CN111130796B - Secure online cloud storage method in instant messaging - Google Patents

Secure online cloud storage method in instant messaging Download PDF

Info

Publication number
CN111130796B
CN111130796B CN201911332197.8A CN201911332197A CN111130796B CN 111130796 B CN111130796 B CN 111130796B CN 201911332197 A CN201911332197 A CN 201911332197A CN 111130796 B CN111130796 B CN 111130796B
Authority
CN
China
Prior art keywords
cloud storage
data
instant messaging
server
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911332197.8A
Other languages
Chinese (zh)
Other versions
CN111130796A (en
Inventor
徐欣
王德富
陈木市
姜显扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Ansiyuan Technology Co ltd
Original Assignee
Hangzhou Ansiyuan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Ansiyuan Technology Co ltd filed Critical Hangzhou Ansiyuan Technology Co ltd
Priority to CN201911332197.8A priority Critical patent/CN111130796B/en
Publication of CN111130796A publication Critical patent/CN111130796A/en
Application granted granted Critical
Publication of CN111130796B publication Critical patent/CN111130796B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention relates to a secure online cloud storage method in instant messaging. The existing storage method needs to download data and then upload the data through application software stored in a cloud, so that additional work is added. The instant messaging server comprises a pair of public key and private key for asymmetric encryption, a hash function operation module and a data encryption/decryption module, wherein the private key is stored in the local of the server, and the public key is distributed to each client for storage; the client comprises a symmetric key for symmetric encryption, a hash function operation module and a data encryption/decryption module. Before data transmission, the instant communication server encrypts the data to be stored through an algorithm to ensure the safety, and generates a message digest through hash function operation to serve as a basis for data integrity verification. According to the method, the data do not need to be downloaded to the local and then uploaded to the cloud storage by using the cloud storage application software, and meanwhile, the data are transmitted to the cloud storage server in a ciphertext mode, so that the safety of the data is guaranteed.

Description

Secure online cloud storage method in instant messaging
Technical Field
The invention belongs to the technical field of information and communication, particularly relates to the field of communication safety, and relates to a safe online cloud storage method in instant messaging.
Background
With the continuous development of computer networks, the application fields and ranges become wider and wider. Particularly, with the advent of the 5G era, the human society starts to step into the living mode of the internet of things + with the increase of massive data. User devices that tend to receive such data are not able to keep up with their growing pace in terms of processing power and storage capacity. The advent of cloud storage technology has provided a solution to these problems. The cloud storage is a technology that hardware storage resources with different structures and protocols are integrated by a service provider to form an integral storage body which is transparent to the outside, and a user can store data which cannot be stored due to the capacity limitation of storage equipment to a cloud end and download the data when needed by providing a data storage interface service for the user to operate charging. The required storage capacity can be obtained at a small cost. However, for the current cloud storage technology, a great problem is the trust degree of a user on a cloud storage service provider, and the user cannot be sure that a cloud storage service party does not have good curiosity on data stored by the cloud storage service party. Since the data is stored in the cloud without being controlled by the data owner, the data storage is worried by the user.
The data generation source field in real life is complex and various, and on a virtual network, main information generated by interpersonal communication comes from instant messaging software. With the development of the times, the instant messaging software is not only a carrying tool for people to remotely communicate, but at the present stage, the instant messaging software is more and more in office, and people transmit files, pictures, videos and the like through the instant messaging software. In some cases, currently received data does not need to be processed immediately for a receiver, and the receiver prefers to store the currently received data in the cloud and download the currently received data back when needed, and meanwhile local storage space is saved. However, this method requires downloading data and uploading the data through application software stored in the cloud, which increases additional work. Therefore, the establishment of an instant messaging data online cloud storage safety mechanism is of great significance.
Disclosure of Invention
The invention aims to provide a secure online cloud storage method in instant messaging, which is used for directly storing data in forms of texts, pictures, videos and the like received by an instant messaging user in a communication process to a cloud terminal through authorization.
The method of the invention avoids the operation that the user downloads the data from the instant messaging server and then uploads the data to the cloud end from the local. Before data transmission, the instant communication server encrypts data to be stored through an algorithm to guarantee safety, and generates a message digest through hash function operation to serve as a basis for data integrity verification. Meanwhile, the trust problem between the instant messaging server and the cloud storage server is coordinated.
The online cloud storage system comprises an instant messaging server, a cloud storage server and a client served by the instant messaging server and the cloud storage server. Wherein, the instant communication server comprises a pair of public keys K for asymmetric encryptionpubAnd a private key KpriThe hash function operation module and the data encryption/decryption module; the client comprises a symmetric key K for symmetric encryptionsymThe device comprises a hash function operation module and a data encryption/decryption module.
Private key K in public and private key pair of instant messaging serverpriStored locally in the server, public key KpubDistributed to each client for storage, KpubThe encryption method is used for encrypting the private data in communication with the instant messaging server. Symmetric key K of clientsymAnd encryption of data uploaded to the cloud storage server.
The symmetric encryption algorithm has the characteristics of complex algorithm, long processing time and high safety; the asymmetric encryption algorithm has the characteristics of high encryption speed and lower security than asymmetric encryption. The data is encrypted by using the symmetric encryption algorithm, and the asymmetric algorithm encryption symmetric key can give consideration to the safety and the high efficiency of the encryption process.
The data storage process comprises the following specific steps:
the method comprises the following steps that (1) the client receives data sent by other clients in the communication process, and directly sends an online cloud storage request to a server according to the data without downloading operation;
step (2), after receiving the client request, the instant messaging server sends a connection establishment request to the cloud storage server;
step (3), the cloud storage server checks whether a binding relationship exists between a cloud storage account and an instant messaging account applying online cloud storage: if yes, the connection request is agreed; if not, performing the step (4);
step (4), the cloud storage server sends a verification message to the client through the instant messaging server; after receiving the message, the client user confirms the authorization binding of the instant messaging service account and the cloud storage account; after receiving the confirmation message of the client, the cloud storage server establishes connection with the instant messaging server and confirms and stores the binding relationship between the user instant messaging account and the cloud storage account;
step (5), the cloud storage server sends a cloud storage catalog of a client user to the instant messaging server, and the instant messaging server forwards the cloud storage catalog to the client;
step (6), the client side carries out selection operation on the cloud storage catalog, and the symmetric key K is used forsymUsing the public key K of the instant messaging serverpubEncrypting, and encrypting the encrypted KsymSending the information and the selection information of the cloud storage catalog to an instant messaging server;
step (7), the instant communication server utilizes the private key KpriDecipher out KsymBy KsymEncrypting data to be stored, and sending the encrypted data and the selection information of the cloud storage catalog of the client to the cloud storage server;
after receiving the information, the cloud storage server stores the data according to the storage directory information selected by the client, and generates a group of random sequence numbers as storage sequence numbers Seq for the current storage operation and returns the sequence numbers to the instant messaging server;
step (9), after receiving the Seq, the instant communication server performs hash function operation on the stored data to generate a message digest D1D is1Sent to the client along with Seq.
Step (10), the client receives and stores D1And Seq to local; and the client sends a confirmation message to the instant messaging server, and the instant messaging server forwards the confirmation message to the cloud storage server to finish the online cloud storage operation.
When the user needs to use the stored data, the client logs in the cloud storage server to download the cloud data, and the cloud storage server sends the data selected by the client and the corresponding Seq to the client. The client side carries out the hash function operation on the downloaded ciphertext data as same as that of the instant messaging server to obtain a message digest D2And D is2With locally stored D queried by Seq1A comparison is made whereby the integrity of the data is verified: if it isThe two are consistent, the data is proved to be complete and error-free, and the client uses the locally stored KsymCarrying out data decryption to obtain plaintext information; and if the data are inconsistent, the client refuses to store the data.
In the system members, the client considers that the instant messaging server is a complete trusted authority and considers that the cloud storage server is an incomplete trusted authority. The cloud storage server and the instant communication server mutually consider each other as an incomplete trusted authority.
The mutual recognition of the cloud storage server and the instant communication server as an incomplete trusted authority is represented by:
the user data stored to the cloud end by the instant communication server is stored in an encrypted ciphertext form, and the instant communication server performs hash function operation on the data to generate a message digest D1Providing a basis for the integrity check of the data downloaded by the user later; when the cloud storage server sends the storage directory of the user to the instant messaging client, the storage directory does not contain file content.
Further, in the step (1), the transmission data requested by the client user to perform online cloud storage is one or more of text, audio, picture and video.
Further, in the step (4), the authorization form of the client user authentication and the instant messaging server is a cloud storage account password login authentication mode.
Further, in step (6), the client utilizes KpubEncryption KsymUtilizing K with instant messaging serverpriDecryption KsymThe algorithm used is the same one of RSA, ELGamal, elliptic curve, and the SM2 national secret algorithm.
Further, in step (7), the algorithm used by the instant messaging server to encrypt the user data and the client to decrypt the ciphertext data is the same one of DES, 3DES, AES, and national secret SM4 algorithms.
Further, in the step (9), the algorithm used by the instant messaging server to perform the hash function operation on the encrypted data is one of MD5, SHA series, and national secret SM 3.
The technical effects of the invention comprise: according to the method for performing online cloud storage on the data in the instant messaging process, the data does not need to be downloaded to the local and then uploaded to the cloud storage by using the cloud storage application software. Meanwhile, the instant messaging server encrypts user data and transmits the user data to the cloud storage server in a ciphertext mode, so that the safety of the data is guaranteed; and carrying out hash function operation on the ciphertext to generate a message digest, so that a user can conveniently carry out integrity verification on the received data. The online cloud storage is realized, and meanwhile, the safety and integrity inspection of data are considered.
Detailed Description
The present invention will be described in further detail with reference to specific embodiments. It should be understood that this section of the description is provided only for the purpose of illustrating the invention and that the invention is not limited in its application to this embodiment.
The storage system adopted by the secure online cloud storage method in the instant messaging comprises an instant messaging server, a cloud storage server and a client served by the instant messaging server and the cloud storage server together. Wherein, the instant communication server comprises a pair of public keys K for asymmetric encryptionpubAnd a private key KpriThe hash function operation module and the data encryption/decryption module; the client comprises a symmetric key K for symmetric encryptionsymThe device comprises a Hash function operation module and a data encryption/decryption module. Private key K in public and private key pair of instant messaging serverpriStored locally in the server, public key KpubDistributed to each client for storage, KpubThe encryption method is used for encrypting the private data in communication with the instant messaging server. Symmetric key K of clientsymAnd encryption of data uploaded to the cloud storage server.
The specific storage method comprises the following steps:
step 1, the client receives data in the instant messaging process, and sends an online cloud storage request to the instant messaging server according to the data.
And 2, the instant messaging server receives the client request and sends a connection establishment request to the cloud storage server.
And 3, after receiving the request, the cloud storage server checks whether a binding relationship exists between the cloud storage account and the instant messaging account applying online cloud storage. If yes, confirming to establish communication connection. And sending the cloud storage data catalog of the user to the instant messaging server. Otherwise, performing the operations of the steps 4, 5 and 6.
And 4, the cloud storage server sends an authorization authentication request to the user through the instant messaging server.
And 5, after the client receives the authorization authentication request through the instant communication application software, the client completes authorization authentication in a cloud storage account password login mode.
And 6, after receiving the authorization authentication, the cloud storage server confirms and stores the binding relationship between the user instant messaging account and the cloud storage account, and agrees to establish connection with the instant messaging server. And the cloud storage server sends the cloud storage data catalog of the user to the instant messaging server.
And 7, the instant communication server forwards the storage directory to the client.
Step 8, the client selects the storage path of the instant communication data after receiving the storage catalog, and simultaneously uses the server public key KpubPair key KsymPerforming asymmetric encryption to obtain K in encrypted formsymAnd sent to the instant messaging server along with the selected storage path.
Step 9, after receiving the information sent by the client, the instant messaging utilizes the private key K of the own partypriDecipher out KsymUsing KsymAnd encrypting the instant communication data of the user, and sending the encrypted ciphertext and the storage path information to the cloud storage server.
And step 10, the cloud storage server receives the ciphertext data, performs storage operation on the ciphertext data, and updates a storage directory list of the user. The cloud storage server generates a sequence number Seq representing the storage operation at the time and sends the sequence number Seq to the instant messaging server.
Step 11, the instant communication server receives the Seq, and carries out hash function operation on the previously sent ciphertext to obtain a corresponding message digest D1D, mixing1And Seq to the client.
Step 12, the client receives and stores D1And Seq to local. And sending a confirmation message to the instant messaging server.
And step 13, the instant communication server forwards the confirmation message to the cloud storage server. And completing the online cloud storage operation.
When a user logs in the cloud storage server to perform downloading operation, the cloud storage server sends data selected by the user and corresponding Seq to the client. The client carries out the hash function operation on the received ciphertext which is the same as that of the instant communication server to generate a message digest D2Looking up locally saved D by Seq1And comparing and verifying the integrity. If the two are the same, the client uses the locally stored KsymDecrypting the data ciphertext to obtain plaintext information; if the two are not consistent, the client refuses to store the data.
It should be understood that the present embodiment is described to facilitate understanding of the present disclosure, and the present disclosure is not limited to this embodiment. The improvement of the non-inventive breakthrough on the basis of the invention shall belong to the list related to the invention.

Claims (6)

1. The safe online cloud storage method in the instant messaging is characterized in that:
the online cloud storage system comprises an instant messaging server, a cloud storage server and a client served by the instant messaging server and the cloud storage server; wherein, the instant communication server comprises a pair of public keys K for asymmetric encryptionpubAnd a private key KpriThe hash function operation module and the data encryption/decryption module; the client comprises a symmetric key K for symmetric encryptionsymThe hash function operation module and the data encryption/decryption module; private key K in public and private key pair of instant messaging serverpriStored locally in the server, public key KpubDistributed to each client for storage, KpubEncryption of private data used in communication with an instant messaging server; symmetric key K of clientsymEncryption of data for uploading to a cloud storage server;
the storage method specifically comprises the following steps:
the method comprises the following steps that (1) the client receives data sent by other clients in the communication process, and directly sends an online cloud storage request to a server according to the data without downloading operation;
step (2), after receiving the client request, the instant messaging server sends a connection establishment request to the cloud storage server;
step (3), the cloud storage server checks whether a binding relationship exists between a cloud storage account and an instant messaging account applying online cloud storage: if yes, the connection request is agreed; if not, performing the step (4);
step (4), the cloud storage server sends a verification message to the client through the instant messaging server; after receiving the message, the client user confirms the authorization binding of the instant messaging service account and the cloud storage account; after receiving the confirmation message of the client, the cloud storage server establishes connection with the instant messaging server and confirms and stores the binding relationship between the user instant messaging account and the cloud storage account;
step (5), the cloud storage server sends a cloud storage catalog of a client user to the instant messaging server, and the instant messaging server forwards the cloud storage catalog to the client;
step (6), the client side carries out selection operation on the cloud storage catalog, and the symmetric key K is used forsymUsing the public key K of the instant messaging serverpubEncrypting, and encrypting the encrypted KsymSending the information and the selection information of the cloud storage catalog to an instant messaging server;
step (7), the instant communication server utilizes the private key KpriDecipher out KsymBy KsymEncrypting data to be stored, and sending the encrypted data and the selection information of the cloud storage catalog of the client to the cloud storage server;
after receiving the information, the cloud storage server stores the data according to the storage directory information selected by the client, and generates a group of random sequence numbers as storage sequence numbers Seq for the current storage operation and returns the sequence numbers to the instant messaging server;
step (9), after receiving the Seq, the instant communication server performs hash function operation on the stored data to generate a message digest D1D is1Sending the result to the client together with the Seq;
step (10), the client receives and stores D1And Seq to local;the client sends a confirmation message to the instant messaging server, and the instant messaging server forwards the confirmation message to the cloud storage server to complete online cloud storage operation;
when a user needs to use the stored data, the client logs in a cloud storage server to download cloud data, and the cloud storage server sends data selected by the client and a corresponding Seq to the client; the client side carries out the hash function operation on the downloaded ciphertext data as same as that of the instant messaging server to obtain a message digest D2And D is2With locally stored D queried by Seq1A comparison is made whereby the integrity of the data is verified: if the two are consistent, the data is proved to be complete and correct, and the client uses the locally stored KsymCarrying out data decryption to obtain plaintext information; and if the data are inconsistent, the client refuses to store the data.
2. The secure online cloud storage method in instant messaging according to claim 1, wherein: in the step (1), the transmission data requested by the client user to perform online cloud storage is one or more of text, audio, picture and video.
3. The secure online cloud storage method in instant messaging according to claim 1, wherein: in the step (4), the authorization form of the client user authentication and the instant messaging server is a cloud storage account password login authentication mode.
4. The secure online cloud storage method in instant messaging according to claim 1, wherein: in step (6), the client utilizes KpubEncryption KsymUtilizing K with instant messaging serverpriDecryption KsymThe algorithm used is the same one of RSA, ELGamal, elliptic curve, and the SM2 national secret algorithm.
5. The secure online cloud storage method in instant messaging according to claim 1, wherein: in the step (7), the algorithm used by the instant messaging server for encrypting the user data and the client for decrypting the ciphertext data is the same one of DES, 3DES, AES and SM 4.
6. The secure online cloud storage method in instant messaging according to claim 1, wherein: in the step (9), the algorithm used by the instant messaging server to perform the hash function operation on the encrypted data is one of MD5, SHA series, and national secret SM 3.
CN201911332197.8A 2019-12-21 2019-12-21 Secure online cloud storage method in instant messaging Active CN111130796B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911332197.8A CN111130796B (en) 2019-12-21 2019-12-21 Secure online cloud storage method in instant messaging

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911332197.8A CN111130796B (en) 2019-12-21 2019-12-21 Secure online cloud storage method in instant messaging

Publications (2)

Publication Number Publication Date
CN111130796A CN111130796A (en) 2020-05-08
CN111130796B true CN111130796B (en) 2022-06-24

Family

ID=70500863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911332197.8A Active CN111130796B (en) 2019-12-21 2019-12-21 Secure online cloud storage method in instant messaging

Country Status (1)

Country Link
CN (1) CN111130796B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101453708A (en) * 2007-09-04 2009-06-10 捷讯研究有限公司 System and method for processing attachments to messages sent to a mobile device
CN103763315A (en) * 2014-01-14 2014-04-30 北京航空航天大学 Credible data access control method applied to cloud storage of mobile devices
CN106130987A (en) * 2016-07-01 2016-11-16 冯颖 The Internet evidence collecting method, device and the Internet safety system
CN107426175A (en) * 2017-06-09 2017-12-01 成都轻车快马网络科技有限公司 The real-time encrypted transmission method of data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10291560B2 (en) * 2016-03-15 2019-05-14 Redkix, Inc. Integrated real-time email-based virtual conversation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101453708A (en) * 2007-09-04 2009-06-10 捷讯研究有限公司 System and method for processing attachments to messages sent to a mobile device
CN103763315A (en) * 2014-01-14 2014-04-30 北京航空航天大学 Credible data access control method applied to cloud storage of mobile devices
CN106130987A (en) * 2016-07-01 2016-11-16 冯颖 The Internet evidence collecting method, device and the Internet safety system
CN107426175A (en) * 2017-06-09 2017-12-01 成都轻车快马网络科技有限公司 The real-time encrypted transmission method of data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
云存储在移动超声无线传输中的应用;金锦江等;《医疗装备》;20171015(第19期);全文 *

Also Published As

Publication number Publication date
CN111130796A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN110380852B (en) Bidirectional authentication method and communication system
CN100581097C (en) System and method for data transmission between two computers
CA2527718C (en) System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient
KR102124413B1 (en) System and method for identity based key management
US5812671A (en) Cryptographic communication system
CN106453612B (en) A kind of storage of data and shared system
CN109951381B (en) Mail secure transmission method based on quantum key public cloud service platform
JP4897645B2 (en) Encrypted message transmission / reception method, sender apparatus, receiver apparatus, encrypted message transmission / reception system, and program
WO2010078755A1 (en) Method and system for transmitting electronic mail, wlan authentication and privacy infrastructure (wapi) terminal thereof
CN102833253A (en) Method and server for establishing safe connection between client and server
CN113037484B (en) Data transmission method, device, terminal, server and storage medium
CN112332986B (en) Private encryption communication method and system based on authority control
CN113779619A (en) Encryption and decryption method for ceph distributed object storage system based on state cryptographic algorithm
US20210144002A1 (en) Secondary Channel Authentication of Public Keys
CN107104888B (en) Safe instant messaging method
CN111130796B (en) Secure online cloud storage method in instant messaging
CN113656818B (en) Trusted-free third party cloud storage ciphertext deduplication method and system meeting semantic security
CN112422289B (en) Method and system for offline security distribution of digital certificate of NB-IoT (NB-IoT) terminal equipment
CN113918971A (en) Block chain based message transmission method, device, equipment and readable storage medium
CA3210990C (en) End to end encryption with roaming capabilities
JP2008152737A (en) Service provision server, authentication server, and authentication system
KR20150034591A (en) Cloud server for re-encrypting the encrypted data and re-encrypting method thereof
US11876789B2 (en) Encrypted data communication and gateway device for encrypted data communication
CN111615107B (en) Data interaction method, terminal and system
CN109257630B (en) Data transmission system, method, device and storage medium in video-on-demand

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant