CN110430042A - A kind of device and method storing code key in isomery redundant system - Google Patents

A kind of device and method storing code key in isomery redundant system Download PDF

Info

Publication number
CN110430042A
CN110430042A CN201910573828.9A CN201910573828A CN110430042A CN 110430042 A CN110430042 A CN 110430042A CN 201910573828 A CN201910573828 A CN 201910573828A CN 110430042 A CN110430042 A CN 110430042A
Authority
CN
China
Prior art keywords
code key
storage unit
code
block
data label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910573828.9A
Other languages
Chinese (zh)
Other versions
CN110430042B (en
Inventor
于洪
宋克
刘勤让
沈剑良
魏帅
赵博
张文建
张丽
张霞
虎艳宾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Engineering University of PLA Strategic Support Force
Original Assignee
Information Engineering University of PLA Strategic Support Force
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Engineering University of PLA Strategic Support Force filed Critical Information Engineering University of PLA Strategic Support Force
Priority to CN201910573828.9A priority Critical patent/CN110430042B/en
Publication of CN110430042A publication Critical patent/CN110430042A/en
Application granted granted Critical
Publication of CN110430042B publication Critical patent/CN110430042B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to isomery redundant system and encryption technology code key field of storage, in particular to a kind of device and method that code key is stored in isomery redundant system, the device includes: code key cutting module, for being m parts of isometric code key blocks by the code key cutting of certain length, and data label 1 is stamped for every part of code key block, 2 ..., m;Code key distribution module, for according to set strategy, m parts of code key blocks of (k-1) * to be distributed to k code key storage unit;Code key memory module, for properly saving n code key block for distributing to each code key storage unit, each code key storage unit is distributed in different isomeries and executes in body;And code key composite module, for obtaining code key block from code key storage unit, and according to data label, it is combined into complete code key.It since code key to be segmented, and stores into different code key storage units, can be unlikely to lose whole code keys, avoid threatening to system communication in the case where system single-point occurs and breaks through.

Description

A kind of device and method storing code key in isomery redundant system
Technical field
The present invention relates to the more demanding isomery redundant system of system security reliability and the storage of encryption technology code key Field, in particular to a kind of device and method that code key is stored in isomery redundant system.
Background technique
In recent years, isomery redundancy is more and more applied in information system security, with high safety and Highly reliable characteristic, in conjunction with dynamic heterogeneous, the technologies such as majority decision can effectively defend various attacks mode.Encryption technology is different Application in structure redundant system, can be further improved security of system.In isomery redundant system, there are the possibility that single-point is broken through Property, if attacker has cracked the Encryption Algorithm of an execution body, it is based on doctrine of equivalents, it is possible to guess other and execute on body Encryption Algorithm and code key.
How be based on isomery redundancy structure, design the code key storage mode an of safety, can solve single-point break through cause it is more The problem of point is broken through, is a completely new field.
Summary of the invention
The object of the present invention is to provide a kind of in isomery redundant system stores the device and method of code key, solves existing skill Single-point breaks through the technical issues of causing multiple spot to be broken through in art.
In order to solve the above technical problems, the following technical solution is employed by the present invention:
The present invention provides a kind of in isomery redundant system stores the device of code key, which includes:
Code key cutting module for being m parts of isometric code key blocks by the code key cutting of certain length, and is every part of code key block Stamp data label 1,2 ..., m;
Code key distribution module, for according to set strategy, m parts of code key blocks of (k-1) * to be distributed to k code key storage unit;
Code key memory module, for properly saving n code key block for distributing to each code key storage unit, each code key is deposited Storage unit is distributed in different isomeries and executes in body;And
Code key composite module for obtaining code key block from code key storage unit, and according to data label, has been combined into Whole code key.
Preferably, m, n and k meet following agreement:
K >=3,
M=2*k,
N=(k -1) * m/k=(k -1) * 2.
Preferably, the set strategy specifically:
The code key block of code key storage unit storage, the data label of the latter code key block are the data mark of previous code key block The mould of m is taken after label plus 1;First code key storage unit storage data label can start from any one number in [1, m];Afterwards The data label of first code key block of one code key storage unit is the last one code key block of previous code key storage unit Data label add 1 after take the mould of m.
The present invention also provides a kind of to store the method that code key device is realized based on above-mentioned in isomery redundant system, should Method comprises the steps of:
According to the constraint relationship between the number k and m, n and k of code key storage unit, the value of m and n is calculated;
Code key is divided into m parts, and stamps data label 1,2 for every part of code key block ..., m;
According to set strategy, m parts of code key blocks of (k-1) * are sequentially stored into k code key storage unit, each code key storage N code key block is saved in unit;
When using code key, code key block is taken out from any two code key storage unit, is combined according to data label, Obtain final code key.
Compared with prior art, the invention has the following advantages that
A kind of device storing code key in isomery redundant system of the invention, a code key is segmented, and is stored in not Same isomery executes body, even if there is a situation where that single isomery execution body is under attack, will not reveal complete code key.Together When, because of the characteristic of isomery redundant system confrontation concerted attack, seldom exists while executing body there are two isomery and broken through simultaneously The case where, thus it is guaranteed that in isomery redundant system code key secure storage.
A kind of method storing code key in isomery redundant system proposed by the present invention, its advantages and one kind are in isomery The beneficial effect that the device of code key is stored in redundant system is substantially similar, and details are not described herein again.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is a kind of structural representation of device that code key is stored in isomery redundant system provided in an embodiment of the present invention Figure;
Fig. 2 be it is provided in an embodiment of the present invention it is a kind of in isomery redundant system store code key method flow chart it One;
Fig. 3 be it is provided in an embodiment of the present invention it is a kind of in isomery redundant system store code key method flow chart it Two.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments, based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Embodiment one
The device of code key is stored referring to Fig. 1, it illustrates provided in an embodiment of the present invention in isomery redundant system Structural schematic diagram, the device include code key cutting module, code key distribution module, code key memory module and code key composite module, are answered In isomery redundant system for using encryption technology.
Code key cutting module for being m parts of isometric code key blocks by the code key cutting of certain length, and is every part of code key block Stamp data label 1,2 ..., m;
Code key distribution module, for according to set strategy, m parts of code key blocks of (k-1) * to be distributed to k code key storage unit;
Preferably, the set strategy are as follows: the code key block of code key storage unit storage, the data of the latter code key block Label is the mould that m is taken after the data label of previous code key block adds 1;First code key storage unit storage data label can be from Any one number in [1, m] starts;The data label of first code key block of the latter code key storage unit is previous secret The data label of the last one code key block of key storage unit takes the mould of m after adding 1.
Code key memory module, for properly saving n code key block for distributing to each code key storage unit, each code key is deposited Storage unit is distributed in different isomeries and executes in body;
Code key composite module for obtaining code key block from code key storage unit, and according to data label, has been combined into Whole code key.
Wherein, m, n and k meet following agreement:
K >=3,
M=2*k,
N=(k -1) * m/k=(k -1) * 2.
A kind of device that code key is stored in isomery redundant system of the embodiment of the present invention, since code key to be segmented, and is deposited It stores up in different code key storage units, each code key storage unit is distributed in different isomeries and executes in body, can be in system In the case that appearance single-point is broken through, it is unlikely to lose whole code keys, avoids threatening to system communication.
It is corresponding with above-mentioned apparatus embodiment, referring to Fig. 2, it illustrates the embodiment of the present invention also provide one kind different One of the flow chart of method of code key is stored in structure redundant system, this method may comprise steps of:
Step S101 calculates m's and n according to the constraint relationship between the number k and m, n and k of code key storage unit Value.
Specifically, k is datum, and k >=3, the value of m is calculated by formula m=2*k, by formula n=(k -1) * m/k= (k -1) * 2 calculates the value of n.
Code key is divided into m parts, and stamps data label 1,2 for every part of code key block by step S102 ..., m.
M parts of code key blocks of (k-1) * are sequentially stored into k code key storage unit, each by step S103 according to set strategy N code key block is saved in code key storage unit, each code key storage unit is distributed in different isomeries and executes in body.
Preferably, the set strategy are as follows: the code key block of code key storage unit storage, the data of the latter code key block Label is the mould that m is taken after the data label of previous code key block adds 1;First code key storage unit storage data label can be from Any one number in [1, m] starts;The data label of first code key block of the latter code key storage unit is previous secret The data label of the last one code key block of key storage unit takes the mould of m after adding 1.
Step S104 takes out code key block, according to data label when using code key from any two code key storage unit It is combined, obtains final code key.It only needs any two isomery to execute the code key stored in body using code key to be combined, just Available complete code key, use are very convenient.
To keep the purposes, technical schemes and advantages of the method for the present invention clearer, combined with specific embodiments below to this hair It is bright to be described in further detail.
Referring to Fig. 3, it illustrates what the embodiment of the present invention also provided a kind of to store code key in the isomery redundant system The two of the flow chart of method, this method may comprise steps of:
The number k of step S201, code key storage unit take 4, are 8 by the value that formula m=2*k calculates m, by formula n= The value that (k -1) * m/k=(k -1) * 2 calculates n is 6.
Code key is divided into m=8 parts by step S202, and stamps data label 1 for every part of code key block, and 2,3,4,5,5,6, 7,8。
M=24 parts of code key blocks of (k-1) * are sequentially stored into k=4 code key storage unit according to set strategy by step S203 In, n=6 code key block is saved in each code key storage unit, 4 code key storage units are distributed in different isomeries and execute body In.
Step S204 takes out code key block, according to data label when using code key from any two code key storage unit It is combined, obtains final code key.
A kind of method that code key is stored in isomery redundant system of the embodiment of the present invention, applied to using encryption technology In isomery redundant system, it is based on isomery redundancy structure, devises a kind of safe code key storage method, guarantees that single isomery executes The code key stored in body is not complete code key, while any two isomery executes the code key block stored in body and can finally combine At complete code key, so that complete code key and system will not be lost after an isomery execution body is broken in guarantee system Also ensure that executing body there are two isomery works normally, and can obtain complete code key, ensure that the safety of code key is deposited in as long as Storage.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or equipment for including a series of elements not only includes those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or equipment institute it is intrinsic Element.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can store in computer-readable storage medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: ROM, RAM, magnetic disk or light In the various media that can store program code such as disk.
Finally, it should be noted that the foregoing is merely presently preferred embodiments of the present invention, it is merely to illustrate skill of the invention Art scheme, is not intended to limit the scope of the present invention.Any modification for being made all within the spirits and principles of the present invention, Equivalent replacement, improvement etc., are included within the scope of protection of the present invention.

Claims (4)

1. a kind of device for storing code key in isomery redundant system, which is characterized in that the device includes:
Code key cutting module for being m parts of isometric code key blocks by the code key cutting of certain length, and is stamped for every part of code key block Data label 1,2 ..., m;
Code key distribution module, for according to set strategy, m parts of code key blocks of (k-1) * to be distributed to k code key storage unit;
Code key memory module, for properly saving n code key block for distributing to each code key storage unit, each code key storage is single Member is distributed in different isomeries and executes in body;And
Code key composite module for obtaining code key block from code key storage unit, and according to data label, is combined into complete Code key.
2. the device according to claim 1 for storing code key in isomery redundant system, which is characterized in that m, n and k meet Following agreement:
K >=3,
M=2*k,
N=(k -1) * m/k=(k -1) * 2.
3. the device according to claim 2 for storing code key in isomery redundant system, which is characterized in that the set plan Slightly specifically:
The code key block of code key storage unit storage, the data label of the latter code key block are that the data label of previous code key block adds The mould of m is taken after 1;First code key storage unit storage data label can start from any one number in [1, m];The latter The data label of first code key block of code key storage unit is the number of the last one code key block of previous code key storage unit According to the mould for taking m after label plus 1.
4. a kind of methods based on the described in any item storage code key device realizations in isomery redundant system of claims 1 to 3, It is characterized in that, the method includes the steps of:
According to the constraint relationship between the number k and m, n and k of code key storage unit, the value of m and n is calculated;
Code key is divided into m parts, and stamps data label 1,2 for every part of code key block ..., m;
According to set strategy, m parts of code key blocks of (k-1) * are sequentially stored into k code key storage unit, each code key storage unit N code key block of middle preservation;
When using code key, code key block is taken out from any two code key storage unit, is combined according to data label, obtain Final code key.
CN201910573828.9A 2019-06-28 2019-06-28 Device and method for storing secret key in heterogeneous redundant system Active CN110430042B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910573828.9A CN110430042B (en) 2019-06-28 2019-06-28 Device and method for storing secret key in heterogeneous redundant system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910573828.9A CN110430042B (en) 2019-06-28 2019-06-28 Device and method for storing secret key in heterogeneous redundant system

Publications (2)

Publication Number Publication Date
CN110430042A true CN110430042A (en) 2019-11-08
CN110430042B CN110430042B (en) 2022-11-22

Family

ID=68409884

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910573828.9A Active CN110430042B (en) 2019-06-28 2019-06-28 Device and method for storing secret key in heterogeneous redundant system

Country Status (1)

Country Link
CN (1) CN110430042B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2780150C1 (en) * 2021-12-27 2022-09-19 федеральное государственное автономное образовательное учреждение высшего образования "Северо-Кавказский федеральный университет" System for homomorphic data encryption based on a system of residual classes

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5937066A (en) * 1996-10-02 1999-08-10 International Business Machines Corporation Two-phase cryptographic key recovery system
US6810122B1 (en) * 1999-07-23 2004-10-26 Kabushiki Kaisha Toshiba Secret sharing system and storage medium
US20070253548A1 (en) * 2006-04-28 2007-11-01 Fujitsu Limited Data protection system, method, and program
CN103118089A (en) * 2013-01-22 2013-05-22 华中科技大学 Safe storage method based on a plurality of cloud storage systems and system thereof
US20130275744A1 (en) * 2011-12-12 2013-10-17 Cleversafe, Inc. Encrypting segmented data in a distributed computing system
CN103973790A (en) * 2014-05-09 2014-08-06 中国电子科技集团公司第三十研究所 Automatic destroying method of Web application data stored in network
US20140310321A1 (en) * 2012-01-06 2014-10-16 Fujitsu Limited Information processing apparatus, data management method, and program
CN105516340A (en) * 2015-12-30 2016-04-20 中国农业大学 Cloud storage data recoverability verification method and system
CN106100832A (en) * 2016-06-12 2016-11-09 广东工业大学 Key management method based on convergent encryption in a kind of cloud storage data deduplication
CN107979461A (en) * 2017-10-27 2018-05-01 财付通支付科技有限公司 Secret key method for retrieving, device, terminal, key escrow server and computer-readable recording medium
WO2018096353A1 (en) * 2016-11-24 2018-05-31 Payfont Limited Method and system for securely storing data using a secret sharing scheme
CN108810063A (en) * 2017-11-21 2018-11-13 北京大学深圳研究生院 Secure distribution and restorative procedure, the system and medium of data under a kind of cloudy storage environment
CN109190384A (en) * 2018-07-26 2019-01-11 百色学院 A kind of multicenter block chain fuse protection system and method
CN109510709A (en) * 2018-09-18 2019-03-22 中国农业大学 (k, n) Threshold Signature method, apparatus and electronic equipment based on RSA
CN109617677A (en) * 2018-11-20 2019-04-12 深圳壹账通智能科技有限公司 Code key based on symmetric cryptography loses method for retrieving and relevant device
CN109639415A (en) * 2018-12-19 2019-04-16 南京壹证通信息科技有限公司 A kind of collaboration key storage restoration methods based on Secret splitting
CN109728910A (en) * 2018-12-27 2019-05-07 北京永恒纪元科技有限公司 A kind of efficient thresholding distribution elliptic curve key generates and endorsement method and system

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5937066A (en) * 1996-10-02 1999-08-10 International Business Machines Corporation Two-phase cryptographic key recovery system
US6810122B1 (en) * 1999-07-23 2004-10-26 Kabushiki Kaisha Toshiba Secret sharing system and storage medium
US20070253548A1 (en) * 2006-04-28 2007-11-01 Fujitsu Limited Data protection system, method, and program
US20130275744A1 (en) * 2011-12-12 2013-10-17 Cleversafe, Inc. Encrypting segmented data in a distributed computing system
US20140310321A1 (en) * 2012-01-06 2014-10-16 Fujitsu Limited Information processing apparatus, data management method, and program
CN103118089A (en) * 2013-01-22 2013-05-22 华中科技大学 Safe storage method based on a plurality of cloud storage systems and system thereof
CN103973790A (en) * 2014-05-09 2014-08-06 中国电子科技集团公司第三十研究所 Automatic destroying method of Web application data stored in network
CN105516340A (en) * 2015-12-30 2016-04-20 中国农业大学 Cloud storage data recoverability verification method and system
CN106100832A (en) * 2016-06-12 2016-11-09 广东工业大学 Key management method based on convergent encryption in a kind of cloud storage data deduplication
WO2018096353A1 (en) * 2016-11-24 2018-05-31 Payfont Limited Method and system for securely storing data using a secret sharing scheme
CN107979461A (en) * 2017-10-27 2018-05-01 财付通支付科技有限公司 Secret key method for retrieving, device, terminal, key escrow server and computer-readable recording medium
CN108810063A (en) * 2017-11-21 2018-11-13 北京大学深圳研究生院 Secure distribution and restorative procedure, the system and medium of data under a kind of cloudy storage environment
CN109190384A (en) * 2018-07-26 2019-01-11 百色学院 A kind of multicenter block chain fuse protection system and method
CN109510709A (en) * 2018-09-18 2019-03-22 中国农业大学 (k, n) Threshold Signature method, apparatus and electronic equipment based on RSA
CN109617677A (en) * 2018-11-20 2019-04-12 深圳壹账通智能科技有限公司 Code key based on symmetric cryptography loses method for retrieving and relevant device
CN109639415A (en) * 2018-12-19 2019-04-16 南京壹证通信息科技有限公司 A kind of collaboration key storage restoration methods based on Secret splitting
CN109728910A (en) * 2018-12-27 2019-05-07 北京永恒纪元科技有限公司 A kind of efficient thresholding distribution elliptic curve key generates and endorsement method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
吴昊天等: "基于门限的组密钥管理方案", 《计算机工程》 *
范波等: "一种适用于AMI组播的安全高效组播密钥管理方案", 《轻工科技》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2780150C1 (en) * 2021-12-27 2022-09-19 федеральное государственное автономное образовательное учреждение высшего образования "Северо-Кавказский федеральный университет" System for homomorphic data encryption based on a system of residual classes

Also Published As

Publication number Publication date
CN110430042B (en) 2022-11-22

Similar Documents

Publication Publication Date Title
CN107220559B (en) Encryption storage method for non-tamperable file
WO2010057151A3 (en) Block-level data storage security system
WO2003102762A3 (en) Method, system, and program for a policy based storage manager
CN110245956A (en) A kind of block chain transaction confirmation method and system based on asynchronous multichain
WO2018112949A1 (en) Block chain mining method, device, and node apparatus
CN108038184B (en) Data storage method and system based on block chain and intelligent block chain
CN110147684B (en) Method and device for realizing privacy protection of blockchain data
US11762813B2 (en) Quality score compression apparatus and method for improving downstream accuracy
CN109034807A (en) A kind of block chain method of data synchronization
WO2007041064A3 (en) Reliably storing information across multiple computers
US20100128876A1 (en) Method of distributing encoding/decoding program and symmetric key in security domain environment and data divider and data injector therefor
WO2007084973A3 (en) Network security system and method
WO2009105280A3 (en) Systems and methods for secure workgroup management and communication
WO2008110866A3 (en) Communication system
ATE527781T1 (en) SHIP WITH A DATA NETWORK
CN103326822A (en) Data-fragment-based method and system for protecting privacy of participatory perception system
KR20140011534A (en) Generating and verifying the alternative data in a specified format
CN102340500B (en) Security management system and method of dependable computing platform
CN101901316B (en) Data integrity protection method based on Bloom filter
CN115659417A (en) Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment
CN110430042A (en) A kind of device and method storing code key in isomery redundant system
CN109525398A (en) A method of realizing that decentralization power proves common recognition
CN103593592A (en) User data encryption and decryption method
CN103490875A (en) Method for protecting large-capacity intelligent card secret key
WO2010057191A3 (en) Storage security using cryptographic splitting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant