CN114065240A - Storage encryption system based on domestic AI chip architecture and control method - Google Patents
Storage encryption system based on domestic AI chip architecture and control method Download PDFInfo
- Publication number
- CN114065240A CN114065240A CN202111327154.8A CN202111327154A CN114065240A CN 114065240 A CN114065240 A CN 114065240A CN 202111327154 A CN202111327154 A CN 202111327154A CN 114065240 A CN114065240 A CN 114065240A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- preset
- storage
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a storage encryption system based on a domestic AI chip architecture, which comprises a data acquisition interface, a domestic AI chip and a memory, wherein the data acquisition interface, the domestic AI chip and the memory are sequentially connected; the data acquisition interface is used for receiving data, the domestic AI chip is used for encrypting the data received by the data acquisition interface after decoding, and the memory is used for storing the encrypted data. The invention also discloses a control method of the storage encryption system based on the domestic AI chip architecture. The data acquisition interface receives the data, the data received by the data acquisition interface is decoded and encrypted by the domestic AI chip, and the encrypted data is stored by the memory, so that the data can be safely stored, the safety of the data can be effectively protected, the safety of user data can be effectively protected even if the data of the server is stolen, and the safety and the reliability of a storage system are improved.
Description
Technical Field
The invention relates to the technical field of data storage, in particular to a storage encryption system based on a domestic AI chip architecture and a control method.
Background
The memory cell is actually one type of sequential logic circuit. The functions of the memory can be divided into a Read Only Memory (ROM) and a Random Access Memory (RAM) according to the use types of the memory, and the functions of the memory are greatly different, so that the description is different. The memory is a collection of many memory cells, arranged in order of cell number. Each cell is made up of a number of binary bits to represent the value stored in the memory cell, and this structure is very similar to the structure of an array.
With the rapid development of information technology, data storage technology is continuously updated, people have higher and higher requirements on data storage, when a plurality of users store data in a memory, once the data in the memory is stolen, the data in the memory can be divulged, the loss of the users is huge, and if the users only set a reading password for the memory, the cracking difficulty is low, and the security of the data in the memory cannot be protected.
Disclosure of Invention
The invention aims to provide a storage encryption system based on a domestic AI chip architecture and a control method thereof, which can safely store data, effectively protect the safety of the data, effectively protect the safety of user data even if the data of a server is stolen, and improve the safety and reliability of a storage system so as to solve the problems provided in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme:
a storage encryption system based on a domestic AI chip architecture comprises a data acquisition interface, a domestic AI chip and a memory, wherein the data acquisition interface, the domestic AI chip and the memory are sequentially connected;
the data acquisition interface is used for receiving data, the domestic AI chip is used for encrypting the data received by the data acquisition interface after decoding, and the memory is used for storing the encrypted data.
Preferably, the domestic AI chip comprises a decoding module, an encrypting module and a writing module, wherein the decoding module, the encrypting module and the writing module are connected in sequence;
the decoding module is used for decoding the data received by the data acquisition interface and sending the data to the encryption module, the encryption module is used for encrypting the data decoded by the decoding module and sending the data to the writing module, and the writing module is used for writing the data encrypted by the encryption module into the memory for storage.
Preferably, the encrypting module encrypts the data decoded by the decoding module, and the encrypting comprises:
s11, dividing the data into blocks according to the key marks, wherein the large block data is non-key data, the small block data is key data, and the block information B is divided;
s12, AES is adopted to encrypt the large block data, the key is randomly generated into K, and the encryption is recorded as Ek(D);
S13, fully homomorphic encrypting the small block data to generate a secret key SK and a public key PK, and the encryption is recorded as Encpk(D) And decryption is denoted as Decsk(C);
S14, carrying out full homomorphic encryption on the secret key and the corresponding block information, and storing the encrypted secret key in a trusted cloud node;
s15, randomly generating a group of vectors on the basis of the original ciphertext, calculating by a key generation algorithm, and adding the vectors and the original ciphertext to generate a new ciphertext;
and S16, storing the new ciphertext in the common node, and storing the key in the trusted node.
Preferably, in the S12, the large block data is encrypted symmetrically by AES-128, a random key k is generated by a key generator, the key length is 128 bits, and a ciphertext C1 is obtained, where the expression is: c1 ═ Ek(D1)
Wherein E iskFor symmetric encryption algorithm, D1 is a block data block.
Preferably, the encrypting module encrypts the data decoded by the decoding module, and the encrypting comprises:
s21, storing the data in a preset tree structure, wherein the maximum storage capacity of each node in the preset tree structure is the same, and all leaf nodes except the rightmost leaf node store the data with the maximum capacity;
s22, each node in the predetermined tree structure is encrypted, thereby implementing encryption of data based on the file manager.
Preferably, the storing the data in the S21 in a predetermined tree structure includes:
splitting data into a plurality of data blocks;
and storing the plurality of split data blocks in a preset tree structure to obtain a basic directory.
Preferably, the home-made AI chip further includes a compression module, the compression module is connected between the encryption module and the write-in module, and the compression module is configured to compress the data encrypted by the encryption module and send the data to the write-in module.
Preferably, the compressing, by the compressing module, the data encrypted by the encrypting module includes:
s31, compressing the original data according to the original data, a preset precision value and a preset lower limit value corresponding to the original data to obtain an actual stored value, wherein the digit of the actual stored value is less than that of the original data;
and S32, storing the actual storage value into a preset storage space, wherein the digit of the preset storage space is determined by a preset precision value, a preset lower limit value and a preset upper limit value corresponding to the original data.
Preferably, the compressing the original data according to the original data, the preset precision value and the preset lower limit value corresponding to the original data, and obtaining the actual storage value includes:
compressing the original data according to the following formula to obtain an actual storage value;
wherein f (real) is original data, f (min) is a preset lower limit value, f (a) is a preset precision value, and F (flash) is an actual storage value;
determining the maximum storage space occupied by the actual storage value according to the preset precision value, the preset lower limit value and the preset upper limit value comprises the following steps:
determining the maximum occupied storage space of the actual storage value according to the following formula;
wherein f (max) is a preset upper limit, f (min) is a preset lower limit, f (a) is a preset precision value, and F (flash max) is a preset maximum occupied storage space.
Determining the number of bits of the preset storage space according to the maximum occupied storage space comprises:
determining the digit of a preset storage space according to the following formula;
F(capacity)=log2(F(flash max))+1
wherein, f (flash max) is the maximum occupied storage space, and f (capacity) is the number of bits of the preset storage space.
A control method of a storage encryption system based on a domestic AI chip architecture comprises the following steps:
s1, receiving data through a data acquisition interface;
s2, encrypting the received data after decoding;
s3, storing the encrypted data.
Compared with the prior art, the invention has the beneficial effects that:
the data acquisition interface receives the data, the data received by the data acquisition interface is decoded and encrypted by the domestic AI chip, and the encrypted data is stored by the memory, so that the data can be safely stored, the safety of the data can be effectively protected, the safety of user data can be effectively protected even if the data of the server is stolen, and the safety and the reliability of a storage system are improved.
Drawings
FIG. 1 is a system block diagram of an embodiment of a storage encryption system based on a domestic AI chip architecture according to the present invention;
FIG. 2 is a schematic flow chart of a control method of a storage encryption system based on a domestic AI chip architecture according to the present invention;
fig. 3 is a system block diagram illustrating another embodiment of a storage encryption system based on a domestic AI chip architecture according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Example 1
Referring to fig. 1 and 3, the present invention provides a storage encryption system based on a domestic AI chip architecture, which includes a data acquisition interface, a domestic AI chip and a memory, wherein the data acquisition interface, the domestic AI chip and the memory are connected in sequence;
the data acquisition interface is used for receiving data, the domestic AI chip is used for encrypting the data received by the data acquisition interface after decoding, and the memory is used for storing the encrypted data.
Specifically, in this embodiment, the homemade AI chip includes a decoding module, an encrypting module, and a writing module, which are connected in sequence;
the decoding module is used for decoding the data received by the data acquisition interface and sending the data to the encryption module, the encryption module is used for encrypting the data decoded by the decoding module and sending the data to the writing module, and the writing module is used for writing the data encrypted by the encryption module into the memory for storage.
Specifically, in this embodiment, the encrypting the data decoded by the decoding module by the encrypting module includes:
s11, dividing the data into blocks according to the key marks, wherein the large block data is non-key data, the small block data is key data, and the block information B is divided;
s12, AES is adopted to encrypt the large block data, the key is randomly generated into K, and the encryption is recorded as Ek(D);
S13, fully homomorphic encrypting the small block data to generate a secret key SK and a public key PK, and the encryption is recorded as Encpk(D) And decryption is denoted as Decsk(C);
S14, carrying out full homomorphic encryption on the secret key and the corresponding block information, and storing the encrypted secret key in a trusted cloud node;
s15, randomly generating a group of vectors on the basis of the original ciphertext, calculating by a key generation algorithm, and adding the vectors and the original ciphertext to generate a new ciphertext;
and S16, storing the new ciphertext in the common node, and storing the key in the trusted node.
Specifically, in this embodiment, in S12, the large block data is encrypted symmetrically by AES-128, a random key k is generated by the key generator, the key length is 128 bits, and a ciphertext C1 is obtained, where the expression is: c1 ═ Ek(D1)
Wherein E iskFor symmetric encryption algorithm, D1 is a block data block.
A control method of a storage encryption system based on a domestic AI chip architecture comprises the following steps:
s1, receiving data through a data acquisition interface;
s2, encrypting the received data after decoding;
s3, storing the encrypted data.
Example 2
The difference from embodiment 1 is that the encrypting module encrypts the data decoded by the decoding module, including:
s21, storing the data in a preset tree structure, wherein the maximum storage capacity of each node in the preset tree structure is the same, and all leaf nodes except the rightmost leaf node store the data with the maximum capacity;
s22, each node in the predetermined tree structure is encrypted, thereby implementing encryption of data based on the file manager.
The storing of the data in the predetermined tree structure in S21 includes:
splitting data into a plurality of data blocks;
and storing the plurality of split data blocks in a preset tree structure to obtain a basic directory.
Example 3
Referring to fig. 2 and 3, the difference from embodiment 1 is that the home-made AI chip further includes a compression module, the compression module is connected between the encryption module and the write-in module, and the compression module is configured to compress data encrypted by the encryption module and send the data to the write-in module.
The compression module compresses the data encrypted by the encryption module, and comprises the following steps:
s31, compressing the original data according to the original data, a preset precision value and a preset lower limit value corresponding to the original data to obtain an actual stored value, wherein the digit of the actual stored value is less than that of the original data;
and S32, storing the actual storage value into a preset storage space, wherein the digit of the preset storage space is determined by a preset precision value, a preset lower limit value and a preset upper limit value corresponding to the original data.
Compressing the original data according to the original data, a preset precision value and a preset lower limit value corresponding to the original data, and obtaining an actual storage value comprises:
compressing the original data according to the following formula to obtain an actual storage value;
wherein f (real) is original data, f (min) is a preset lower limit value, f (a) is a preset precision value, and F (flash) is an actual storage value;
determining the maximum storage space occupied by the actual storage value according to the preset precision value, the preset lower limit value and the preset upper limit value comprises the following steps:
determining the maximum occupied storage space of the actual storage value according to the following formula;
wherein f (max) is a preset upper limit, f (min) is a preset lower limit, f (a) is a preset precision value, and F (flash max) is a preset maximum occupied storage space.
Determining the number of bits of the preset storage space according to the maximum occupied storage space comprises:
determining the digit of a preset storage space according to the following formula;
F(capacity)=log2(F(flash max))+1
wherein, f (flash max) is the maximum occupied storage space, and f (capacity) is the number of bits of the preset storage space.
In summary, the data acquisition interface receives data, the data received by the data acquisition interface is decoded and encrypted by the domestic AI chip, and the encrypted data is stored by the memory, so that the data can be safely stored, the safety of the data can be effectively protected, even if the data of the server is stolen, the safety of the user data can be effectively protected, and the safety and the reliability of the storage system can be improved.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (10)
1. A storage encryption system based on a domestic AI chip architecture is characterized in that: the system comprises a data acquisition interface, a domestic AI chip and a memory, wherein the data acquisition interface, the domestic AI chip and the memory are sequentially connected;
the data acquisition interface is used for receiving data, the domestic AI chip is used for encrypting the data received by the data acquisition interface after decoding, and the memory is used for storing the encrypted data.
2. The storage encryption system based on the homemade AI chip architecture as claimed in claim 1, wherein: the domestic AI chip comprises a decoding module, an encryption module and a writing module, wherein the decoding module, the encryption module and the writing module are sequentially connected;
the decoding module is used for decoding the data received by the data acquisition interface and sending the data to the encryption module, the encryption module is used for encrypting the data decoded by the decoding module and sending the data to the writing module, and the writing module is used for writing the data encrypted by the encryption module into the memory for storage.
3. The storage encryption system based on the homemade AI chip architecture as claimed in claim 2, wherein: the encrypting module encrypting the data decoded by the decoding module comprises:
s11, dividing the data into blocks according to the key marks, wherein the large block data is non-key data, the small block data is key data, and the block information B is divided;
s12, AES is adopted to encrypt the large block data, the key is randomly generated into K, and the encryption is recorded as Ek(D);
S13, fully homomorphic encrypting the small block data to generate a secret key SK and a public key PK, and the encryption is recorded as Encpk(D) And decryption is denoted as Decsk(C);
S14, carrying out full homomorphic encryption on the secret key and the corresponding block information, and storing the encrypted secret key in a trusted cloud node;
s15, randomly generating a group of vectors on the basis of the original ciphertext, calculating by a key generation algorithm, and adding the vectors and the original ciphertext to generate a new ciphertext;
and S16, storing the new ciphertext in the common node, and storing the key in the trusted node.
4. The storage encryption system based on the homemade AI chip architecture as claimed in claim 3, wherein: the large block data in the S12 is symmetrically encrypted by adopting AES-128, a random key k is generated by a key generator, the length of the key is 128 bits, a ciphertext C1 is obtained, and the expression is as follows: c1 ═ Ek(D1)
Wherein E iskFor symmetric encryption algorithm, D1 is a block data block.
5. The storage encryption system based on the homemade AI chip architecture as claimed in claim 1, wherein: the encrypting module encrypting the data decoded by the decoding module comprises:
s21, storing the data in a preset tree structure, wherein the maximum storage capacity of each node in the preset tree structure is the same, and all leaf nodes except the rightmost leaf node store the data with the maximum capacity;
s22, each node in the predetermined tree structure is encrypted, thereby implementing encryption of data based on the file manager.
6. The storage encryption system based on the homemade AI chip architecture as claimed in claim 5, wherein: the storing the data in the predetermined tree structure in S21 includes:
splitting data into a plurality of data blocks;
and storing the plurality of split data blocks in a preset tree structure to obtain a basic directory.
7. The storage encryption system based on the homemade AI chip architecture as claimed in claim 1, wherein: the domestic AI chip also comprises a compression module, wherein the compression module is connected between the encryption module and the write-in module, and the compression module is used for compressing the data encrypted by the encryption module and sending the data to the write-in module.
8. The storage encryption system based on the homemade AI chip architecture as claimed in claim 7, wherein: the compression module compresses the data encrypted by the encryption module, and the compression module comprises:
s31, compressing the original data according to the original data, a preset precision value and a preset lower limit value corresponding to the original data to obtain an actual stored value, wherein the digit of the actual stored value is less than that of the original data;
and S32, storing the actual storage value into a preset storage space, wherein the digit of the preset storage space is determined by a preset precision value, a preset lower limit value and a preset upper limit value corresponding to the original data.
9. The storage encryption system based on the homemade AI chip architecture of claim 8, wherein: compressing the original data according to the original data, a preset precision value and a preset lower limit value corresponding to the original data, and obtaining an actual stored value includes:
compressing the original data according to the following formula to obtain an actual storage value;
wherein f (real) is original data, f (min) is a preset lower limit value, f (a) is a preset precision value, and F (flash) is an actual storage value;
determining the maximum storage space occupied by the actual storage value according to the preset precision value, the preset lower limit value and the preset upper limit value comprises the following steps:
determining the maximum occupied storage space of the actual storage value according to the following formula;
wherein f (max) is a preset upper limit, f (min) is a preset lower limit, f (a) is a preset precision value, and F (flash max) is a preset maximum occupied storage space.
Determining the number of bits of the preset storage space according to the maximum occupied storage space comprises:
determining the digit of a preset storage space according to the following formula;
F(capacity)=log2(F(flash max))+1
wherein, f (flash max) is the maximum occupied storage space, and f (capacity) is the number of bits of the preset storage space.
10. The control method of the storage encryption system based on the homemade AI chip architecture according to claim 1, comprising the steps of:
s1, receiving data through a data acquisition interface;
s2, encrypting the received data after decoding;
s3, storing the encrypted data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111327154.8A CN114065240A (en) | 2021-11-10 | 2021-11-10 | Storage encryption system based on domestic AI chip architecture and control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111327154.8A CN114065240A (en) | 2021-11-10 | 2021-11-10 | Storage encryption system based on domestic AI chip architecture and control method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114065240A true CN114065240A (en) | 2022-02-18 |
Family
ID=80274574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111327154.8A Pending CN114065240A (en) | 2021-11-10 | 2021-11-10 | Storage encryption system based on domestic AI chip architecture and control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114065240A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104901810A (en) * | 2015-06-02 | 2015-09-09 | 浪潮集团有限公司 | Data encrypted storage method based on domestic cryptographic algorithm |
CN108667595A (en) * | 2017-03-28 | 2018-10-16 | 吉林化工学院 | A kind of compression encryption method of large data files |
CN108804935A (en) * | 2018-05-31 | 2018-11-13 | 中国-东盟信息港股份有限公司 | A kind of safety encryption storage system and method based on TrustZone |
CN108874714A (en) * | 2018-06-06 | 2018-11-23 | 山东超越数控电子股份有限公司 | A kind of secure communication device based on chip |
CN109726567A (en) * | 2018-11-27 | 2019-05-07 | 南京邮电大学 | A kind of mobile target encryption method based on full homomorphic cryptography |
CN109840434A (en) * | 2019-01-24 | 2019-06-04 | 山东华芯半导体有限公司 | A kind of method for secure storing based on the close chip of state |
CN208939993U (en) * | 2018-05-03 | 2019-06-04 | 中国—东盟信息港股份有限公司 | A kind of terminal security encryption storage system |
CN211427340U (en) * | 2019-12-06 | 2020-09-04 | 合肥市卓怡恒通信息安全有限公司 | Storage encryption system based on domestic chip platform and computer |
CN111865328A (en) * | 2020-08-11 | 2020-10-30 | 珠海美佳音科技有限公司 | Compression method of environment data and related device |
CN113094756A (en) * | 2021-05-13 | 2021-07-09 | 统信软件技术有限公司 | Data encryption method and computing device |
CN113449317A (en) * | 2020-03-27 | 2021-09-28 | 华为技术有限公司 | Method for encrypting data and control equipment |
-
2021
- 2021-11-10 CN CN202111327154.8A patent/CN114065240A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104901810A (en) * | 2015-06-02 | 2015-09-09 | 浪潮集团有限公司 | Data encrypted storage method based on domestic cryptographic algorithm |
CN108667595A (en) * | 2017-03-28 | 2018-10-16 | 吉林化工学院 | A kind of compression encryption method of large data files |
CN208939993U (en) * | 2018-05-03 | 2019-06-04 | 中国—东盟信息港股份有限公司 | A kind of terminal security encryption storage system |
CN108804935A (en) * | 2018-05-31 | 2018-11-13 | 中国-东盟信息港股份有限公司 | A kind of safety encryption storage system and method based on TrustZone |
CN108874714A (en) * | 2018-06-06 | 2018-11-23 | 山东超越数控电子股份有限公司 | A kind of secure communication device based on chip |
CN109726567A (en) * | 2018-11-27 | 2019-05-07 | 南京邮电大学 | A kind of mobile target encryption method based on full homomorphic cryptography |
CN109840434A (en) * | 2019-01-24 | 2019-06-04 | 山东华芯半导体有限公司 | A kind of method for secure storing based on the close chip of state |
CN211427340U (en) * | 2019-12-06 | 2020-09-04 | 合肥市卓怡恒通信息安全有限公司 | Storage encryption system based on domestic chip platform and computer |
CN113449317A (en) * | 2020-03-27 | 2021-09-28 | 华为技术有限公司 | Method for encrypting data and control equipment |
CN111865328A (en) * | 2020-08-11 | 2020-10-30 | 珠海美佳音科技有限公司 | Compression method of environment data and related device |
CN113094756A (en) * | 2021-05-13 | 2021-07-09 | 统信软件技术有限公司 | Data encryption method and computing device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11736460B2 (en) | Encryption schemes with addressable elements | |
CN108632028B (en) | Authentication network | |
US8284933B2 (en) | Encrypting variable-length passwords to yield fixed-length encrypted passwords | |
CN109150968A (en) | A kind of block chain distributed storage method based on privacy sharing | |
CN103023635A (en) | Method and device for message backup | |
CN105516340A (en) | Cloud storage data recoverability verification method and system | |
CN111310222A (en) | File encryption method | |
Zeng et al. | A distributed fault/intrusion-tolerant sensor data storage scheme based on network coding and homomorphic fingerprinting | |
WO2018174112A1 (en) | Technology for authenticating device on network | |
CN116324778A (en) | Updatable private collection intersections | |
Venčkauskas et al. | Covert channel for cluster-based file systems using multiple cover files | |
CN116894273B (en) | File encryption method, decryption method, equipment and medium based on exclusive or sum remainder | |
CN104794243B (en) | Third party's cipher text retrieval method based on filename | |
CN116707804B (en) | Method and equipment for enhancing FF1 format reserved encryption security | |
CN114065240A (en) | Storage encryption system based on domestic AI chip architecture and control method | |
KR101894566B1 (en) | Data transmission apparatus and method for encoding by integrating authentication and error correction | |
CN114995949A (en) | Container mirror image construction method and device | |
Ignatenko et al. | Fundamental limits for biometric identification with a database containing protected templates | |
Oggier et al. | Homomorphic self-repairing codes for agile maintenance of distributed storage systems | |
CN112738082B (en) | Secret information storage verification method and device based on cloud storage and storage medium | |
CN115758434B (en) | Efficient coding and encrypting method for data | |
CN115834163B (en) | Method, device, equipment and storage medium for generating secret key of encrypted data | |
CN117786644B (en) | Safe face recognition system with face self-characteristics participating in encryption and decryption | |
CN116915501B (en) | Internet of things information security management method and system | |
CN115913554B (en) | Efficient trace federal learning method, system and related equipment based on national density |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |