CN110430042A - A kind of device and method storing code key in isomery redundant system - Google Patents
A kind of device and method storing code key in isomery redundant system Download PDFInfo
- Publication number
- CN110430042A CN110430042A CN201910573828.9A CN201910573828A CN110430042A CN 110430042 A CN110430042 A CN 110430042A CN 201910573828 A CN201910573828 A CN 201910573828A CN 110430042 A CN110430042 A CN 110430042A
- Authority
- CN
- China
- Prior art keywords
- code key
- storage unit
- code
- block
- data label
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to isomery redundant system and encryption technology code key field of storage, in particular to a kind of device and method that code key is stored in isomery redundant system, the device includes: code key cutting module, for being m parts of isometric code key blocks by the code key cutting of certain length, and data label 1 is stamped for every part of code key block, 2 ..., m;Code key distribution module, for according to set strategy, m parts of code key blocks of (k-1) * to be distributed to k code key storage unit;Code key memory module, for properly saving n code key block for distributing to each code key storage unit, each code key storage unit is distributed in different isomeries and executes in body;And code key composite module, for obtaining code key block from code key storage unit, and according to data label, it is combined into complete code key.It since code key to be segmented, and stores into different code key storage units, can be unlikely to lose whole code keys, avoid threatening to system communication in the case where system single-point occurs and breaks through.
Description
Technical field
The present invention relates to the more demanding isomery redundant system of system security reliability and the storage of encryption technology code key
Field, in particular to a kind of device and method that code key is stored in isomery redundant system.
Background technique
In recent years, isomery redundancy is more and more applied in information system security, with high safety and
Highly reliable characteristic, in conjunction with dynamic heterogeneous, the technologies such as majority decision can effectively defend various attacks mode.Encryption technology is different
Application in structure redundant system, can be further improved security of system.In isomery redundant system, there are the possibility that single-point is broken through
Property, if attacker has cracked the Encryption Algorithm of an execution body, it is based on doctrine of equivalents, it is possible to guess other and execute on body
Encryption Algorithm and code key.
How be based on isomery redundancy structure, design the code key storage mode an of safety, can solve single-point break through cause it is more
The problem of point is broken through, is a completely new field.
Summary of the invention
The object of the present invention is to provide a kind of in isomery redundant system stores the device and method of code key, solves existing skill
Single-point breaks through the technical issues of causing multiple spot to be broken through in art.
In order to solve the above technical problems, the following technical solution is employed by the present invention:
The present invention provides a kind of in isomery redundant system stores the device of code key, which includes:
Code key cutting module for being m parts of isometric code key blocks by the code key cutting of certain length, and is every part of code key block
Stamp data label 1,2 ..., m;
Code key distribution module, for according to set strategy, m parts of code key blocks of (k-1) * to be distributed to k code key storage unit;
Code key memory module, for properly saving n code key block for distributing to each code key storage unit, each code key is deposited
Storage unit is distributed in different isomeries and executes in body;And
Code key composite module for obtaining code key block from code key storage unit, and according to data label, has been combined into
Whole code key.
Preferably, m, n and k meet following agreement:
K >=3,
M=2*k,
N=(k -1) * m/k=(k -1) * 2.
Preferably, the set strategy specifically:
The code key block of code key storage unit storage, the data label of the latter code key block are the data mark of previous code key block
The mould of m is taken after label plus 1;First code key storage unit storage data label can start from any one number in [1, m];Afterwards
The data label of first code key block of one code key storage unit is the last one code key block of previous code key storage unit
Data label add 1 after take the mould of m.
The present invention also provides a kind of to store the method that code key device is realized based on above-mentioned in isomery redundant system, should
Method comprises the steps of:
According to the constraint relationship between the number k and m, n and k of code key storage unit, the value of m and n is calculated;
Code key is divided into m parts, and stamps data label 1,2 for every part of code key block ..., m;
According to set strategy, m parts of code key blocks of (k-1) * are sequentially stored into k code key storage unit, each code key storage
N code key block is saved in unit;
When using code key, code key block is taken out from any two code key storage unit, is combined according to data label,
Obtain final code key.
Compared with prior art, the invention has the following advantages that
A kind of device storing code key in isomery redundant system of the invention, a code key is segmented, and is stored in not
Same isomery executes body, even if there is a situation where that single isomery execution body is under attack, will not reveal complete code key.Together
When, because of the characteristic of isomery redundant system confrontation concerted attack, seldom exists while executing body there are two isomery and broken through simultaneously
The case where, thus it is guaranteed that in isomery redundant system code key secure storage.
A kind of method storing code key in isomery redundant system proposed by the present invention, its advantages and one kind are in isomery
The beneficial effect that the device of code key is stored in redundant system is substantially similar, and details are not described herein again.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 is a kind of structural representation of device that code key is stored in isomery redundant system provided in an embodiment of the present invention
Figure;
Fig. 2 be it is provided in an embodiment of the present invention it is a kind of in isomery redundant system store code key method flow chart it
One;
Fig. 3 be it is provided in an embodiment of the present invention it is a kind of in isomery redundant system store code key method flow chart it
Two.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments, based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Embodiment one
The device of code key is stored referring to Fig. 1, it illustrates provided in an embodiment of the present invention in isomery redundant system
Structural schematic diagram, the device include code key cutting module, code key distribution module, code key memory module and code key composite module, are answered
In isomery redundant system for using encryption technology.
Code key cutting module for being m parts of isometric code key blocks by the code key cutting of certain length, and is every part of code key block
Stamp data label 1,2 ..., m;
Code key distribution module, for according to set strategy, m parts of code key blocks of (k-1) * to be distributed to k code key storage unit;
Preferably, the set strategy are as follows: the code key block of code key storage unit storage, the data of the latter code key block
Label is the mould that m is taken after the data label of previous code key block adds 1;First code key storage unit storage data label can be from
Any one number in [1, m] starts;The data label of first code key block of the latter code key storage unit is previous secret
The data label of the last one code key block of key storage unit takes the mould of m after adding 1.
Code key memory module, for properly saving n code key block for distributing to each code key storage unit, each code key is deposited
Storage unit is distributed in different isomeries and executes in body;
Code key composite module for obtaining code key block from code key storage unit, and according to data label, has been combined into
Whole code key.
Wherein, m, n and k meet following agreement:
K >=3,
M=2*k,
N=(k -1) * m/k=(k -1) * 2.
A kind of device that code key is stored in isomery redundant system of the embodiment of the present invention, since code key to be segmented, and is deposited
It stores up in different code key storage units, each code key storage unit is distributed in different isomeries and executes in body, can be in system
In the case that appearance single-point is broken through, it is unlikely to lose whole code keys, avoids threatening to system communication.
It is corresponding with above-mentioned apparatus embodiment, referring to Fig. 2, it illustrates the embodiment of the present invention also provide one kind different
One of the flow chart of method of code key is stored in structure redundant system, this method may comprise steps of:
Step S101 calculates m's and n according to the constraint relationship between the number k and m, n and k of code key storage unit
Value.
Specifically, k is datum, and k >=3, the value of m is calculated by formula m=2*k, by formula n=(k -1) * m/k=
(k -1) * 2 calculates the value of n.
Code key is divided into m parts, and stamps data label 1,2 for every part of code key block by step S102 ..., m.
M parts of code key blocks of (k-1) * are sequentially stored into k code key storage unit, each by step S103 according to set strategy
N code key block is saved in code key storage unit, each code key storage unit is distributed in different isomeries and executes in body.
Preferably, the set strategy are as follows: the code key block of code key storage unit storage, the data of the latter code key block
Label is the mould that m is taken after the data label of previous code key block adds 1;First code key storage unit storage data label can be from
Any one number in [1, m] starts;The data label of first code key block of the latter code key storage unit is previous secret
The data label of the last one code key block of key storage unit takes the mould of m after adding 1.
Step S104 takes out code key block, according to data label when using code key from any two code key storage unit
It is combined, obtains final code key.It only needs any two isomery to execute the code key stored in body using code key to be combined, just
Available complete code key, use are very convenient.
To keep the purposes, technical schemes and advantages of the method for the present invention clearer, combined with specific embodiments below to this hair
It is bright to be described in further detail.
Referring to Fig. 3, it illustrates what the embodiment of the present invention also provided a kind of to store code key in the isomery redundant system
The two of the flow chart of method, this method may comprise steps of:
The number k of step S201, code key storage unit take 4, are 8 by the value that formula m=2*k calculates m, by formula n=
The value that (k -1) * m/k=(k -1) * 2 calculates n is 6.
Code key is divided into m=8 parts by step S202, and stamps data label 1 for every part of code key block, and 2,3,4,5,5,6,
7,8。
M=24 parts of code key blocks of (k-1) * are sequentially stored into k=4 code key storage unit according to set strategy by step S203
In, n=6 code key block is saved in each code key storage unit, 4 code key storage units are distributed in different isomeries and execute body
In.
Step S204 takes out code key block, according to data label when using code key from any two code key storage unit
It is combined, obtains final code key.
A kind of method that code key is stored in isomery redundant system of the embodiment of the present invention, applied to using encryption technology
In isomery redundant system, it is based on isomery redundancy structure, devises a kind of safe code key storage method, guarantees that single isomery executes
The code key stored in body is not complete code key, while any two isomery executes the code key block stored in body and can finally combine
At complete code key, so that complete code key and system will not be lost after an isomery execution body is broken in guarantee system
Also ensure that executing body there are two isomery works normally, and can obtain complete code key, ensure that the safety of code key is deposited in as long as
Storage.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or equipment for including a series of elements not only includes those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or equipment institute it is intrinsic
Element.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through
The relevant hardware of program instruction is completed, and program above-mentioned can store in computer-readable storage medium, the program
When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: ROM, RAM, magnetic disk or light
In the various media that can store program code such as disk.
Finally, it should be noted that the foregoing is merely presently preferred embodiments of the present invention, it is merely to illustrate skill of the invention
Art scheme, is not intended to limit the scope of the present invention.Any modification for being made all within the spirits and principles of the present invention,
Equivalent replacement, improvement etc., are included within the scope of protection of the present invention.
Claims (4)
1. a kind of device for storing code key in isomery redundant system, which is characterized in that the device includes:
Code key cutting module for being m parts of isometric code key blocks by the code key cutting of certain length, and is stamped for every part of code key block
Data label 1,2 ..., m;
Code key distribution module, for according to set strategy, m parts of code key blocks of (k-1) * to be distributed to k code key storage unit;
Code key memory module, for properly saving n code key block for distributing to each code key storage unit, each code key storage is single
Member is distributed in different isomeries and executes in body;And
Code key composite module for obtaining code key block from code key storage unit, and according to data label, is combined into complete
Code key.
2. the device according to claim 1 for storing code key in isomery redundant system, which is characterized in that m, n and k meet
Following agreement:
K >=3,
M=2*k,
N=(k -1) * m/k=(k -1) * 2.
3. the device according to claim 2 for storing code key in isomery redundant system, which is characterized in that the set plan
Slightly specifically:
The code key block of code key storage unit storage, the data label of the latter code key block are that the data label of previous code key block adds
The mould of m is taken after 1;First code key storage unit storage data label can start from any one number in [1, m];The latter
The data label of first code key block of code key storage unit is the number of the last one code key block of previous code key storage unit
According to the mould for taking m after label plus 1.
4. a kind of methods based on the described in any item storage code key device realizations in isomery redundant system of claims 1 to 3,
It is characterized in that, the method includes the steps of:
According to the constraint relationship between the number k and m, n and k of code key storage unit, the value of m and n is calculated;
Code key is divided into m parts, and stamps data label 1,2 for every part of code key block ..., m;
According to set strategy, m parts of code key blocks of (k-1) * are sequentially stored into k code key storage unit, each code key storage unit
N code key block of middle preservation;
When using code key, code key block is taken out from any two code key storage unit, is combined according to data label, obtain
Final code key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910573828.9A CN110430042B (en) | 2019-06-28 | 2019-06-28 | Device and method for storing secret key in heterogeneous redundant system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910573828.9A CN110430042B (en) | 2019-06-28 | 2019-06-28 | Device and method for storing secret key in heterogeneous redundant system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110430042A true CN110430042A (en) | 2019-11-08 |
CN110430042B CN110430042B (en) | 2022-11-22 |
Family
ID=68409884
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910573828.9A Active CN110430042B (en) | 2019-06-28 | 2019-06-28 | Device and method for storing secret key in heterogeneous redundant system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110430042B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2780150C1 (en) * | 2021-12-27 | 2022-09-19 | федеральное государственное автономное образовательное учреждение высшего образования "Северо-Кавказский федеральный университет" | System for homomorphic data encryption based on a system of residual classes |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5937066A (en) * | 1996-10-02 | 1999-08-10 | International Business Machines Corporation | Two-phase cryptographic key recovery system |
US6810122B1 (en) * | 1999-07-23 | 2004-10-26 | Kabushiki Kaisha Toshiba | Secret sharing system and storage medium |
US20070253548A1 (en) * | 2006-04-28 | 2007-11-01 | Fujitsu Limited | Data protection system, method, and program |
CN103118089A (en) * | 2013-01-22 | 2013-05-22 | 华中科技大学 | Safe storage method based on a plurality of cloud storage systems and system thereof |
US20130275744A1 (en) * | 2011-12-12 | 2013-10-17 | Cleversafe, Inc. | Encrypting segmented data in a distributed computing system |
CN103973790A (en) * | 2014-05-09 | 2014-08-06 | 中国电子科技集团公司第三十研究所 | Automatic destroying method of Web application data stored in network |
US20140310321A1 (en) * | 2012-01-06 | 2014-10-16 | Fujitsu Limited | Information processing apparatus, data management method, and program |
CN105516340A (en) * | 2015-12-30 | 2016-04-20 | 中国农业大学 | Cloud storage data recoverability verification method and system |
CN106100832A (en) * | 2016-06-12 | 2016-11-09 | 广东工业大学 | Key management method based on convergent encryption in a kind of cloud storage data deduplication |
CN107979461A (en) * | 2017-10-27 | 2018-05-01 | 财付通支付科技有限公司 | Secret key method for retrieving, device, terminal, key escrow server and computer-readable recording medium |
WO2018096353A1 (en) * | 2016-11-24 | 2018-05-31 | Payfont Limited | Method and system for securely storing data using a secret sharing scheme |
CN108810063A (en) * | 2017-11-21 | 2018-11-13 | 北京大学深圳研究生院 | Secure distribution and restorative procedure, the system and medium of data under a kind of cloudy storage environment |
CN109190384A (en) * | 2018-07-26 | 2019-01-11 | 百色学院 | A kind of multicenter block chain fuse protection system and method |
CN109510709A (en) * | 2018-09-18 | 2019-03-22 | 中国农业大学 | (k, n) Threshold Signature method, apparatus and electronic equipment based on RSA |
CN109617677A (en) * | 2018-11-20 | 2019-04-12 | 深圳壹账通智能科技有限公司 | Code key based on symmetric cryptography loses method for retrieving and relevant device |
CN109639415A (en) * | 2018-12-19 | 2019-04-16 | 南京壹证通信息科技有限公司 | A kind of collaboration key storage restoration methods based on Secret splitting |
CN109728910A (en) * | 2018-12-27 | 2019-05-07 | 北京永恒纪元科技有限公司 | A kind of efficient thresholding distribution elliptic curve key generates and endorsement method and system |
-
2019
- 2019-06-28 CN CN201910573828.9A patent/CN110430042B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5937066A (en) * | 1996-10-02 | 1999-08-10 | International Business Machines Corporation | Two-phase cryptographic key recovery system |
US6810122B1 (en) * | 1999-07-23 | 2004-10-26 | Kabushiki Kaisha Toshiba | Secret sharing system and storage medium |
US20070253548A1 (en) * | 2006-04-28 | 2007-11-01 | Fujitsu Limited | Data protection system, method, and program |
US20130275744A1 (en) * | 2011-12-12 | 2013-10-17 | Cleversafe, Inc. | Encrypting segmented data in a distributed computing system |
US20140310321A1 (en) * | 2012-01-06 | 2014-10-16 | Fujitsu Limited | Information processing apparatus, data management method, and program |
CN103118089A (en) * | 2013-01-22 | 2013-05-22 | 华中科技大学 | Safe storage method based on a plurality of cloud storage systems and system thereof |
CN103973790A (en) * | 2014-05-09 | 2014-08-06 | 中国电子科技集团公司第三十研究所 | Automatic destroying method of Web application data stored in network |
CN105516340A (en) * | 2015-12-30 | 2016-04-20 | 中国农业大学 | Cloud storage data recoverability verification method and system |
CN106100832A (en) * | 2016-06-12 | 2016-11-09 | 广东工业大学 | Key management method based on convergent encryption in a kind of cloud storage data deduplication |
WO2018096353A1 (en) * | 2016-11-24 | 2018-05-31 | Payfont Limited | Method and system for securely storing data using a secret sharing scheme |
CN107979461A (en) * | 2017-10-27 | 2018-05-01 | 财付通支付科技有限公司 | Secret key method for retrieving, device, terminal, key escrow server and computer-readable recording medium |
CN108810063A (en) * | 2017-11-21 | 2018-11-13 | 北京大学深圳研究生院 | Secure distribution and restorative procedure, the system and medium of data under a kind of cloudy storage environment |
CN109190384A (en) * | 2018-07-26 | 2019-01-11 | 百色学院 | A kind of multicenter block chain fuse protection system and method |
CN109510709A (en) * | 2018-09-18 | 2019-03-22 | 中国农业大学 | (k, n) Threshold Signature method, apparatus and electronic equipment based on RSA |
CN109617677A (en) * | 2018-11-20 | 2019-04-12 | 深圳壹账通智能科技有限公司 | Code key based on symmetric cryptography loses method for retrieving and relevant device |
CN109639415A (en) * | 2018-12-19 | 2019-04-16 | 南京壹证通信息科技有限公司 | A kind of collaboration key storage restoration methods based on Secret splitting |
CN109728910A (en) * | 2018-12-27 | 2019-05-07 | 北京永恒纪元科技有限公司 | A kind of efficient thresholding distribution elliptic curve key generates and endorsement method and system |
Non-Patent Citations (2)
Title |
---|
吴昊天等: "基于门限的组密钥管理方案", 《计算机工程》 * |
范波等: "一种适用于AMI组播的安全高效组播密钥管理方案", 《轻工科技》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2780150C1 (en) * | 2021-12-27 | 2022-09-19 | федеральное государственное автономное образовательное учреждение высшего образования "Северо-Кавказский федеральный университет" | System for homomorphic data encryption based on a system of residual classes |
Also Published As
Publication number | Publication date |
---|---|
CN110430042B (en) | 2022-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107220559B (en) | Encryption storage method for non-tamperable file | |
WO2010057151A3 (en) | Block-level data storage security system | |
WO2003102762A3 (en) | Method, system, and program for a policy based storage manager | |
CN110245956A (en) | A kind of block chain transaction confirmation method and system based on asynchronous multichain | |
WO2018112949A1 (en) | Block chain mining method, device, and node apparatus | |
CN108038184B (en) | Data storage method and system based on block chain and intelligent block chain | |
CN110147684B (en) | Method and device for realizing privacy protection of blockchain data | |
US11762813B2 (en) | Quality score compression apparatus and method for improving downstream accuracy | |
CN109034807A (en) | A kind of block chain method of data synchronization | |
WO2007041064A3 (en) | Reliably storing information across multiple computers | |
US20100128876A1 (en) | Method of distributing encoding/decoding program and symmetric key in security domain environment and data divider and data injector therefor | |
WO2007084973A3 (en) | Network security system and method | |
WO2009105280A3 (en) | Systems and methods for secure workgroup management and communication | |
WO2008110866A3 (en) | Communication system | |
ATE527781T1 (en) | SHIP WITH A DATA NETWORK | |
CN103326822A (en) | Data-fragment-based method and system for protecting privacy of participatory perception system | |
KR20140011534A (en) | Generating and verifying the alternative data in a specified format | |
CN102340500B (en) | Security management system and method of dependable computing platform | |
CN101901316B (en) | Data integrity protection method based on Bloom filter | |
CN115659417A (en) | Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment | |
CN110430042A (en) | A kind of device and method storing code key in isomery redundant system | |
CN109525398A (en) | A method of realizing that decentralization power proves common recognition | |
CN103593592A (en) | User data encryption and decryption method | |
CN103490875A (en) | Method for protecting large-capacity intelligent card secret key | |
WO2010057191A3 (en) | Storage security using cryptographic splitting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |