CN102355350B - A kind of file encrypting method for mobile intelligent terminal and system - Google Patents

A kind of file encrypting method for mobile intelligent terminal and system Download PDF

Info

Publication number
CN102355350B
CN102355350B CN201110182211.8A CN201110182211A CN102355350B CN 102355350 B CN102355350 B CN 102355350B CN 201110182211 A CN201110182211 A CN 201110182211A CN 102355350 B CN102355350 B CN 102355350B
Authority
CN
China
Prior art keywords
file
encryption
encrypted
key
encryption key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110182211.8A
Other languages
Chinese (zh)
Other versions
CN102355350A (en
Inventor
卞佳丽
张峻明
邝坚
鲁琲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201110182211.8A priority Critical patent/CN102355350B/en
Publication of CN102355350A publication Critical patent/CN102355350A/en
Application granted granted Critical
Publication of CN102355350B publication Critical patent/CN102355350B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of file encrypting method and the system that are applied to field of mobile terminals, said method comprising the steps of: secret generating step, generate the encryption key of corresponding described protection class; File encryption step, to be encrypted described file to be encrypted according to described encryption key and to obtain encrypt file; Secret key encryption step, is encrypted described encryption key according to described user password; Write step, by the assigned address of encrypt file described in the encryption key write after encryption.According to method of the present invention, when can save user's file reading, need the time of query key, well ensure that the safety of encryption key, the fail safe of file is improved.

Description

A kind of file encrypting method for mobile intelligent terminal and system
Technical field
The present invention relates to a kind of file ciphering technology, particularly relate to a kind of graduate file encrypting method for mobile intelligent terminal and system.
Background technology
File encryption be a kind of as requested at operating system layer automatically to the technology that is encrypted of data of write storage medium, by being encrypted file to prevent fileinfo to be stolen.Along with the extensive use of mobile intelligent terminal, increasing hacker has aimed at mobile intelligent terminal user, the phenomenon that the fileinfo of user is stolen gets more and more, and therefore, carries out effective encryption just seem particularly important to the fileinfo of user in mobile intelligent terminal.
The title of Android (trade mark) the operating system mobile intelligent terminal operating system of increasing income based on Linux platform that to be Google company issue on November 5th, 2007, this platform is made up of operating system, middleware, user interface and application software, and being known as is first real opening of making for mobile terminal and complete mobile software.
Encryption method in existing Android operation system is all the encipher interface adopting application layer JAVA language to provide, use DES or aes algorithm, DES algorithm not only efficiency is low but also can not resist differential attack, and key length also only has 56, although aes algorithm has the key length of 128, arithmetic speed is but very slow.
In existing Android operation system the major way of storage key be directly key storage at lane database; but the database of Android self does not but have good safeguard measure; this makes once database is revealed; victim obtains by a large amount of key, causes user's significant data to leak in a large number.
The features such as BLOWFISH cryptographic algorithm is a kind of symmetric block ciphers designed by Bruce Schneier, has the ability of very strong resisting differential analytical attack, has efficient, and fail safe, key length are variable, have 32 to 448 selectable key lengths.But also there is a kind of potential safety hazard in this algorithm, namely after generation sub-key in order to improve enciphering rate, and sub-key is kept in Cache, if make Cache content victim steal like this, whole encryption subkey just can be caused to reveal.
Message Digest Algorithm 5 (MD5) is developed by Ronal L.Rivest, developed by MD2, MD3 and MD4, its effect is to message generating messages summary info, if message is modified in the air, so when receiving terminal recalculates this message digest value and former digest value compares, just can find out the difference of digest value, thus amendment must be there occurs by outbound message.
Summary of the invention
The object of the invention is to provide a kind of file encrypting method for mobile intelligent terminal and file encryption system, be intended to solve in prior art, due to ignoring of fail safe or ignoring efficiency, and the unsafe storage of the mobile terminal document caused or the excessively slow problem of encryption efficiency.
In order to solve the problems of the technologies described above, the invention provides a kind of file encrypting method for mobile intelligent terminal, it is characterized in that, comprising: secret generating step, generate the encryption key of corresponding described protection class; File encryption step, to be encrypted described file to be encrypted according to described encryption key and to obtain encrypt file; Secret key encryption step, is encrypted described encryption key according to described user password; Write step, by the assigned address of encrypt file described in the encryption key write after encryption.
Further, the method also comprises: in described secret generating step, select the protection class of file to be encrypted, different according to described protection class, and the length of corresponding described encryption key is different.
Further, the method also comprises: in described secret key encryption step, uses the described user password of summary information algorithm MD5 process to obtain the summary info of described user password, uses described summary info to encrypt described encryption key.
Further, the method also comprises: before described file encryption step, first described file to be encrypted and a transformation matrix is carried out XOR, the be-encrypted data after XOR is encrypted in described file encryption step; Described transformation matrices is encrypted according to described user password, the assigned address of encrypt file described in said write step, the encryption key after the transformation matrix after encryption and encryption being write in the lump.
Further, the method also comprises: described transformation matrix is a matrix be made up of random number, is generated by system time and a random value.
Further, the method also comprises: described transformation matrix is the matrix of 64 random number compositions, and each 64 bit data read in described file to be encrypted carries out XOR with described 64 random numbers respectively.
Present invention also offers a kind of file encryption system, it is characterized in that, comprise with lower unit: Key generating unit, it generates the encryption key of corresponding described protection class; File encryption unit, it to be encrypted described file to be encrypted according to described encryption key and to obtain encrypt file; Secret key encryption unit, it is encrypted described encryption key according to described user password; Writing unit, it is by the assigned address of encrypt file described in the encryption key write after encryption.
Further, native system also comprises: described Key generating unit selects the protection class of file to be encrypted, different according to described protection class, and the length of corresponding described encryption key is different
Further, native system also comprises: XOR unit, and it generates transformation matrix, and described file to be encrypted and this transformation matrix are carried out XOR.Transformation matrix ciphering unit, it is encrypted described transformation matrix according to described user password; Said write unit is configured to the assigned address for the encryption key after the transformation matrices after encryption and encryption being write in the lump encrypt file.
Further, native system also comprises: use the described user password of summary information algorithm MD5 process to obtain the summary info of described user password, use described summary info to encrypt described encryption key at described secret key encryption unit, in described transformation matrix ciphering unit, use described summary info to encrypt described transformation matrix.
Compared with prior art, the present invention has the following advantages:
File encrypting method of the present invention and file encryption system, obtain the rear encrypted file-encryption key of summary user password MD5, and the assigned address of the key after encryption stored in source file.Directly fixing figure place can be read from the assigned address of file when such user needs to read key, the time of query key is needed when not only can save user's file reading, and well ensure that the safety of encryption key, if namely the password of user is not lost, so steal files encryption key is very difficult.
Further; user can select different protection class according to oneself to the definition of file security; file for lower security grade can use low-grade protection; be conducive to like this obtaining very fast enciphering rate; file for high safety grade can select high-grade protection; although in time can be relatively slow, but for file importance temporal sacrifice be acceptable.The method of file cascade protection avoids the situation of All Files by unified protected mode process; low-grade protection just taked by the file not high to some fail safes; make user can not spend the time the same with protecting the higher file of importance because needing the general file of protection importance; also the higher file of fail safe can not be made to can not get the protection of high safety grade; thus while guarantee safe class, improve operational efficiency.
Further, present invention also offers a kind of file encrypting method that can be applicable in BLOWFISH algorithm, namely before to data encryption, first data are carried out an XOR conversion, then stored in the assigned address of file after this matrix participating in conversion being encrypted together with file encryption key, under this approach, even if assailant has stolen whole encryption subkey, when assailant there is no transformation matrix, the content of user file still cannot be obtained.This method can improve the fail safe of BLOWFISH effectively.
Further, by generating random number using system time and random value as seed, for carrying out XOR with file to be encrypted, can ensure that the random number generated when rapid computations is all not identical, further enhancing the fail safe of encryption method.
Other features and advantages of the present invention will be set forth in the following description, and, partly become apparent from specification, or understand by implementing the present invention.Object of the present invention and other advantages realize by structure specifically noted in specification, claims and accompanying drawing and obtain.
Accompanying drawing explanation
Accompanying drawing is used to provide a further understanding of the present invention, and forms a part for specification, together with embodiments of the present invention for explaining the present invention, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the flow chart of the file encrypting method according to the embodiment of the present invention one;
Fig. 2 is the flow chart of the file encrypting method according to the embodiment of the present invention two;
Fig. 3 is the structure chart of the file encryption system according to the embodiment of the present invention three;
Fig. 4 is the structure chart of the file encryption system according to the embodiment of the present invention four.
Embodiment
Describe embodiments of the present invention in detail below with reference to drawings and Examples, to the present invention, how application technology means solve technical problem whereby, and the implementation procedure reaching technique effect can fully understand and implement according to this.It should be noted that, only otherwise form conflict, each embodiment in the present invention and each feature in each embodiment can be combined with each other, and the technical scheme formed is all within protection scope of the present invention.
In addition, can perform in the computer system of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing, and, although show logical order in flow charts, but in some cases, can be different from the step shown or described by order execution herein.
embodiment one
Fig. 1 is the flow chart of the file encrypting method according to the embodiment of the present invention one, describes each step of the method below in conjunction with Fig. 1 in detail:
Step S110 (following omission " step " two word), generates the encryption key of corresponding protection class.
In this step, first select the file (being called file to be encrypted) of required encryption, then user is according to the significance level of selected file, selects the protection class of its encryption.
Preferably; when prompting user select File protection class; this step can protection class needed for user's reality; select the protection class of file to be encrypted; generate the file encryption key of different length; because the fail safe of encryption system is determined by key length greatly, but long key must cause encrypting result slowly in ciphering process file.So this step provides the protection interface of an available protection class qualitatively to user, user can according to the grade oneself selecting the requirement of file to protect.
S120, treats encrypt file according to encryption key and is encrypted and obtains encrypt file.
In this step, treat encrypt file by encryption key and be encrypted by the cryptographic algorithm preset, obtain encrypt file.
S130, is encrypted encryption key according to user password.
The object of this step is the fail safe in order to strengthen encryption key, makes it not easily be stolen.By user password, encryption key is encrypted, can ensures that encryption key is safer when user password is not lost or leaked.
Preferably, use MD5 hash function process user password, obtain the summary info of user password.This summary info is the summary info of 128, uses these 128 summary infos to be encrypted as new key-encrypting key.
S140, writes the assigned address of encrypt file by the encryption key after encryption.
By the assigned address of the key writing in files after the encryption that obtains in S130, this assigned address presets.Because the figure place of the encryption key through encryption of write is certain, when so just can ensure the encryption key needing file reading, correctly locate the position of the encryption key through encryption according to the figure place of the assigned address preset and encryption key, thus draw encryption key.Preferably, this assigned address is the end of encrypt file or the position of distance end appointment figure place.
embodiment two
Fig. 2 is the flow chart of the file encrypting method according to the embodiment of the present invention two, and embodiment two is on the basis of embodiment one, and the encryption method improved further, describes each step of the method in detail below in conjunction with Fig. 2:
S210, generates the encryption key of corresponding protection class.
This step is identical with embodiment one S110.Be not described further at this.
S215, generates transformation matrix, file to be encrypted and this transformation matrix is carried out XOR.
Before treating encrypt file and being encrypted, first itself and a transformation matrix are carried out XOR, when encryption key leaks, still can ensure the safety of file.Preferably, the matrix that this transformation matrix can form for the random number generated by system, using system time, this matrix adds that a random value generates as seed, can ensure that the seed generated when rapid computations is all not identical.Preferably, this random number is 64 random numbers, carries out XOR with 64 bit data read successively from file to be encrypted.
S220, to be encrypted the file to be encrypted through XOR according to encryption key and to obtain encrypt file.
This step is identical with embodiment one S120.Be not described further at this.
S230, is encrypted transformation matrix and encryption key according to user password.
This step to be encrypted transformation matrix according to user password and to be encrypted encryption key identical with step S130 in embodiment one, preferably, use MD5 hash function process user password, obtain the summary info of user password, by this summary info (128), transformation matrix and encryption key are encrypted.
S240, writes the assigned address of encrypt file together with the encryption key after encryption by the transformation matrices after encryption.
This step is similar with embodiment one step S140, and this assigned address presets.Preferably, this assigned address is the end of encrypt file or the position of distance end appointment figure place.
The method of the present embodiment may be used in BLOWFISH algorithm, for improvement of its fail safe.
embodiment three
Fig. 3 is the structured flowchart of the file encryption system according to the embodiment of the present invention three, describes the composition of this file encryption system below in conjunction with Fig. 3 in detail.
This file encryption system is corresponding with the file encrypting method of embodiment one, comprises with lower unit:
Key generating unit, it generates the encryption key of corresponding protection class.
In this unit, first select the file (being called file to be encrypted) of required encryption, then user is according to the significance level of selected file, selects the protection class of its encryption.
Preferably; when prompting user select File protection class; this unit can protection class needed for user's reality; select the protection class of file to be encrypted; generate the file encryption key of different length; because the fail safe of encryption system is determined by key length greatly, but long key must cause encrypting result slowly in ciphering process file.So this unit provides the protection interface of an available protection class qualitatively to user, user can according to the grade oneself selecting the requirement of file to protect.
File encryption unit, it to be encrypted this file to be encrypted according to this encryption key and to obtain encrypt file.
In this unit, treat encrypt file by encryption key and be encrypted by the cryptographic algorithm preset, obtain encrypt file.
Secret key encryption unit, it is encrypted encryption key according to user password.
The effect of this unit is the fail safe in order to strengthen encryption key, makes it not easily be stolen.By user password, encryption key is encrypted, can ensures that encryption key is safer when user password is not lost or leaked.
Preferably, use MD5 hash function process user password, obtain the summary info of user password.This summary info is the summary info of 128, uses these 128 summary infos to be encrypted as new key pair encryption key.
Writing unit, the encryption key after encryption is write the assigned address of encrypt file by it.
By the assigned address of the key writing in files after the encryption that obtains in secret key encryption unit, this assigned address presets.Because the figure place of the encryption key through encryption of write is certain, when so just can ensure the encryption key needing file reading, correctly locate the position of the encryption key through encryption according to the figure place of the assigned address preset and encryption key, thus draw encryption key.Preferably, this assigned address is the end of encrypt file or the position of distance end appointment figure place.
embodiment four
Fig. 4 is the flow chart of the file encrypting method according to the embodiment of the present invention four, embodiment four is on the basis of embodiment three, the encryption system of further improvement, corresponding with the file encrypting method of embodiment three, each unit of the method is described in detail below in conjunction with Fig. 2.
This file secret system comprises with lower unit:
Key generating unit, it generates the encryption key of corresponding protection class.
This element is identical with embodiment two.Be not described further at this.
XOR unit, it generates transformation matrix, and file to be encrypted and this transformation matrix are carried out XOR.
Before treating encrypt file and being encrypted, first itself and a transformation matrix are carried out XOR, when encryption key leaks, still can ensure the safety of file.Preferably, the matrix that this transformation matrix can form for the random number generated by system, using system time, this random number adds that a random value generates as seed, can ensure that the seed generated when rapid computations is all not identical.Preferably, this matrix, by the matrix formed for 64 random numbers, carries out XOR with 64 bit data read successively from file to be encrypted.
File encryption unit, it to be encrypted the file to be encrypted through XOR according to encryption key and to obtain encrypt file.
This element is identical with embodiment three.Be not described further at this.
Transformation matrix ciphering unit, it is encrypted transformation matrix and encryption key according to user password.
This unit to be encrypted transformation matrix according to user password and to be encrypted identical with the 130 pairs of encryption keys of cell S in embodiment one, preferably, use MD5 hash function process user password, obtain the summary info of user password, by this summary info (128), transformation matrix and encryption key are encrypted.
Writing unit, the transformation matrices after encryption is write the assigned address of encrypt file by it together with the encryption key after encryption.
This unit is similar with the writing unit of embodiment three, and this assigned address presets.Preferably, this assigned address is the end of encrypt file or the position of distance end appointment figure place.
Preferably, with encryption after transformation matrix together with write assigned address be encrypted by user password after encryption key (being realized by secret key encryption unit, not shown in Figure 4), its cipher mode is identical with transformation matrix.
File encrypting method of the present invention and file encryption system have higher efficiency.Make at 32bit microprocessor, can reach the speed of every 18 clock cycle encryption 1Byte data, the time is about 1/10th of DES and AES, greatly enhances the efficiency of encryption.
File encrypting method provided by the invention and file encryption system can be applied in computer installation and mobile intelligent terminal, safe class can be selected to carry out configuring cipher key according to user, while guarantee fail safe, improve encryption efficiency.Be encrypted by the encryption key of user password to file, improve reliability and the fail safe of file encryption further.By carrying out XOR to file before encryption, for file provides further safety guarantee, avoid the loss brought due to key exposure.
Those skilled in the art should be understood that, above-mentioned of the present invention each module or each step can realize with general calculation element, they can concentrate on single calculation element, or be distributed on network that multiple calculation element forms, alternatively, they can realize with the executable program code of calculation element, thus, they can be stored and be performed by calculation element in the storage device, or they are made into each integrated circuit modules respectively, or the multiple module in them or step are made into single integrated circuit module to realize.Like this, the present invention is not restricted to any specific hardware and software combination.
Although the execution mode disclosed by the present invention is as above, the execution mode that described content just adopts for the ease of understanding the present invention, and be not used to limit the present invention.Technical staff in any the technical field of the invention; under the prerequisite not departing from the spirit and scope disclosed by the present invention; any amendment and change can be done what implement in form and in details; but scope of patent protection of the present invention, the scope that still must define with appending claims is as the criterion.

Claims (6)

1. for a file encrypting method for mobile intelligent terminal, it is characterized in that, comprising:
Secret generating step, generates the encryption key of corresponding protection class;
XOR step, carries out XOR by file to be encrypted and a transformation matrix;
File encryption step, to be encrypted the file to be encrypted through XOR according to described encryption key and to obtain encrypt file;
Secret key encryption step, uses summary information algorithm MD5 process user password to obtain the summary info of described user password, uses described summary info to be encrypted described encryption key and described transformation matrix;
Write step, the assigned address of encrypt file described in the encryption key after the transformation matrix after encryption and encryption is write.
2. encryption method according to claim 1, is characterized in that, in described secret generating step, selects the protection class of file to be encrypted, different according to described protection class, and the length of corresponding described encryption key is different.
3. encryption method according to claim 1, is characterized in that, described transformation matrix is a matrix be made up of random number, is generated by system time and a random value.
4. encryption method according to claim 3, is characterized in that, described transformation matrix is the matrix of 64 random number compositions, and each 64 bit data read successively in described file to be encrypted carries out XOR with described 64 random numbers respectively.
5. for a file encryption system for mobile intelligent terminal, it is characterized in that, comprise with lower unit:
Key generating unit, it generates the encryption key of corresponding protection class;
XOR unit, it generates transformation matrix, and file to be encrypted and this transformation matrix are carried out XOR;
File encryption unit, it to be encrypted the file to be encrypted through XOR according to described encryption key and to obtain encrypt file;
Transformation matrix ciphering unit, it uses summary information algorithm MD5 process user password to obtain the summary info of described user password, uses described summary info to be encrypted described transformation matrix;
Secret key encryption unit, it uses described summary info to be encrypted described encryption key;
Writing unit, its encryption key after transformation matrix after encryption and encryption is write described in the assigned address of encrypt file.
6. encryption system according to claim 5, is characterized in that, described Key generating unit selects the protection class of file to be encrypted, different according to described protection class, and the length of corresponding described encryption key is different.
CN201110182211.8A 2011-06-30 2011-06-30 A kind of file encrypting method for mobile intelligent terminal and system Expired - Fee Related CN102355350B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110182211.8A CN102355350B (en) 2011-06-30 2011-06-30 A kind of file encrypting method for mobile intelligent terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110182211.8A CN102355350B (en) 2011-06-30 2011-06-30 A kind of file encrypting method for mobile intelligent terminal and system

Publications (2)

Publication Number Publication Date
CN102355350A CN102355350A (en) 2012-02-15
CN102355350B true CN102355350B (en) 2015-09-02

Family

ID=45578849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110182211.8A Expired - Fee Related CN102355350B (en) 2011-06-30 2011-06-30 A kind of file encrypting method for mobile intelligent terminal and system

Country Status (1)

Country Link
CN (1) CN102355350B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968588B (en) * 2012-12-20 2015-07-29 四川长虹电器股份有限公司 Intelligent terminal system
CN103491384B (en) * 2013-09-09 2017-01-18 天脉聚源(北京)传媒科技有限公司 Encrypting method and device of video and decrypting method and device of video
CN104573490A (en) * 2013-10-29 2015-04-29 桂林电子科技大学 Method for protecting installed software on Android platform
CN104883256B (en) 2014-02-27 2019-02-01 中国科学院数据与通信保护研究教育中心 A kind of cryptographic key protection method for resisting physical attacks and system attack
CN105760764B (en) * 2014-12-18 2020-03-17 中兴通讯股份有限公司 Encryption and decryption method and device for embedded storage device file and terminal
CN106330435A (en) * 2015-07-02 2017-01-11 中兴通讯股份有限公司 Key transformation method and device, and terminal
CN108540426A (en) * 2017-03-02 2018-09-14 珠海金山办公软件有限公司 A kind of method, apparatus and server for realizing data processing
CN108155993B (en) * 2017-12-29 2021-12-17 北京树米网络科技有限公司 Data encryption method and device for VSIM card
CN108616537B (en) * 2018-04-28 2021-11-30 湖南麒麟信安科技股份有限公司 Low-coupling general data encryption and decryption method and system
CN108833347A (en) * 2018-05-07 2018-11-16 陕西东沃物流信息服务有限公司 A method of improving logistics information privacy
CN111147430A (en) * 2018-11-06 2020-05-12 中移(杭州)信息技术有限公司 Encryption method and device applied to intelligent home gateway
CN109948363A (en) * 2019-03-12 2019-06-28 天固信息安全***(深圳)有限责任公司 A kind of distributed document encryption method based on credible base

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1324028A (en) * 2000-05-11 2001-11-28 松下电器产业株式会社 Document managing device
CN101192919A (en) * 2006-11-21 2008-06-04 中兴通讯股份有限公司 Method for realizing user-defined security level

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633070A (en) * 2004-10-29 2005-06-29 徐子杰 A data encryption/decryption method and encryption/decryption apparatus

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1324028A (en) * 2000-05-11 2001-11-28 松下电器产业株式会社 Document managing device
CN101192919A (en) * 2006-11-21 2008-06-04 中兴通讯股份有限公司 Method for realizing user-defined security level

Also Published As

Publication number Publication date
CN102355350A (en) 2012-02-15

Similar Documents

Publication Publication Date Title
CN102355350B (en) A kind of file encrypting method for mobile intelligent terminal and system
US9053346B2 (en) Low-overhead cryptographic method and apparatus for providing memory confidentiality, integrity and replay protection
CN102571329B (en) Password key management
CN103345609B (en) A kind of text encipher-decipher method and encryption and decryption equipment
CN105450620A (en) Information processing method and device
CN111737770B (en) Key management method and application method
CN109086612B (en) Embedded system dynamic data protection method based on hardware implementation
CN104866784A (en) BIOS encryption-based safety hard disk, and data encryption and decryption method
Kumar et al. TPA auditing to enhance the privacy and security in cloud systems
US11783091B2 (en) Executing entity-specific cryptographic code in a cryptographic coprocessor
CN113114654A (en) Terminal equipment access security authentication method, device and system
CN117134914B (en) One-time-pad random key stream encryption algorithm and system based on hardware characteristics
US20120201376A1 (en) Communication device and key calculating device
CN113326518A (en) Data processing method and device
CN110457924A (en) Storing data guard method and device
CN100561913C (en) A kind of method of access code equipment
CN116594567A (en) Information management method and device and electronic equipment
CN115396190A (en) Data encryption method, decryption method and device
Wu et al. Research of the Database Encryption Technique Based on Hybrid Cryptography
CN107872312B (en) Method, device, equipment and system for dynamically generating symmetric key
CN114553557A (en) Key calling method, key calling device, computer equipment and storage medium
Vig et al. DISSECT: dynamic skew-and-split tree for memory authentication
Gong [Retracted] Application Research of Data Encryption Algorithm in Computer Security Management
CN106790100A (en) A kind of data storage and access control method based on asymmetric cryptographic algorithm
US20210111901A1 (en) Executing entity-specific cryptographic code in a trusted execution environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150902

Termination date: 20210630

CF01 Termination of patent right due to non-payment of annual fee