of non-switched code operation result and can be shown or using (interface) accessible code The ciphertext of operation result is merged, then is sent client browser for fusion results or applied (interface), the client Browser is shown or application (interface) handles operation result corresponding with code request.
2. distributed code operation as described in claim 1 and interaction safety method, which is characterized in that the code is close Text, the ciphertext include variable parameter corresponding to code function and code function, all can safely be executed, even if clothes Business device and client computer CPU do not reach plaintext code, and also without plaintext code in memory, the only talent can be seen clear Implementing result or/and specific application (interface) could authentication result to mistake.
3. distributed code operation as described in claim 1 and interaction safety method, which is characterized in that described to show or answer Ciphertext with (interface) accessible code operation result, the ciphertext include encryption and/or the code function obscured at random and Variable parameter corresponding to code function.
4. distributed code operation as described in claim 1 and interaction safety method, which is characterized in that sent in step G Fusion results to client browser or application (interface) are disposable, fusion, interactive and implementing result two after refreshing Scale coding is not identical every time, and people, which sees, or the semanteme of content that receives using (interface) is can understand and constant.
5. distributed code operation as described in claim 1 and interaction safety method, which is characterized in that step B and step C are more It is secondary to be repeated up to relevant code ciphertext and carry out ciphertext code conversion completely.
6. a kind of distributed code operation and interaction security system, which is characterized in that (connect including client browser or application Mouthful), human-computer interaction and web or other kinds of server, encrypted file system, function call are provided in the server Card module and encrypting module are intercepted,
The client browser or application (interface) issue the close cultural security of code dynamic to web or other associated servers and hold Row request, the code includes code in plain text and/or code ciphertext, the safety execute the file that request includes the server System carries out coding encrypting in plain text to the code or/and asks to code ciphertext progress ciphertext conversion dynamic generation code ciphertext It asks;
The file system proposes to carry out the code in plain text coding encrypting or to the code ciphertext to the encrypting module of server The request of ciphertext code conversion is carried out, and code plaintext or cipher text is sent to encrypting module simultaneously;
The encrypting module carries out coding encrypting in plain text to the code or will turn after carrying out ciphertext code conversion to the code ciphertext The code ciphertext run after changing returns to the operating system of the server;
The server processes and executes the code ciphertext that can be run, and obtains the ciphertext of code operation result;
Before the ciphertext of the code operation result is pushed to client browser or application (interface), the server first to Encrypting module proposes the ciphertext progress ciphertext code conversion request to code operation result, and simultaneously by the close of code operation result Text is sent to encrypting module;
The encrypting module is carried out displayable after conversion after ciphertext code conversion or is answered to the ciphertext of code operation result The ciphertext for the code operation result that can be processed and executed with (interface) returns to the server;
The ciphertext of non-switched code operation result and displayable or application (interface) can be handled execution by the server The ciphertext of code operation result is merged, then is sent client browser for fusion results or applied (interface), described clear Device of looking at is shown or application (interface) handles operation result corresponding with code request.
7. distributed code operation as claimed in claim 6 and interaction security system, which is characterized in that the code is close Text, the ciphertext include variable parameter corresponding to code function and code function, all can safely be executed, even if clothes Business device and client computer CPU do not reach plaintext code, and also without plaintext code in memory, the only talent can be seen clear Implementing result or/and it is specific using (interface) could authenticate implementing result to mistake.
8. distributed code as described in claim 1 operation and interaction security system, which is characterized in that it is described displayable or Ciphertext using (interface) accessible code operation result, the ciphertext include encryption and/or the code function obscured at random with And variable parameter corresponding to code function.
9. distributed code operation as described in claim 1 and interaction security system, which is characterized in that it is clear to be sent to client Look at device or application (interface) fusion results be it is disposable, merged after refreshing, interactive and implementing result binary coding it is every It is secondary not identical, it is that people sees or be that can understand and constant using the semanteme that (interface) receives content.
10. distributed code operation as described in claim 1 and interaction security system, which is characterized in that the file system It is proposed that the code carries out coding encrypting or carry out ciphertext coding to the code ciphertext to turn in plain text to the encrypting module of associated server Executable code ciphertext after changing request returns to operating system and is repeated several times until code ciphertext carries out ciphertext volume completely Code conversion.
CN201711169348.3A 2017-11-22 2017-11-22 A kind of distributed code operation and interactive safety method and its system Withdrawn CN109861945A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711169348.3A CN109861945A (en) 2017-11-22 2017-11-22 A kind of distributed code operation and interactive safety method and its system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711169348.3A CN109861945A (en) 2017-11-22 2017-11-22 A kind of distributed code operation and interactive safety method and its system

Publications (1)

Publication Number Publication Date
CN109861945A true CN109861945A (en) 2019-06-07

Family

ID=66887490

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711169348.3A Withdrawn CN109861945A (en) 2017-11-22 2017-11-22 A kind of distributed code operation and interactive safety method and its system

Country Status (1)

Country Link
CN (1) CN109861945A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113206838A (en) * 2021-04-13 2021-08-03 武汉理工大学 Data encryption and decryption method and system for Web system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050262343A1 (en) * 2003-05-02 2005-11-24 Jorgensen Jimi T Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
CN101694672A (en) * 2009-10-16 2010-04-14 华中科技大学 Distributed safe retrieval system
US20120189122A1 (en) * 2011-01-20 2012-07-26 Yi-Li Huang Method with dynamic keys for mutual authentication in wireless communication environments without prior authentication connection
CN104166822A (en) * 2013-05-20 2014-11-26 阿里巴巴集团控股有限公司 Data protecting method and device
CN104885093A (en) * 2012-12-12 2015-09-02 思杰系统有限公司 Encryption-based data access management
CN105704149A (en) * 2016-03-24 2016-06-22 国网江苏省电力公司电力科学研究院 Safety protection method for power mobile application

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050262343A1 (en) * 2003-05-02 2005-11-24 Jorgensen Jimi T Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
CN101694672A (en) * 2009-10-16 2010-04-14 华中科技大学 Distributed safe retrieval system
US20120189122A1 (en) * 2011-01-20 2012-07-26 Yi-Li Huang Method with dynamic keys for mutual authentication in wireless communication environments without prior authentication connection
CN104885093A (en) * 2012-12-12 2015-09-02 思杰系统有限公司 Encryption-based data access management
CN104166822A (en) * 2013-05-20 2014-11-26 阿里巴巴集团控股有限公司 Data protecting method and device
CN105704149A (en) * 2016-03-24 2016-06-22 国网江苏省电力公司电力科学研究院 Safety protection method for power mobile application

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113206838A (en) * 2021-04-13 2021-08-03 武汉理工大学 Data encryption and decryption method and system for Web system
CN113206838B (en) * 2021-04-13 2022-07-05 武汉理工大学 Data encryption and decryption method and system for Web system

Similar Documents

Publication Publication Date Title
US10511436B1 (en) Protecting key material using white-box cryptography and split key techniques
US9836612B2 (en) Protecting data
US9077710B1 (en) Distributed storage of password data
CN110008745B (en) Encryption method, computer equipment and computer storage medium
CN114900338B (en) Encryption and decryption method, device, equipment and medium
JP5742849B2 (en) Encrypted database system, client terminal, encrypted database server, natural join method and program
CN108154038B (en) Data processing method and device
US9749130B2 (en) Distributing keys for decrypting client data
CN105991563B (en) Method and device for protecting security of sensitive data and three-party service system
CN110889696A (en) Storage method, device, equipment and medium for alliance block chain secret key based on SGX technology
CN110138818B (en) Method, website application, system, device and service back-end for transmitting parameters
WO2023029447A1 (en) Model protection method, device, apparatus, system and storage medium
CN103179129A (en) Remote attestation method based on cloud computing infrastructure as a service (IaaS) environment
CN103414727A (en) Encryption protection system for input password input box and using method thereof
CN111787005A (en) Dynamic encrypted secure login method and device
CN110851800A (en) Code protection method, device, system and readable storage medium
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN105657699A (en) Safe data transmission method
CN115276978A (en) Data processing method and related device
CN114697113A (en) Hardware accelerator card-based multi-party privacy calculation method, device and system
CN109861945A (en) A kind of distributed code operation and interactive safety method and its system
CN114726511A (en) Data processing method and device
CN114036546A (en) Identity verification method and device based on mobile phone number, computer equipment and medium
Ali et al. Architectural Design for Data Security in Cloud-based Big Data Systems
CN109858241A (en) A kind of single device code security executes and exchange method and its interactive system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20190607

WW01 Invention patent application withdrawn after publication