CN115278312A - Set top box information secure transmission encryption method - Google Patents

Set top box information secure transmission encryption method Download PDF

Info

Publication number
CN115278312A
CN115278312A CN202210864542.8A CN202210864542A CN115278312A CN 115278312 A CN115278312 A CN 115278312A CN 202210864542 A CN202210864542 A CN 202210864542A CN 115278312 A CN115278312 A CN 115278312A
Authority
CN
China
Prior art keywords
top box
data
encryption
server
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210864542.8A
Other languages
Chinese (zh)
Other versions
CN115278312B (en
Inventor
任亮
张志军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongshan Yilian Intelligent Technology Co ltd
Original Assignee
Zhongshan Yilian Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongshan Yilian Intelligent Technology Co ltd filed Critical Zhongshan Yilian Intelligent Technology Co ltd
Priority to CN202210864542.8A priority Critical patent/CN115278312B/en
Publication of CN115278312A publication Critical patent/CN115278312A/en
Application granted granted Critical
Publication of CN115278312B publication Critical patent/CN115278312B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities

Abstract

The invention discloses a set-top box information secure transmission encryption method, which relates to the technical field of data transmission and comprises the following steps: s1, a set-top box initiates a data service request; s2, verifying data by the server; s3, randomly generating an encryption and decryption code; s4, generating binary bin data; s5, loading the received binary bin data into a specific operation area of a CPU (Central processing Unit) of the set top box; s6, the set top box transmits data subsequently; s7, the server decrypts the plaintext data, and then encrypts and sends the data to the set top box; s8, the set top box receives the server data to obtain plaintext data; and S9, finishing the communication between the set top box and the server. According to the set-top box information security transmission encryption method, bin data are stored in the specific operation area of the set-top box CPU, the problem that bin files are statically analyzed is avoided, and therefore the effect of greatly improving the security of sensitive information transmission under the condition that hardware cost is not increased is achieved.

Description

Set top box information secure transmission encryption method
Technical Field
The invention relates to the technical field of data transmission, in particular to a set top box information secure transmission encryption method.
Background
With the continuous progress of digital home technology, the functions implemented on the set-top box are more and more, and thus, the requirement of the diversified content services on security is higher and higher.
In the prior art, the transmission process is generally encrypted, and the encryption process is divided into a symmetric encryption algorithm and an asymmetric encryption algorithm. At present, encryption and decryption algorithms are introduced in the transmission process, and transmission safety is guaranteed to a certain extent, but the two encryption algorithms both need to store keys in set-top box software; at present, the set-top box software releases updates through a network public release way, bin files are possibly statically analyzed, and keys stored in the software are obtained, so that information transmission is not safe any more.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a method for encrypting the information security transmission of a set-top box, which aims to solve the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme: a set-top box information secure transmission encryption method comprises the following steps:
s1, a set-top box initiates a data service request to a server;
s2, after the server receives the data, the server verifies the data;
s3, randomly generating an encryption and decryption code after the data verification is passed;
s4, the server automatically compiles codes to generate binary bin data, and the binary bin data is sent to the set top box through an asymmetric encryption algorithm;
s5, the set top box loads the received binary bin data into a specific operation area of a set top box CPU;
s6, the set top box performs subsequent data transmission, plaintext data are encrypted through codes of a specific running area of a CPU of the set top box, and then an asymmetric encryption algorithm is performed to send the encrypted plaintext data to the server;
s7, the server decrypts the plaintext data in the step S6, and then sends the data to the set top box through an asymmetric encryption algorithm;
s8, the set top box receives the data sent by the server, decrypts the data through an asymmetric encryption algorithm, and then transmits the data to a specific operation area of a CPU of the set top box for decryption to obtain plaintext data;
and S9, finishing the communication between the set top box and the server.
In step S1, after the server receives the data service request, the set-top box sends the request data to the server through an asymmetric encryption algorithm.
Further optimizing the technical solution, in the step S2, the server verifies the data based on the asymmetric encryption algorithm.
Further optimizing the technical scheme, in the steps S1 and S2, the asymmetric encryption algorithm used includes an RSA algorithm, a DSA algorithm, an elliptic encryption ECC algorithm, and a DH algorithm.
Further optimizing the technical scheme, in the step S3, the server dynamically and randomly generates a private encryption and decryption code according to the ID of the set-top box client; the private encryption and decryption algorithms of the encryption and decryption codes are the same, but the participating arrays are randomly generated.
Further optimizing the technical scheme, the random generation of the array in the encryption and decryption code comprises the following specific steps:
the method comprises the steps of firstly generating unpredictable random numbers through a quantum random number generator, and then obtaining an array meeting the requirement of generating a public key and a private key pair by encrypting and decrypting codes through a large integer prime number screening algorithm.
Further optimizing the technical solution, in the step S5, the specific operating area of the CPU of the set-top box is another core of the dual cores of the CPU or the IOP.
In step S7, when decrypting, the server receives the data, the data is decrypted by the asymmetric encryption algorithm, and then the decrypted code generated in step S1 by the set-top box is used to decrypt the data, so as to obtain plaintext data.
In step S7, when encrypting, the server sends data, and the server encrypts the data by using the encryption code generated by the set-top box in step S1, and then sends the data to the set-top box after encrypting the data by using the asymmetric encryption algorithm.
Further optimizing the technical solution, in step S9, after the communication is finished, the private encryption and decryption code starts to be regenerated in step S1 every time new transmission is started, and dynamic operation is maintained in the memory of the set top box.
Compared with the prior art, the invention provides a set-top box information secure transmission encryption method, which has the following beneficial effects:
according to the set-top box information security transmission encryption method, bin data are stored in the specific operation area of the set-top box CPU, the method is different from the method that the bin data are stored in the set-top box software in the prior art, compared with the prior art, the method has the advantage that the problem that bin files are statically analyzed does not occur, and therefore the effect of greatly improving the security of sensitive information transmission under the condition that the hardware cost is not increased is achieved.
Drawings
Fig. 1 is a schematic flow chart of a set top box information secure transmission encryption method according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example (b):
referring to fig. 1, a method for encrypting information security transmission of a set top box can make transmission of sensitive data on the set top box more secure, and the method includes the following steps:
s1, the set top box initiates a data service request to a server.
After the server receives the data service request, the set top box sends the request data to the server through an asymmetric encryption algorithm.
And S2, after the server receives the data, the server verifies the data based on the asymmetric encryption algorithm.
The asymmetric encryption algorithm comprises an RSA algorithm, a DSA algorithm, an elliptic encryption ECC algorithm and a DH algorithm. In this embodiment, we adopt the RSA algorithm, which makes it very easy to multiply two large prime numbers, but it is very difficult to factorize the product, and discloses the product as an encryption key, i.e. a public key, and combines the two large prime numbers into a private key. The public key is distributable for anyone to use, and the private key is owned by the owner for decryption.
And S3, randomly generating an encryption and decryption code after the data verification is passed.
The server dynamically and randomly generates a private encryption and decryption code according to the ID of the set-top box client; and the private encryption and decryption algorithm of the encryption and decryption code is the same, but the participating arrays are randomly generated.
Further, the random generation of the array in the encryption and decryption code comprises the following specific steps:
firstly, unpredictable random numbers are generated through a quantum random number generator, and then the random numbers are subjected to a large integer prime number screening algorithm to obtain an array meeting the requirements of generating a public key and a private key pair by an encryption and decryption code.
And S4, the server automatically compiles codes to generate binary bin data, and the binary bin data is sent to the set top box through an asymmetric encryption algorithm.
And S5, the set top box loads the received binary bin data into a specific operation area of a set top box CPU.
The specific operation area of the set-top box CPU is the other CPU core or IOP and the like in the CPU dual cores, and bin data does not need to be stored in set-top box software.
And S6, the set top box performs subsequent data transmission, the plaintext data is encrypted through codes of a specific running area of a CPU of the set top box, and then an asymmetric encryption algorithm is performed to send the encrypted plaintext data to the server.
And S7, the server decrypts the plaintext data in the step S6, and then sends the data to the set top box through an asymmetric encryption algorithm.
When decryption is carried out, the server receives the data, the data are decrypted through the asymmetric encryption algorithm, and then the data are decrypted through the decryption code generated in the step S1 through the set top box, and plaintext data are obtained.
When encryption is carried out, the server sends data, the data are encrypted through the encryption code generated in the step S1 by the set top box, and then the data are sent to the set top box after being encrypted through the asymmetric encryption algorithm.
And S8, the set top box receives the data sent by the server, decrypts the data through an asymmetric encryption algorithm, and then transmits the data to a specific operation area of a CPU of the set top box for decryption, so that plaintext data are obtained.
And S9, finishing the communication between the set top box and the server.
After the communication is finished, the private encryption and decryption codes are newly generated in step S1 every time a new transmission is started, and the private encryption and decryption codes are kept running dynamically in the memory of the set-top box.
In the embodiment, the method stores the bin data in the specific running area of the set top box CPU, which is different from the prior art that the bin data is stored in the set top box software, compared with the prior art, the method does not have the problem that the bin file is statically analyzed, thereby realizing the effect of greatly improving the transmission safety of the sensitive information without increasing the hardware cost.
The invention has the beneficial effects that:
according to the set-top box information security transmission encryption method, bin data are stored in a specific running area of a set-top box CPU, the method is different from the method that the bin data are stored in set-top box software in the prior art, compared with the prior art, the method has the advantage that the bin file is not statically analyzed, and therefore the effect of greatly improving the security of sensitive information transmission under the condition that the hardware cost is not increased is achieved.
In the description of the specification, reference to the description of "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (10)

1. A set top box information secure transmission encryption method is characterized by comprising the following steps:
s1, a set-top box initiates a data service request to a server;
s2, after the server receives the data, the server verifies the data;
s3, after the data verification is passed, randomly generating an encryption and decryption code;
s4, the server automatically compiles codes to generate binary bin data, and the binary bin data is sent to the set top box through an asymmetric encryption algorithm;
s5, the set top box loads the received binary bin data into a specific operation area of a set top box CPU;
s6, the set top box performs subsequent data transmission, plaintext data are encrypted through codes of a specific running area of a CPU of the set top box, and then an asymmetric encryption algorithm is performed to send the encrypted plaintext data to the server;
s7, the server decrypts the plaintext data in the step S6, and then sends the data to the set top box through an asymmetric encryption algorithm;
s8, the set top box receives the data sent by the server, decrypts the data through an asymmetric encryption algorithm, and then transmits the data to a specific operation area of a CPU of the set top box for decryption to obtain plaintext data;
and S9, finishing the communication between the set top box and the server.
2. The set-top box information secure transmission encryption method according to claim 1, wherein in step S1, after the server receives the data service request, the set-top box sends the request data to the server through an asymmetric encryption algorithm.
3. The method for encrypting the information of the set-top box in the secure transmission according to claim 1, wherein in the step S2, the server verifies the data based on an asymmetric encryption algorithm.
4. The encryption method for securely transmitting information of set-top box according to claim 1, wherein the asymmetric encryption algorithm used in steps S1 and S2 includes RSA algorithm, DSA algorithm, elliptic encryption ECC algorithm, and DH algorithm.
5. The set-top box information secure transmission encryption method according to claim 1, wherein in step S3, the server dynamically and randomly generates a private encryption and decryption code according to the ID of the set-top box client; the private encryption and decryption algorithms of the encryption and decryption codes are the same, but the participating arrays are randomly generated.
6. The set-top box information secure transmission encryption method according to claim 5, wherein the random generation of the array in the encryption and decryption codes comprises the following specific steps:
firstly, unpredictable random numbers are generated through a quantum random number generator, and then the random numbers are subjected to a large integer prime number screening algorithm to obtain an array meeting the requirements of generating a public key and a private key pair by an encryption and decryption code.
7. The method as claimed in claim 1, wherein in step S5, the specific operating area of the CPU of the set-top box is another core of the CPU dual cores or IOP.
8. The method for encrypting the information security transmission of the set-top box according to claim 1, wherein in the step S7, when decrypting, the server receives the data, the data is decrypted by the asymmetric encryption algorithm, and then the decryption code generated in the step S1 by the set-top box is used for decrypting, so as to obtain the plaintext data.
9. The set-top box information secure transmission encryption method according to claim 1, wherein in the step S7, when performing encryption, the server sends data, the data is encrypted by the encryption code generated by the set-top box in the step S1, and then the data is sent to the set-top box after being encrypted by the asymmetric encryption algorithm.
10. The method as claimed in claim 1, wherein in step S9, after the communication is completed, the private encryption/decryption code is generated again in step S1 each time a new transmission is started, and the private encryption/decryption code is kept running dynamically in the memory of the set-top box.
CN202210864542.8A 2022-07-21 2022-07-21 Encryption method for safe transmission of set top box information Active CN115278312B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210864542.8A CN115278312B (en) 2022-07-21 2022-07-21 Encryption method for safe transmission of set top box information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210864542.8A CN115278312B (en) 2022-07-21 2022-07-21 Encryption method for safe transmission of set top box information

Publications (2)

Publication Number Publication Date
CN115278312A true CN115278312A (en) 2022-11-01
CN115278312B CN115278312B (en) 2023-11-14

Family

ID=83767906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210864542.8A Active CN115278312B (en) 2022-07-21 2022-07-21 Encryption method for safe transmission of set top box information

Country Status (1)

Country Link
CN (1) CN115278312B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101783925A (en) * 2010-03-30 2010-07-21 南京邮电大学 Method for security protection of video data of set top box for peer-to-peer computing
CN101964786A (en) * 2010-09-17 2011-02-02 中山大学 Set-top box-based secure information transmission system and method
CN103001976A (en) * 2012-12-28 2013-03-27 中国科学院计算机网络信息中心 Safe network information transmission method
CN105119891A (en) * 2015-07-15 2015-12-02 华数传媒网络有限公司 Data interaction method, set top box and server
CN106982186A (en) * 2016-01-16 2017-07-25 周念东 A kind of online safe key guard method and system
WO2017201809A1 (en) * 2016-05-27 2017-11-30 宇龙计算机通信科技(深圳)有限公司 Communication method and system for terminal
CN110493265A (en) * 2019-09-18 2019-11-22 珠海格力电器股份有限公司 The method and storage medium of encryption data
US20210152351A1 (en) * 2019-04-09 2021-05-20 Mark Rodney Anson Computer System Implemented Method for Generating a Symmetric Encryption Key Used for Encrypting and Decrypting a Computer System User's Hidden Data
CN113225352A (en) * 2021-05-28 2021-08-06 国网绿色能源有限公司 Data transmission method and device, electronic equipment and storage medium
CN113286180A (en) * 2021-05-19 2021-08-20 中山亿联智能科技有限公司 IPTV anti-stealing-link method applied to set top box
WO2022015359A1 (en) * 2020-07-16 2022-01-20 Salesforce.Com, Inc. Securing data using key agreement

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101783925A (en) * 2010-03-30 2010-07-21 南京邮电大学 Method for security protection of video data of set top box for peer-to-peer computing
CN101964786A (en) * 2010-09-17 2011-02-02 中山大学 Set-top box-based secure information transmission system and method
CN103001976A (en) * 2012-12-28 2013-03-27 中国科学院计算机网络信息中心 Safe network information transmission method
CN105119891A (en) * 2015-07-15 2015-12-02 华数传媒网络有限公司 Data interaction method, set top box and server
CN106982186A (en) * 2016-01-16 2017-07-25 周念东 A kind of online safe key guard method and system
WO2017201809A1 (en) * 2016-05-27 2017-11-30 宇龙计算机通信科技(深圳)有限公司 Communication method and system for terminal
US20210152351A1 (en) * 2019-04-09 2021-05-20 Mark Rodney Anson Computer System Implemented Method for Generating a Symmetric Encryption Key Used for Encrypting and Decrypting a Computer System User's Hidden Data
CN110493265A (en) * 2019-09-18 2019-11-22 珠海格力电器股份有限公司 The method and storage medium of encryption data
WO2022015359A1 (en) * 2020-07-16 2022-01-20 Salesforce.Com, Inc. Securing data using key agreement
CN113286180A (en) * 2021-05-19 2021-08-20 中山亿联智能科技有限公司 IPTV anti-stealing-link method applied to set top box
CN113225352A (en) * 2021-05-28 2021-08-06 国网绿色能源有限公司 Data transmission method and device, electronic equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MICHELLE S. HENRIQUES: ""Using symmertric and asymmetric cryptography to secure communication between devices in IoT"", 《2017 INTERNATIONAL CONFERENCE ON IOT AND APPLICATION》 *
严新成: ""云环境下安全数据共享与更新关键技术研究"", 《中国博士学位论文全文数据库》 *
王宏远,周爱弟: "数字机顶盒系统的软件加密设计", 《计算机与数字工程》 *

Also Published As

Publication number Publication date
CN115278312B (en) 2023-11-14

Similar Documents

Publication Publication Date Title
CN109672518B (en) Node data processing of quantum attack resistant blockchains
US11563567B2 (en) Secure shared key establishment for peer to peer communications
CA2154970C (en) Method for sharing secret information, generating a digital signature, and performing certification in a communication system that has a plurality of information procesing apparatuses and a communication system that employs such a method
US7260215B2 (en) Method for encryption in an un-trusted environment
CN111130757A (en) Multi-cloud CP-ABE access control method based on block chain
CN109981255B (en) Method and system for updating key pool
CN109547198B (en) System for network transmission video file
JP4156588B2 (en) Cryptographic communication system, key distribution server, terminal device, and key sharing method
CN113239403A (en) Data sharing method and device
CN110581829A (en) Communication method and device
WO2013136235A1 (en) Byzantine fault tolerance and threshold coin tossing
CN113297599A (en) Data transmission system, data acquisition method, terminal, and storage medium
CN111131311A (en) Data transmission method based on block chain and block chain link point
CN115278312B (en) Encryption method for safe transmission of set top box information
CN112423295B (en) Lightweight security authentication method and system based on block chain technology
CN115051797A (en) Distributed key escrow system with password
CN113079015A (en) Electric power data anti-counterfeiting encryption verification method and system
CN114189338A (en) SM9 secret key safety distribution and management system and method based on homomorphic encryption technology
CN114765543A (en) Encryption communication method and system of quantum cryptography network expansion equipment
CN113658031A (en) Electronic signature method, system and storage medium
CN108683627B (en) Internet of things node-to-node communication encryption method and system
CN115484031B (en) SGX-based trusted-free third-party cloud storage ciphertext deduplication method and system
CN114978514B (en) Key management method, system, device, electronic device and storage medium
CN112947855B (en) Efficient encryption repeated data deleting method based on hardware security zone
CN114071461B (en) 5G communication module based on quantum key encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant