CN111460480A - Secure ciphertext file sharing method in ciphertext search system - Google Patents

Secure ciphertext file sharing method in ciphertext search system Download PDF

Info

Publication number
CN111460480A
CN111460480A CN202010244397.4A CN202010244397A CN111460480A CN 111460480 A CN111460480 A CN 111460480A CN 202010244397 A CN202010244397 A CN 202010244397A CN 111460480 A CN111460480 A CN 111460480A
Authority
CN
China
Prior art keywords
file
ciphertext
data
search
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010244397.4A
Other languages
Chinese (zh)
Other versions
CN111460480B (en
Inventor
陈宇翔
郝尧
易仲强
张皓
成林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 30 Research Institute
China Information Technology Security Evaluation Center
Original Assignee
CETC 30 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute filed Critical CETC 30 Research Institute
Priority to CN202010244397.4A priority Critical patent/CN111460480B/en
Publication of CN111460480A publication Critical patent/CN111460480A/en
Application granted granted Critical
Publication of CN111460480B publication Critical patent/CN111460480B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • G06F16/1824Distributed file systems implemented using Network-attached Storage [NAS] architecture
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of information security, and discloses a secure ciphertext file sharing method in a ciphertext search system. The invention provides safe ciphertext file sharing service for users based on password management, the users only need to log in own client and select the users, files and file keywords to be shared, and the file sharing can be realized without transmitting search keys in the sharing process. The shared user can obtain the shared file by only updating the ciphertext index of the shared user and obtaining the file key from the ciphertext management, so that the division of the authority is realized, and the security of the file sharing process is improved.

Description

Secure ciphertext file sharing method in ciphertext search system
Technical Field
The invention relates to the technical field of information security, in particular to a secure ciphertext file sharing method in a ciphertext search system.
Background
The existing ciphertext search system has the following problems:
(1) file sharing security is low. When the searchable encryption technology shares the ciphertext file, the file key and the search key are directly delivered to the shared user in a 'secure channel' mode, and even if the shared user safely obtains the search key and the decryption key, the key is difficult to prevent from being leaked in subsequent continuous sharing, so that the security of the stored ciphertext file is reduced.
(2) The user experience is poor. When a user shares a ciphertext file, no clear 'safe channel' transmission method is used for engineering realization, and a method for manually transmitting a key through a line is too complicated, so that the application of a searchable encryption technology is hindered.
(3) The file sharing security responsibility boundary is unclear. The ciphertext file is shared and has safety responsibility, the safety responsibility is bound to be caused by simple secret key sharing, one-way responsibility and simple audit, the responsibility traceability in the ciphertext file sharing process is not facilitated, the enthusiasm of all users for sharing the ciphertext file is contused, and the popularization of a ciphertext searching technology is not facilitated.
The ciphertext searching technology has the characteristic that the ciphertext file and the ciphertext index are separated from each other, the size of the ciphertext file is usually far larger than that of the ciphertext file index, different keys held by users are managed and updated by means of a trusted third party, different keys are issued for different users, the key transmission risk is removed, the lightweight ciphertext file safe sharing is realized, the problems of low safety, fuzzy liability division, poor user experience and the like in ciphertext file sharing are solved, and the safety of stored data is improved.
Disclosure of Invention
Aiming at the requirement of ciphertext file sharing among different users in a ciphertext search system, the invention provides a safe ciphertext file sharing method in the ciphertext search system, which does not need to share a search key of a sharer or increase the storage space of a ciphertext file, only needs the sharee to update an index list by using the own key, and distributes a file key through a key management server, so that lightweight, safe and supervised ciphertext file sharing can be realized. The method does not increase the storage cost of the ciphertext file of the shared person, does not share the search key of the user, prevents the risk of ciphertext file leakage caused by leakage of the search key, and effectively supervises the sharing behavior of the ciphertext file.
A secure ciphertext file sharing method in a ciphertext search system comprises the following steps:
s11, a data owner encrypts file data of the data owner to generate a ciphertext index, and uploads the ciphertext file and the ciphertext index to a big data storage platform, wherein the data owner and a shared user have ciphertext searching capability for the ciphertext file;
s12, sharing the search key and the file key to the shared user through a secure channel by the data owner;
and S13, the shared user searches and decrypts the ciphertext file by using the received search key and the file key.
Furthermore, the data owner can store and read the ciphertext file to the big data storage platform through the secret state data search client, and inquire the ciphertext index from the secret state data search service subsystem, and the secret state data search client and the secret state data search service subsystem issue the related secret key through the secret state data secret key management subsystem.
Furthermore, the encrypted data search client can provide encryption and decryption functions of user files, file indexes and search requests, send the encrypted files to the big data storage platform for storage, and send the encrypted search requests to the encrypted data search service subsystem.
Further, the big data storage platform comprises a distributed file system, and the distributed file system is used for providing secret state search service.
Furthermore, the secret state data search client directly stores the ciphertext file to the distributed file system, and positions the ciphertext file stored in the distributed file system based on the keyword index list of the secret state data search service subsystem.
Furthermore, the secret state data search service subsystem is deployed in a single server, and can establish a keyword index list of the ciphertext file, so as to locate the position where the ciphertext file is stored in the distributed file system; the secret state data search service subsystem can respond to the search request of the secret state data search client, search the position of the ciphertext file and return the position to the secret state data search client.
Furthermore, the secret data key management subsystem can provide a search key and a file encryption key for the secret data search client and provide a search key for the secret data search service subsystem.
Further, the ciphertext file sharing method specifically comprises the following steps:
s21, after a data owner selects a file to be shared, a file keyword and a shared user, initiating a sharing request to the secret data key management subsystem through the secret data search client, wherein the request content comprises an ID of the shared user, an ID of the file to be shared and keyword information of the ID;
s22, the secret state data key management subsystem calculates a file encryption key according to request information submitted by a user;
s23, the secret state data key management subsystem informs the shared user of updating the index list and issues a file key to the shared user through a secure channel;
s24, after the shared user receives the shared content through the secret state data searching client, the secret state data searching client updates the own ciphertext index by using the searching key of the shared user and the keyword of the shared file and issues the ciphertext index to the distributed file system;
s25, the distributed file system informs the shared user that the index is updated successfully;
and S26, the secret data key management subsystem informs a data owner of successful file sharing.
The invention has the beneficial effects that: the invention provides safe ciphertext file sharing service for users based on password management, the users only need to log in own client and select the users, files and file keywords to be shared, and the file sharing can be realized without transmitting search keys in the sharing process. The shared user only needs to update the ciphertext index of the shared user, and the shared file can be obtained by obtaining the file key from the crypto tube, so that the division of the authority is realized, the security of the file sharing process is improved, and the method specifically comprises the following advantages:
(1) the cost is low: when the user shares the own file with other users, the ciphertext file does not need to be transmitted to the shared user and then uploaded to the storage server, and the network bandwidth is saved. The shared user only needs to update the ciphertext index list stored in the ciphertext data search service subsystem, and the HDFS of the storage service side does not need to increase new storage overhead, so that the storage cost is saved.
(2) The sex can be monitored. When the user shares the file, the key management server of the trusted third party informs the shared user to update the index list, the trust transfer responsibility is clearly and definitely handed over, and the sharing path of the sensitive file is safely monitored.
(3) Convenience and safety. When the user shares the file, the user does not need to share a search key of the user and send the ciphertext file to the shared user and then upload the ciphertext file to the server for storage, so that the client communication overhead is reduced, and the sharing process is simpler. And issuing a file key by a key management server of a trusted third party through a secure channel to be shared by the users. The shared user updates the index by using the own search key, and in the sharing process, the user completely controls the initiative of own data through a private key, so that a storage end cannot know, steal or reveal the plaintext data of the user. And the search behavior of the user cannot be subjected to correlation analysis, so that the safety is improved.
(4) In ciphertext file sharing, a user can share files without sharing a search key of the user, and the security of the key is ensured.
(5) The user only needs to select the user and the file to be shared at the client and set the keywords, and convenient, fast and light file sharing can be achieved.
(6) And the responsibility boundary in file sharing is clearly divided, and technical support is provided for safe file sharing and supervision sharing behaviors.
Drawings
FIG. 1 is a searchable encryption model;
FIG. 2 ciphertext file sharing model;
fig. 3 is a file security sharing process.
Detailed Description
In order to more clearly understand the technical features, objects, and effects of the present invention, specific embodiments of the present invention will now be described. It should be understood that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are intended for purposes of illustration only and are not intended to limit the scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment provides a secure ciphertext file sharing method in a ciphertext search system, as shown in fig. 1, including the following steps:
s11, a data owner encrypts file data of the data owner to generate a ciphertext index, and uploads the ciphertext file and the ciphertext index to a big data storage platform, wherein the data owner and a shared user have ciphertext searching capability for the ciphertext file;
s12, sharing the search key and the file key to the shared user through a secure channel by the data owner;
and S13, the shared user searches and decrypts the ciphertext file by using the received search key and the file key.
In a preferred embodiment of the present invention, as shown in fig. 2, the data owner can store and read the ciphertext file to the big data storage platform through the secret data search client, and query the ciphertext index from the secret data search service subsystem, and the secret data search client and the secret data search service subsystem issue the related key by the secret data key management subsystem.
In a preferred embodiment of the invention, the encrypted data search client can provide encryption and decryption functions of user files, file indexes and search requests, send the encrypted files to the big data storage platform for storage, and send the encrypted search requests to the encrypted data search service subsystem.
In a preferred embodiment of the present invention, the big data storage platform comprises a Distributed File System (HDFS) for providing a cryptographic search service.
In a preferred embodiment of the present invention, the cryptographic data search client directly stores the cryptographic file to the distributed file system, and locates the cryptographic file stored in the distributed file system based on the key index list of the cryptographic data search service subsystem.
In a preferred embodiment of the present invention, the cryptographic data search service subsystem is deployed in a separate server, and is capable of establishing a keyword index list of the ciphertext file, for locating a position where the ciphertext file is stored in the distributed file system; the secret state data search service subsystem can respond to a search request of the secret state data search client, search the position of the ciphertext file and return to the secret state data search client.
In a preferred embodiment of the present invention, the secret data key management subsystem is capable of providing a search key and a file encryption key for the secret data search client and providing a search key for the secret data search service subsystem.
In a preferred embodiment of the present invention, as shown in fig. 3, the ciphertext file sharing method specifically includes the following steps:
s21, after a data owner selects a file to be shared, a file keyword and a shared user, a sharing request is sent to a secret data key management subsystem through a secret data search client, and the request content comprises an ID of the shared user, an ID of the file to be shared and keyword information of the ID;
s22, the secret state data key management subsystem calculates a file encryption key according to request information submitted by a user;
s23, the secret data key management subsystem informs the shared user of updating the index list and issues a file key to the shared user through a secure channel;
s24, after the shared user receives the shared content through the secret state data searching client, the secret state data searching client updates the own ciphertext index by using the searching key of the shared user and the key words of the shared file and issues the ciphertext index to the distributed file system;
s25, the distributed file system informs the shared user that the index is updated successfully;
and S26, the secret data key management subsystem informs the data owner that the file sharing is successful.
In summary, according to the secure ciphertext file sharing method in the ciphertext search system provided by the present invention, a search key of a sharer does not need to be shared, a storage space of a ciphertext file does not need to be increased, and only a sharee needs to update an index list with its own key and distribute a file key through a key management server, so that lightweight, secure, and monitorable ciphertext file sharing can be achieved. The method does not increase the storage cost of the ciphertext file of the shared person, does not share the search key of the user, prevents the risk of ciphertext file leakage caused by leakage of the search key, and effectively supervises the sharing behavior of the ciphertext file.
The foregoing is illustrative of the preferred embodiments of this invention, and it is to be understood that the invention is not limited to the precise form disclosed herein and that various other combinations, modifications, and environments may be resorted to, falling within the scope of the concept as disclosed herein, either as described above or as apparent to those skilled in the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (8)

1. A secure ciphertext file sharing method in a ciphertext search system is characterized by comprising the following steps:
s11, a data owner encrypts file data of the data owner to generate a ciphertext index, and uploads the ciphertext file and the ciphertext index to a big data storage platform, wherein the data owner and a shared user have ciphertext searching capability for the ciphertext file;
s12, sharing the search key and the file key to the shared user through a secure channel by the data owner;
and S13, the shared user searches and decrypts the ciphertext file by using the received search key and the file key.
2. The method as claimed in claim 1, wherein a data owner can store and read ciphertext files to and from the big data storage platform through a secret data search client, and query a ciphertext index from a secret data search service subsystem, and the secret data search client and the secret data search service subsystem issue related keys from a secret data key management subsystem.
3. The method as claimed in claim 2, wherein the cryptographic data search client is capable of providing encryption and decryption functions of user files, file indexes and search requests, sending the cryptographic files to the big data storage platform for storage, and sending the encrypted search requests to the cryptographic data search service subsystem.
4. The method as claimed in claim 2, wherein the big data storage platform comprises a distributed file system, and the distributed file system is configured to provide a cryptographic search service.
5. The method as claimed in claim 3, wherein the cryptographic data search client directly stores the cryptographic file in the distributed file system, and locates the cryptographic file stored in the distributed file system based on the key index list of the cryptographic data search service subsystem.
6. The method for sharing the safe ciphertext file in the ciphertext search system according to claim 3, wherein the ciphertext data search service subsystem is deployed in a separate server, and is capable of establishing a keyword index list of the ciphertext file, so as to locate a position where the ciphertext file is stored in the distributed file system; the secret state data search service subsystem can respond to the search request of the secret state data search client, search the position of the ciphertext file and return the position to the secret state data search client.
7. The method as claimed in claim 3, wherein the secret data key management subsystem is capable of providing a search key and a file encryption key for the secret data search client, and providing a search key for the secret data search service subsystem.
8. The method for sharing a ciphertext file in a ciphertext search system of claim 3, wherein the method for sharing a ciphertext file specifically comprises the following steps:
s21, after a data owner selects a file to be shared, a file keyword and a shared user, initiating a sharing request to the secret data key management subsystem through the secret data search client, wherein the request content comprises an ID of the shared user, an ID of the file to be shared and keyword information of the ID;
s22, the secret state data key management subsystem calculates a file encryption key according to request information submitted by a user;
s23, the secret state data key management subsystem informs the shared user of updating the index list and issues a file key to the shared user through a secure channel;
s24, after the shared user receives the shared content through the secret state data searching client, the secret state data searching client updates the own ciphertext index by using the searching key of the shared user and the keyword of the shared file and issues the ciphertext index to the distributed file system;
s25, the distributed file system informs the shared user that the index is updated successfully;
and S26, the secret data key management subsystem informs a data owner of successful file sharing.
CN202010244397.4A 2020-03-31 2020-03-31 Secure ciphertext file sharing method in ciphertext search system Active CN111460480B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010244397.4A CN111460480B (en) 2020-03-31 2020-03-31 Secure ciphertext file sharing method in ciphertext search system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010244397.4A CN111460480B (en) 2020-03-31 2020-03-31 Secure ciphertext file sharing method in ciphertext search system

Publications (2)

Publication Number Publication Date
CN111460480A true CN111460480A (en) 2020-07-28
CN111460480B CN111460480B (en) 2022-03-18

Family

ID=71679390

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010244397.4A Active CN111460480B (en) 2020-03-31 2020-03-31 Secure ciphertext file sharing method in ciphertext search system

Country Status (1)

Country Link
CN (1) CN111460480B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948903A (en) * 2021-03-24 2021-06-11 中国电子科技集团公司第三十研究所 Secret state search technical architecture and method for big data storage

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957902A (en) * 2009-07-20 2011-01-26 日电(中国)有限公司 Method and equipment for generating an expanded blinded inverted index table and method and equipment for searching united keywords
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN103107889A (en) * 2013-02-06 2013-05-15 中电长城网际系统应用有限公司 System and method for cloud computing environment data encryption storage and capable of searching
CN105471856A (en) * 2015-11-19 2016-04-06 中国电子科技网络信息安全有限公司 System and method used for retrieving and sharing large data center platform encryption files
US20160299919A1 (en) * 2013-06-03 2016-10-13 Zettaset, Inc. Management of Intermediate Data Spills during the Shuffle Phase of a Map-Reduce Job
CN106131029A (en) * 2016-07-19 2016-11-16 南京邮电大学 A kind of efficient cipher text searching method resisting attribute key abuse
CN106203171A (en) * 2016-06-03 2016-12-07 中国电子科技网络信息安全有限公司 Big data platform Security Index system and method
CN106302449A (en) * 2016-08-15 2017-01-04 中国科学院信息工程研究所 A kind of ciphertext storage cloud service method open with searching ciphertext and system
CN108494768A (en) * 2018-03-22 2018-09-04 深圳大学 A kind of cipher text searching method and system for supporting access control
CN108664803A (en) * 2018-04-04 2018-10-16 中国电子科技集团公司第三十研究所 A kind of document content fine granularity access control system based on password
CN110166466A (en) * 2019-05-28 2019-08-23 湖南大学 It is a kind of efficiently the multi-user of renewal authority to can search for encryption method and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957902A (en) * 2009-07-20 2011-01-26 日电(中国)有限公司 Method and equipment for generating an expanded blinded inverted index table and method and equipment for searching united keywords
CN102938767A (en) * 2012-11-13 2013-02-20 西安电子科技大学 Efficient verified fuzzy key word searching method based on cloud data subcontract system
CN103107889A (en) * 2013-02-06 2013-05-15 中电长城网际系统应用有限公司 System and method for cloud computing environment data encryption storage and capable of searching
US20160299919A1 (en) * 2013-06-03 2016-10-13 Zettaset, Inc. Management of Intermediate Data Spills during the Shuffle Phase of a Map-Reduce Job
CN105471856A (en) * 2015-11-19 2016-04-06 中国电子科技网络信息安全有限公司 System and method used for retrieving and sharing large data center platform encryption files
CN106203171A (en) * 2016-06-03 2016-12-07 中国电子科技网络信息安全有限公司 Big data platform Security Index system and method
CN106131029A (en) * 2016-07-19 2016-11-16 南京邮电大学 A kind of efficient cipher text searching method resisting attribute key abuse
CN106302449A (en) * 2016-08-15 2017-01-04 中国科学院信息工程研究所 A kind of ciphertext storage cloud service method open with searching ciphertext and system
CN108494768A (en) * 2018-03-22 2018-09-04 深圳大学 A kind of cipher text searching method and system for supporting access control
CN108664803A (en) * 2018-04-04 2018-10-16 中国电子科技集团公司第三十研究所 A kind of document content fine granularity access control system based on password
CN110166466A (en) * 2019-05-28 2019-08-23 湖南大学 It is a kind of efficiently the multi-user of renewal authority to can search for encryption method and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HADEER MAHMOUD等: "An approach for Big Data Security based on Hadoop Distributed File system", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER=8316608》 *
许盛伟等: "支持文件动态更新的基于属性可搜索加密方案", 《计算机应用研究》 *
贾强等: "一种面向密文大型数据集的可搜索加密方案", 《东北大学学报(自然科学版)》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948903A (en) * 2021-03-24 2021-06-11 中国电子科技集团公司第三十研究所 Secret state search technical architecture and method for big data storage

Also Published As

Publication number Publication date
CN111460480B (en) 2022-03-18

Similar Documents

Publication Publication Date Title
US11153290B2 (en) Advanced security protocol for broadcasting and synchronizing shared folders over local area network
CN112788033B (en) Authentication method and authentication system
CN103731432B (en) Multi-user supported searchable encryption method
EP2590451B1 (en) File transmission method based on distributed storage in wireless communication system
CN108881195A (en) Data safety sharing method and device based on cloud environment
EP3510743B1 (en) Interchangeable retrieval of sensitive content via private content distribution networks
EP3063919B1 (en) A system and a method for management of confidential data
US20100169321A1 (en) Method and apparatus for ciphertext indexing and searching
KR100944769B1 (en) Method and system for sharing files by using encryption and decryption to guarantee the privacy
US20090300351A1 (en) Fast searchable encryption method
EP3143486A1 (en) A method for storing of data within a cloud storage and a cloud storage system
KR20210064675A (en) Security system for data trading and data storage based on block chain and method therefor
CN112948903A (en) Secret state search technical architecture and method for big data storage
CN107295018A (en) A kind of safety storage of cloud disc file and sharing method
CN114679272B (en) Cloud storage system and method using quantum key encryption
CN114389878B (en) Block chain slicing method and block chain network system
CN111460480B (en) Secure ciphertext file sharing method in ciphertext search system
KR20180130249A (en) Encryption systems based on cloud storage and method thereof
Mahmoud et al. Privacy-preserving fine-grained data retrieval schemes for mobile social networks
KR20040097016A (en) Method and System of Web Storage Service with Cipher
CN115935426A (en) Remote image feature extraction and retrieval method based on SGX
KR102263053B1 (en) A database structure capable of synchronizing data between devices in a local area network environment and a data synchronization method using the same
CA2797633C (en) System and method for mounting encrypted data based on availability of a key on a network
Zebboudj et al. Big data source location privacy and access control in the framework of IoT
JP4719935B2 (en) Hybrid peer-to-peer communication network system, index server thereof, terminal device, and method of creating mirror peer in the same system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210510

Address after: 610000, No. 6, pioneering Road, hi tech Zone, Sichuan, Chengdu

Applicant after: NO. 30 INSTITUTE OF CHINA ELECTRONIC TECHNOLOGY Group Corp.

Applicant after: CHINA INFORMATION TECHNOLOGY SECURITY EVALUATION CENTER

Address before: 610000, No. 6, pioneering Road, hi tech Zone, Sichuan, Chengdu

Applicant before: NO. 30 INSTITUTE OF CHINA ELECTRONIC TECHNOLOGY Group Corp.

GR01 Patent grant
GR01 Patent grant