WO2021129676A1 - Procédé et appareil de construction d'uri, et support et dispositif - Google Patents
Procédé et appareil de construction d'uri, et support et dispositif Download PDFInfo
- Publication number
- WO2021129676A1 WO2021129676A1 PCT/CN2020/138676 CN2020138676W WO2021129676A1 WO 2021129676 A1 WO2021129676 A1 WO 2021129676A1 CN 2020138676 W CN2020138676 W CN 2020138676W WO 2021129676 A1 WO2021129676 A1 WO 2021129676A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- uri
- character string
- serial number
- encrypted
- key2
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/30—Types of network names
- H04L2101/38—Telephone uniform resource identifier [URI]
Definitions
- This article relates to Internet technology, especially to URI construction methods, devices, media and equipment.
- the client HTTP access request is usually a plain text URL.
- the access intention will be completely exposed, leading to further hijacking or exposing the client's privacy records.
- the server uses scheduling technology such as 302
- the redirect URL is also in plain text, which can easily reveal the scheduling strategy.
- this article provides a URI construction method, device, medium and equipment.
- a URI construction method which is applied to the sender, including:
- the second serial number KEY2 is obtained after calculation according to a predetermined algorithm
- the second sequence number KEY2 obtained after the operation according to a predetermined algorithm based on the pre-defined first sequence number KEY1 includes:
- a random value is generated by a random number generator or a timestamp, and after the random value is spliced with the first serial number KEY1, it is calculated according to a predetermined algorithm to obtain the second serial number KEY2.
- the remaining fields after extracting the key fields from the first character string and the target URI are spliced according to preset rules or After splicing according to preset rules, specific fields are inserted to form an encrypted URI.
- the random value is spliced with the first serial number KEY1, and the second serial number KEY2 is obtained according to a predetermined algorithm
- the first character string, the second character string, and the target After the URI extracts the key fields, the remaining fields are spliced according to preset rules or specific fields are inserted after splicing according to preset rules to form an encrypted URI.
- Applied to the receiving end including:
- the second serial number KEY2 is obtained after calculation according to a predetermined algorithm
- a decryption operation is performed on the encrypted key field to obtain the key field.
- the second sequence number KEY2 obtained after calculation based on the pre-defined first sequence number KEY1 includes: obtaining the second sequence number KEY2 after decoding the second character string Random value, after splicing the random value with the first serial number KEY1, calculate according to a predetermined algorithm to obtain the second serial number KEY2.
- a URI construction device which is applied to the sender, and includes:
- the key field extraction module is used to extract the key fields in the target URI;
- An encryption module for encrypting the key field, and the encrypted key field is encoded to generate a first character string
- An encrypted URI generating module configured to generate an encrypted URI based on the first character string
- the sending module is used to send the encrypted URI.
- the second serial number KEY2 is obtained after calculation according to a predetermined algorithm
- the second sequence number KEY2 obtained after the operation according to a predetermined algorithm based on the pre-defined first sequence number KEY1 includes:
- a random number is generated by a random number generator or a time stamp, and after the random number is spliced with the first serial number KEY1, a predetermined algorithm is used to obtain the second serial number KEY2.
- the encryption module is also used to generate a second character string after encoding the random value
- the remaining fields after the key fields are extracted from the first character string and the target URI are spliced according to preset rules Or insert specific fields after splicing according to preset rules to form an encrypted URI.
- the random value is spliced with the first serial number KEY1, and the second serial number KEY2 is obtained according to a predetermined algorithm
- the first character string, the second character string, and the target After the URI extracts the key fields, the remaining fields are spliced according to preset rules or specific fields are inserted after splicing according to preset rules to form an encrypted URI.
- URI construction device applied to the receiving end, including:
- the receiving module is used to receive encrypted URI requests
- a character string extraction module which extracts the first character string
- a decryption module to decrypt the first character string to obtain a key field
- the restoration module is configured to replace the first encrypted character string in the encrypted URI with the key field, and restore the encrypted URI to the target URI.
- the second serial number KEY2 is obtained after calculation according to a predetermined algorithm
- a decryption operation is performed on the encrypted key field to obtain the key field.
- the second sequence number KEY2 obtained after calculation based on the pre-defined first serial number KEY1 according to a predetermined algorithm includes: the pre-defined first serial number KEY1 Operate according to a predetermined algorithm to obtain the second serial number KEY2;
- the second sequence number KEY2 obtained after the operation according to a predetermined algorithm based on the pre-defined first serial number KEY1 includes: A random value is obtained after decoding, and after the random value is spliced with the first serial number KEY1, a predetermined algorithm is used to obtain the second serial number KEY2.
- a computer-readable storage medium on which a computer program is stored, which implements the steps of the URI construction method when the computer program is executed.
- a computer device including a processor, a memory, and a computer program stored on the memory, and the processor implements the steps of the URI construction method when the processor executes the computer program.
- This article uses the RUI construction method to realize that the sender encrypts the target URI and sends it to the receiver. After receiving the encrypted URI request, the receiver decrypts the encrypted URI and restores it to the original target URI. It can effectively prevent intermediate hijacking to obtain real access intentions and private information. At the same time, due to the addition of random values, even if the same resource is obtained, different encrypted URIs will be generated, avoiding cache pollution caused by intermediate hijacking.
- the URI encryption method in this article there is no need to carry out complicated transformations on the existing server, and only a simple encoding device and/or decryption device is set on the server or client side.
- Fig. 1 is a flow chart showing a method for constructing a URI according to an exemplary embodiment.
- Fig. 2 is a flow chart showing a method for constructing a URI according to an exemplary embodiment.
- Fig. 3 is a block diagram showing a URI construction device according to an exemplary embodiment.
- Fig. 4 is a block diagram showing a URI construction device according to an exemplary embodiment.
- Fig. 5 is a block diagram showing a computer device according to an exemplary embodiment.
- FIG. 1 is a flowchart of the URI construction method. As shown in Figure 1, the URI construction method is applied to the sender, including:
- Step S11 extract key fields in the target URI
- Step S12 encrypting the key field, and encoding the encrypted key field to generate a first character string
- Step S13 generating an encrypted URI based on the first character string
- Step S14 Send the encrypted URI.
- the sender In order to prevent intermediate hijacking, the sender encrypts the key fields in the target URI to be sent and sends the encrypted URI.
- the request sent by the client is no longer a plaintext URI, and the scheduling information sent by the server is no longer a plaintext URI, which can effectively prevent intermediate hijacking.
- the key field determined according to actual conditions, can be the name of the target file to be accessed, or the entire path of the file, to achieve the purpose of hiding the access intent.
- step S12 encrypting the key field, and generating the first character string after encoding includes:
- the second serial number KEY2 is obtained after calculation according to a predetermined algorithm
- the sender obtains the second serial number KEY2 based on the first serial number KEY1 according to a predetermined algorithm, and uses the second serial number KEY2 to encrypt the extracted key field.
- the decryptor also obtains the second serial number KEY2 based on the first serial number KEY1 according to the same predetermined algorithm, and uses the second serial number KEY2 to perform the inverse operation on the encrypted key field for decryption.
- the predetermined algorithm in this article can be any algorithm, such as calculating a hash value, or splicing a specific character string, etc.
- the purpose is to make the sending end and the receiving end calculate the second sequence number KEY2 according to the predefined first sequence number, and use The same second serial number KEY2 is encrypted or decrypted.
- the sender uses the second serial number to encrypt the key field, the first character string is generated.
- the original URI is http://www.baidu.com/doc/2019/readme.txt
- the client first determines the key field according to the access intention.
- the key field is determined to be /doc/2019/readme.txt;
- the pre-defined first serial number KEY1 is text
- the second sequence number key2 is obtained after a predetermined algorithm.
- path is the key field. In this embodiment, it is /doc/2019/readme.txt. After the key field is encrypted, the hexadecimal encoding is :
- the second sequence number KEY2 obtained after calculation according to a predetermined algorithm includes:
- the above encryption process for the original URI of http://www.baidu.com/doc/2019/readme.txt after being encrypted in this way, may cause the same URI request of different clients to be completely the same after encryption. Therefore, the URI construction method in this article also provides the following method to generate a random value through a random number generator or a timestamp, and after the random value is spliced with the first serial number KEY1, a predetermined algorithm is used to calculate the second serial number KEY2.
- the second sequence number KEY2 used for encryption and decryption is generated based on the random value of the sender and the first sequence number KEY1. Different senders generate different KEY2, so that the encryption requests sent by different senders are unique, which further avoids being The possibility of hijacking and tampering in the middle.
- the URI construction method in this article also includes generating a second string after encoding a random value
- the remaining fields after extracting the key fields from the first string and the target URI are spliced according to preset rules or after splicing according to preset rules Then insert specific fields to form an encrypted URI.
- the second serial number KEY2 After concatenating the random value with the first serial number KEY1, calculate the second serial number KEY2 through predefined rules, extract the first string, the second string, and the target URI to the remaining fields after extracting the key fields, press Splicing by preset rules or inserting specific fields after splicing by preset rules to form an encrypted URI. If the key field is encrypted, the second serial number KEY2 used is calculated from the first serial number KEY1 and a random value. In order to enable the receiving end to calculate the second serial number KEY2 according to the first serial number KEY1, it also needs The second character string is sent to the receiving end, so that the receiving end calculates a random value according to the second character string through the inverse operation of the preset algorithm.
- the encrypted request will be different.
- the client sends an encrypted URI request
- the first string ⁇ new_path ⁇ , the second string ⁇ new_nonce ⁇ (if any) and the remaining fields after extracting the key fields from the target URI can be spliced according to the preset rules. For example: https://domain ⁇ new_nonce ⁇ new_path ⁇ .
- specific fields are also inserted, such as: https://domain/diaodu/ ⁇ new_nonce ⁇ new_path ⁇ , the first After the second string is spliced with the domain, a specific field is inserted: diaodu.
- the receiving end can know that the received URI is the scheduled URI.
- FIG 2 is a flowchart of the URI construction method. As shown in Figure 1, the URI construction method is applied to the receiving end, including:
- Step S21 receiving an encrypted URI request
- Step S22 Extract the first character string in the encrypted URI request
- Step S23 Decrypt the first character string to obtain key fields
- Step S24 Use the key field to replace the first encrypted character string in the encrypted URI, and restore the encrypted URI to the target URI.
- the receiver After receiving the encrypted URI request, the receiver extracts the first string, and uses the inverse algorithm corresponding to the encryption algorithm to decrypt the first string, so as to restore the encrypted URI to the original target URI, and proceed according to the original target URI. response.
- step S23 decrypts the first character string, and obtaining the key field includes:
- the second serial number KEY2 is obtained after calculation according to a predetermined algorithm
- the encrypted key field is decrypted to obtain the key field.
- the second serial number KEY2 obtained after the encryption operation includes: the pre-defined first serial number KEY1 is calculated according to the predetermined algorithm, and the result is obtained.
- the second serial number KEY2 obtained after calculation according to a predetermined algorithm includes: obtaining a random value after decoding the second character string, After splicing the random value with the first serial number KEY1, calculate according to a predetermined algorithm to obtain the second serial number KEY2. If the sending end calculates the second sequence number KEY2 based on the first sequence number and random value, the receiving end needs to decode the second string first to obtain the corresponding random number in order to obtain the same second sequence number KEY2 The numerical value is calculated based on the first serial number and the random value to obtain the same second serial number KEY2.
- the receiver also obtains the second sequence number KEY2 after the same encryption operation according to the pre-defined first sequence number KEY1, which guarantees the second sequence number used in the encryption process with the sender KEY2 is exactly the same and can decrypt the encrypted key field.
- the strategy for extracting key fields is: extract all strings after the URI domain name; generate random values through a random number generator, the strings are binary, [0x4,0x8,0x6,0x7], and the random values are represented by nonce; pre-defined The first serial number KEY1 is "test"; the binary sequence is converted into a string using hexadecimal notation; the predetermined algorithm is to calculate the hash value MD5 after the first serial number KEY1 and the nonce are spliced, and the original URI is:
- the sending end can be a client or a server. Before sending the above URI, an encrypted URI is generated first.
- the key field extracted by the sender is /doc/2019/readme.txt.
- new_path which is 7a0a071622dec2118eccc5a4b6b1110e85a3989aafd67e594b87c46d28dde2c890b4 f088
- the encrypted URI is:
- the key field decrypted by AES128_GCM is /doc/2019/readme.txt.
- both the client and the server can encrypt the URI sent by themselves to prevent intermediate hijacking, protect privacy and security, and ensure system security.
- the dispatch server After the dispatch server receives the client's original URI request or the encrypted URI request, it will generate a 302 response according to the dispatch policy.
- the original redirect URI is:
- new_nonce is the result of encoding the random number
- new_path is the result of encrypting the key field
- the dispatch server constructs the encrypted URI, it can also insert a specific field (diaodu) into the encrypted URI according to its own settings:
- the dispatch server can encrypt the URI of the target business server, hide the real address of the business server, and prevent the real address of the business server from being exposed after the response is hijacked, thereby protecting the dispatching strategy and improving the security of the business server.
- the RUL construction method provided in this article provides a method of encrypting and decrypting URIs.
- the sender encrypts the target URI and sends it to the receiver.
- the receiver After receiving the encrypted URI request, the receiver sends the encrypted URI to the encrypted URI. Decrypt and restore to the original target URI. It can effectively prevent intermediate hijacking to obtain real access intentions and private information.
- due to the addition of random values even requests for the same resource will generate different encrypted URIs, avoiding cache pollution caused by intermediate hijacking.
- to implement the URI encryption method in this article there is no need to carry out complicated transformations on the existing server, and only a simple encoding device and/or decryption device is set on the server or client side.
- FIG. 3 is a block diagram of a URI construction device.
- the URI construction device is applied to the sending end and includes: a key field extraction module 301, an encryption module 302, an encrypted URI generation module 303, and a sending module 304.
- the key field extraction module 301 is configured to extract key fields in the target URI;
- the encryption module 302 is configured to encrypt the key field, and the encrypted key field is encoded to generate a first character string;
- the encrypted URI generating module 303 is configured to generate an encrypted URI based on the first character string
- the sending module 304 is used to send the encrypted URI.
- the first character string generated by the encryption module 302 includes:
- the second serial number KEY2 is obtained after calculation according to a predetermined algorithm
- the second serial number KEY2 obtained after calculation according to a predetermined algorithm includes:
- a random value is generated by a random number generator or a timestamp, and after the random value is spliced with the first serial number KEY1, a predetermined algorithm is used to obtain the second serial number KEY2.
- the encryption module 302 is also used to: generate a second character string after encoding the random value
- generating an encrypted URI includes:
- the remaining fields after the key fields are extracted from the first character string and the target URI are spliced according to preset rules Or insert specific fields after splicing according to preset rules to form an encrypted URI.
- the random value is spliced with the first serial number KEY1, and the second serial number KEY2 is obtained according to a predetermined algorithm
- the first character string, the second character string, and the target After the URI extracts the key fields, the remaining fields are spliced according to preset rules or specific fields are inserted after splicing according to preset rules to form an encrypted URI.
- FIG. 4 is a block diagram of a URI construction device.
- the URI construction device applied to the receiving end includes: a receiving module 401, a character string extraction module 402, a decryption module 403, and a restoration module 404.
- the receiving module 401 is configured to receive encrypted URI requests
- the character string extraction module 402 is configured to extract the first character string
- the decryption module 403 is configured to decrypt the first character string to obtain key fields
- the restoration module 404 is configured to replace the first encrypted character string in the encrypted URI with the key field, and restore the encrypted URI to the target URI.
- the second serial number KEY2 is obtained after calculation according to a predetermined algorithm
- the encrypted key field is decrypted to obtain the key field.
- the second serial number KEY2 is calculated according to the predetermined algorithm, including: the pre-defined first serial number KEY1 is calculated according to the predetermined algorithm to obtain The second serial number KEY2;
- the second serial number KEY2 obtained after calculation according to a predetermined algorithm includes: obtaining a random value after decoding the second character string, After the random value is spliced with the first serial number KEY1, it is calculated according to a predetermined algorithm to obtain the second serial number KEY2.
- Fig. 5 is a block diagram showing a computer device 500 for URI construction according to an exemplary embodiment.
- the computer device 500 may be provided as a server. 5
- the computer device 500 includes a processor 501, and the number of processors can be set to one or more as required.
- the computer device 500 further includes a memory 502 for storing instructions executable by the processor 501, such as application programs.
- the number of memories can be set to one or more as required.
- the stored application programs can be one or more.
- the processor 501 is configured to execute instructions to execute the URI construction method.
- Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storing information (such as computer readable instructions, data structures, program modules, or other data) , Including but not limited to RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridge, magnetic tape, magnetic disk storage or other magnetic storage device, or can be used for Any other medium that stores desired information and can be accessed by a computer.
- communication media usually contain computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as carrier waves or other transmission mechanisms, and may include any information delivery media. .
- These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
- the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
- These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
- the instructions provide steps for implementing the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
- the sender When the sender sends a URI request, it encrypts the target URI and sends it to the receiver. After receiving the encrypted URI request, the receiver decrypts the encrypted URI and restores it to the original target URI. It can effectively prevent intermediate hijacking to obtain real access intentions and private information. At the same time, due to the addition of random values, even if the same resource is obtained, different encrypted URIs will be generated, avoiding cache pollution caused by intermediate hijacking.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
La présente divulgation concerne un procédé et un appareil de construction d'identifiant uniforme de ressource (URI), un support et un dispositif. Le procédé de construction d'URI consiste : à extraire un champ clé à partir d'un URI cible ; à chiffrer le champ clé, à coder le champ clé chiffré, puis à générer une première chaîne de caractères ; à générer un URI chiffré sur la base de la première chaîne de caractères ; et à envoyer l'URI chiffré. La présente invention peut empêcher efficacement un détournement intermédiaire, exposer une intention d'accès, et protéger la confidentialité de l'utilisateur. Elle est utilisée pour la planification et peut également cacher une politique de planification, ce qui permet de protéger la sécurité d'un système de planification et d'un serveur de service.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911372781.6 | 2019-12-27 | ||
CN201911372781.6A CN113055343B (zh) | 2019-12-27 | 2019-12-27 | Uri构造方法、装置、介质及设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021129676A1 true WO2021129676A1 (fr) | 2021-07-01 |
Family
ID=76506042
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/138676 WO2021129676A1 (fr) | 2019-12-27 | 2020-12-23 | Procédé et appareil de construction d'uri, et support et dispositif |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN113055343B (fr) |
WO (1) | WO2021129676A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114785505A (zh) * | 2022-06-22 | 2022-07-22 | 中科雨辰科技有限公司 | 一种获取异常设备的数据处理系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1777090A (zh) * | 2004-11-18 | 2006-05-24 | 国际商业机器公司 | 资源隐藏与访问控制支持的无状态方法 |
JP2006216002A (ja) * | 2005-02-02 | 2006-08-17 | Foward Network:Kk | Urlセキュリティーシステム |
CN103701761A (zh) * | 2012-09-28 | 2014-04-02 | 中国电信股份有限公司 | 开放接口调用的认证方法与系统 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104009989B (zh) * | 2014-05-22 | 2018-02-16 | Tcl集团股份有限公司 | 一种媒体文件的防盗链方法、系统及服务器 |
CN108737442B (zh) * | 2018-06-12 | 2019-05-10 | 北京多采多宜网络科技有限公司 | 一种加密校验处理方法 |
CN109547201B (zh) * | 2018-12-14 | 2023-04-14 | 平安科技(深圳)有限公司 | 一种根密钥的加密方法、计算机可读存储介质及终端设备 |
-
2019
- 2019-12-27 CN CN201911372781.6A patent/CN113055343B/zh active Active
-
2020
- 2020-12-23 WO PCT/CN2020/138676 patent/WO2021129676A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1777090A (zh) * | 2004-11-18 | 2006-05-24 | 国际商业机器公司 | 资源隐藏与访问控制支持的无状态方法 |
JP2006216002A (ja) * | 2005-02-02 | 2006-08-17 | Foward Network:Kk | Urlセキュリティーシステム |
CN103701761A (zh) * | 2012-09-28 | 2014-04-02 | 中国电信股份有限公司 | 开放接口调用的认证方法与系统 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114785505A (zh) * | 2022-06-22 | 2022-07-22 | 中科雨辰科技有限公司 | 一种获取异常设备的数据处理系统 |
CN114785505B (zh) * | 2022-06-22 | 2022-08-23 | 中科雨辰科技有限公司 | 一种获取异常设备的数据处理系统 |
Also Published As
Publication number | Publication date |
---|---|
CN113055343A (zh) | 2021-06-29 |
CN113055343B (zh) | 2023-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11818262B2 (en) | Method and system for one-to-many symmetric cryptography and a network employing the same | |
CN101340279B (zh) | 数据加密及解密方法、系统及设备 | |
US20140143541A1 (en) | Method and Apparatus for Managing Encrypted Files in Network System | |
JP2010004269A (ja) | 通信装置、鍵サーバ及びデータ | |
CN111262852B (zh) | 基于区块链实现的名片签发方法及系统 | |
KR20180108008A (ko) | 키 생성 장치 및 방법, 암호화 장치 및 방법 | |
CN110049032A (zh) | 一种双向认证的数据内容加密方法及装置 | |
CA3056814A1 (fr) | Procede et systeme cryptographiques symetriques et leurs applications | |
CN110149312B (zh) | 数据处理方法、装置、系统及计算机可读存储介质 | |
WO2021129676A1 (fr) | Procédé et appareil de construction d'uri, et support et dispositif | |
JP5992651B2 (ja) | 暗号化方法、プログラム、および、システム | |
CN110149311B (zh) | 数据处理方法、装置、服务器及可读存储介质 | |
KR102050890B1 (ko) | 스트리밍 기반의 영상 보안 서버, 서버-클라이언트 간 보안 영상을 제공하는 방법 및 컴퓨터 판독 가능한 기록 매체 | |
US20240097886A1 (en) | End to end file-sharing schema using signed merkle tree randomly originated keys | |
WO2021129681A1 (fr) | Procédé et appareil de planification, support et dispositif | |
Lei et al. | Towards efficient re-encryption for secure client-side deduplication in public clouds | |
Aghili | Improving security using blow fish algorithm on deduplication cloud storage | |
Kumar et al. | A review and analysis on text data encryption techniques | |
Adkinson-Orellana et al. | Sharing secure documents in the cloud-a secure layer for Google Docs | |
CN108718235A (zh) | 一种流式加密和解密方法 | |
CN106611130A (zh) | 一种文件处理方法和装置 | |
Raj et al. | Performance Analysis of Hybrid Cryptographic Algorithms in Serverless Platforms |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20907303 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20907303 Country of ref document: EP Kind code of ref document: A1 |