CN117749532A - Cloud printer data encryption method and related device - Google Patents

Cloud printer data encryption method and related device Download PDF

Info

Publication number
CN117749532A
CN117749532A CN202410186582.0A CN202410186582A CN117749532A CN 117749532 A CN117749532 A CN 117749532A CN 202410186582 A CN202410186582 A CN 202410186582A CN 117749532 A CN117749532 A CN 117749532A
Authority
CN
China
Prior art keywords
coefficient
data
longitudinal
transverse
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410186582.0A
Other languages
Chinese (zh)
Inventor
李晨晨
刘丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Xinye Electronic Technology Co Ltd
Original Assignee
Zhuhai Xinye Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Xinye Electronic Technology Co Ltd filed Critical Zhuhai Xinye Electronic Technology Co Ltd
Publication of CN117749532A publication Critical patent/CN117749532A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a cloud printer data encryption method and a related device, and belongs to the technical field of printers. The method is applied to the cloud server and comprises the following steps: acquiring transverse transmission capability and longitudinal transmission capability, and determining a data relationship between the transverse transmission capability and the longitudinal transmission capability; determining a transverse coefficient corresponding to the transverse transmission capacity and a longitudinal coefficient corresponding to the longitudinal transmission capacity according to the data relationship; determining a key matrix corresponding to the cloud server according to the transverse coefficient and the longitudinal coefficient; and obtaining the printing content, encrypting the printing content according to the key matrix, obtaining an encryption result corresponding to the printing content, and transmitting the encryption result to the cloud printer. The problem that confidentiality of data transmission between the cloud server and the cloud printer is threatened in the related art is solved, and the security of printing data is improved.

Description

Cloud printer data encryption method and related device
Technical Field
The invention relates to the technical field of printers, in particular to a cloud printer data encryption method and a related device.
Background
The cloud printing technology is a method for transmitting a print job to a cloud server to finish printing. In conventional printing processes, the print job is typically accomplished by communicating directly with the printer via a local device. The cloud printing technology realizes the cross-region and cross-device printing function by uploading the printing task to the cloud server and communicating the cloud server with the cloud printer.
However, the cloud printing technology also faces the problem of data security in practical applications. Since print content needs to be transmitted between the cloud server and the cloud printer, confidentiality of data during transmission may be compromised. Therefore, an encryption method is required to secure print data.
Disclosure of Invention
The embodiment of the invention mainly aims to provide a cloud printer data encryption method and a related device, and aims to solve the problem that confidentiality of printing content is possibly threatened and further security of the printing content is damaged when the printing content is transmitted between a cloud server and a cloud printer in the related technology.
In a first aspect, an embodiment of the present invention provides a cloud printer data encryption method, applied to a cloud server, including:
acquiring transverse transmission capability and longitudinal transmission capability, and determining a data relationship between the transverse transmission capability and the longitudinal transmission capability;
determining a transverse coefficient corresponding to the transverse transmission capacity and a longitudinal coefficient corresponding to the longitudinal transmission capacity according to the data relationship;
determining a key matrix corresponding to the cloud server according to the transverse coefficient and the longitudinal coefficient;
And obtaining the printing content, encrypting the printing content according to the key matrix, obtaining an encryption result corresponding to the printing content, and transmitting the encryption result to a cloud printer.
In a second aspect, an embodiment of the present invention provides a cloud printer data encryption method, applied to a cloud printer, including:
obtaining an encryption result and a key matrix transmitted by a cloud server;
and decrypting the encryption result according to the key matrix to obtain the printing content corresponding to the encryption result.
In a third aspect, an embodiment of the present invention provides a cloud printer data encryption device, applied to a cloud server, including:
the relation acquisition module is used for acquiring transverse transmission capacity and longitudinal transmission capacity and determining a data relation between the transverse transmission capacity and the longitudinal transmission capacity;
the coefficient determining module is used for determining a transverse coefficient corresponding to the transverse transmission capacity and a longitudinal coefficient corresponding to the longitudinal transmission capacity according to the data relationship;
the matrix determining module is used for determining a key matrix corresponding to the cloud server according to the transverse coefficient and the longitudinal coefficient;
the data encryption module is used for obtaining the printing content, encrypting the printing content according to the key matrix, obtaining an encryption result corresponding to the printing content, and transmitting the encryption result to the cloud printer.
In a fourth aspect, an embodiment of the present invention provides a cloud printer data encryption device, which is applied to a cloud printer, including:
the data acquisition module is used for acquiring an encryption result and a key matrix transmitted by the cloud server;
and the data decryption module is used for decrypting the encryption result according to the key matrix to obtain the printing content corresponding to the encryption result.
In a fifth aspect, an embodiment of the present invention further provides a cloud server, where the cloud server includes a processor, a memory, a computer program stored on the memory and executable by the processor, and a data bus for implementing connection communication between the processor and the memory, where the computer program, when executed by the processor, implements the steps of any one of the cloud printer data encryption methods provided in the present specification.
The embodiment of the invention provides a cloud printer data encryption method and a related device, which are applied to a cloud server, wherein the method comprises the following steps: by knowing and analyzing the transverse transmission and longitudinal transmission capacity of the cloud server, the data transmission capacity of the cloud server in different directions can be known, including the characteristics of speed, bandwidth and the like of transverse and longitudinal transmission. So that the transmission path and constraint condition of the printing content in the cloud server and the cloud printer can be better understood by determining the data relationship between the horizontal transmission capability and the vertical transmission capability. And further determining a transverse coefficient corresponding to the transverse transmission capacity and a longitudinal coefficient corresponding to the longitudinal transmission capacity based on the data relationship, and further calculating a key matrix corresponding to the cloud server. And further, after the print content is acquired, the print content is encrypted according to the determined key matrix, so that confidentiality of the print content can be protected. The encryption operation ensures that the printing content is not easy to be decrypted and acquired by unauthorized users in the transmission process, thereby ensuring that the encryption result can be safely transmitted to the cloud printer, protecting the security of the printing content in the transmission process and preventing data from being stolen or tampered. Therefore, the problem that confidentiality of the printing content is possibly threatened when the printing content is transmitted between the cloud server and the cloud printer in the related technology is solved, and further the security of the printing content is damaged is solved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a cloud printer data encryption method according to an embodiment of the present invention;
fig. 2 is a flow chart of another encryption method for cloud printer data according to an embodiment of the present invention;
fig. 3 is a schematic block diagram of a data encryption device of a cloud printer according to an embodiment of the present invention;
fig. 4 is a schematic block diagram of another data encryption device of a cloud printer according to an embodiment of the present invention;
fig. 5 is a schematic block diagram of a cloud server according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
It is to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The embodiment of the invention provides a cloud printer data encryption method and a related device. The cloud printer data encryption method can be applied to a cloud server, and the cloud server can be a server or a server cluster. Another cloud printer data encryption method can be applied to a cloud printer, wherein the cloud printer can be a thermal printer, a bill printer, a bar code printer and the like, and the cloud printer can be applied to the fields including but not limited to the fields of super business, catering (takeaway), retail, logistics and the like.
Some embodiments of the invention are described in detail below with reference to the accompanying drawings. The following embodiments and features of the embodiments may be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a flowchart of a cloud printer data encryption method according to an embodiment of the present invention, where the cloud printer data encryption method is applied to a cloud server.
As shown in fig. 1, the cloud printer data encryption method includes steps S101 to S104.
Step S101, a lateral transmission capability and a longitudinal transmission capability are obtained, and a data relationship between the lateral transmission capability and the longitudinal transmission capability is determined.
Illustratively, the lateral transmission capability refers to a first transmission speed and a first bandwidth of the cloud server in a horizontal direction, and the longitudinal transmission capability refers to a second transmission speed and a second bandwidth of the cloud server in a vertical direction. The first transmission speed and the first bandwidth of the cloud server in the horizontal direction refer to a first data transmission speed and a first bandwidth between the cloud server and the cloud service provider, which refer to transmission capacity from the cloud server to the cloud service provider or from the cloud service provider to the cloud server, and the transmission speed and the bandwidth in the horizontal direction can influence communication efficiency and data transmission rate between the cloud server and the cloud service provider. The second transmission speed and the second bandwidth of the cloud server in the vertical direction refer to the second data transmission speed and the second bandwidth inside the server, which refer to the data transmission capability between each component or between different levels inside the server, and the data transmission speed and the bandwidth in the vertical direction can affect the data flow and the processing efficiency inside the cloud server.
Illustratively, the network performance testing tool, the pressure measuring tool or the actual application scenario test is used for measuring, including indexes such as transmission speed, bandwidth, throughput, delay and the like, so as to obtain the transverse transmission capability and the longitudinal transmission capability of the cloud server.
Illustrating: the network performance testing tool can be used for measuring indexes such as transmission speed, bandwidth, throughput, delay and the like of the cloud server. These tools can simulate the network environment, evaluate the horizontal transmission capability and the vertical transmission capability of the cloud server by sending and receiving data packets; the load of a large number of users and data traffic on the cloud server can be simulated using the stress testing tool. By observing the response time and throughput of the server, the transverse transmission capacity and the longitudinal transmission capacity of the cloud server are evaluated under different loads; in an actual application scenario, specific applications or workloads may be used to test the horizontal transport capabilities and vertical transport capabilities of a cloud server. For example, performance and transmission capabilities of a server are evaluated using large file transfers, database queries, or multiple users accessing test cases of the server simultaneously. It can be appreciated that the embodiment of the present application may analyze the collected data using a preset statistical analysis algorithm (such as correlation analysis, regression analysis, cluster analysis, etc.), and find the data relationship between the transverse transmission capability and the longitudinal transmission capability. Based on the analysis of the data, a data relationship between the lateral transport capacity and the longitudinal transport capacity is determined. The data relationship may be a linear relationship, a non-linear relationship, or other specific functional relationship, among others.
Illustratively, determining a data relationship between the lateral transport capability and the longitudinal transport capability comprises: after collecting first data (for example, a first transmission speed and a first bandwidth of the cloud server in a horizontal direction) associated with the horizontal transmission capability of the cloud server and second data (for example, a second transmission speed and a second bandwidth of the cloud server in a vertical direction) associated with the vertical transmission capability of the cloud server, preprocessing the collected first data and second data (related to operations of removing outliers, processing missing values, standardizing data and the like) to ensure the accuracy and consistency of the data. And finally, analyzing the preprocessed first data and the preprocessed second data by using a preset statistical analysis algorithm (such as correlation analysis, regression analysis, cluster analysis and the like), so as to obtain a data relationship between the transverse transmission capacity and the longitudinal transmission capacity.
For example, the process of analyzing the preprocessed data using the correlation analysis algorithm to obtain the data relationship between the lateral transmission capability and the longitudinal transmission capability may be: correlation analysis tools, such as pearson correlation coefficients (Pearson correlation coefficient), are used to calculate correlations between lateral and longitudinal transmission capabilities. The pearson correlation coefficient has a value ranging from-1 to 1, a value closer to 1 indicating a stronger positive correlation between the two variables, a value closer to-1 indicating a stronger negative correlation between the two variables, and a value closer to 0 indicating no linear correlation between the two variables. By calculating the correlation coefficient, a correlation between the lateral transmission capability and the longitudinal transmission capability can be obtained. For example, assume that the calculation result shows a correlation coefficient of 0.8, which means that there is a strong positive correlation between the lateral transmission capability and the longitudinal transmission capability, i.e. a boost in the lateral transmission capability is accompanied by a boost in the longitudinal transmission capability, and vice versa.
Step S102, determining a transverse coefficient corresponding to the transverse transmission capacity and a longitudinal coefficient corresponding to the longitudinal transmission capacity according to the data relationship.
Illustratively, the data is fitted using existing data using appropriate fitting methods and algorithms according to the determined data relationships to obtain the best parameter estimates. And obtaining a transverse coefficient corresponding to the transverse transmission capacity and a longitudinal coefficient of the longitudinal transmission capacity from the parameter estimated value obtained in the fitting process. The lateral coefficient or the longitudinal coefficient represents the degree of variation in the unit lateral transmission capability or the longitudinal transmission capability.
In some embodiments, the determining, according to the data relationship, a lateral coefficient corresponding to the lateral transmission capability and a longitudinal coefficient corresponding to the longitudinal transmission capability includes: determining a key index and a query coefficient according to the data relationship; determining a transverse coefficient corresponding to the transverse transmission capability and a longitudinal coefficient corresponding to the longitudinal transmission capability according to the key index and the query coefficient; wherein the lateral coefficient is obtained according to the following formula:
the longitudinal coefficients are obtained according to the following formula:
h represents the transverse coefficient, z represents the longitudinal coefficient, lambda represents the query coefficient, Representing the corresponding coding feature when said key indicator is u,>representing the unit transfer amount average.
Illustratively, the applicable key indicator is determined from the data relationship. The key indicator is a key performance indicator reflecting the data relationship and may be some parameter or feature in the model. The concept of the query coefficients is determined from the definition of the key index. The query coefficients are coefficients related to the key indicator.
Illustratively, the lateral coefficients are obtained according to the following formula:
where h represents the lateral coefficient, lambda represents the query coefficient,indicating the corresponding coding feature when the key index is u,representing the unit transfer amount average.
Illustratively, the longitudinal coefficients are obtained according to the following formula:
where z represents a longitudinal coefficient, lambda represents a query coefficient,indicating the corresponding coding feature when the key index is u,representing the unit transfer amount average.
Specifically, the key index and the query coefficient are determined according to the data relationship, and the transverse coefficient corresponding to the transverse transmission capability and the longitudinal coefficient corresponding to the longitudinal transmission capability are calculated based on the key index and the query coefficient, so that the transmission capability of the cloud server can be better understood. The relation between the transverse and longitudinal transmission capabilities can be more accurately measured, and good support is provided for subsequent construction of the key matrix.
And step 103, determining a key matrix corresponding to the cloud server according to the transverse coefficient and the longitudinal coefficient.
Illustratively, after determining the transverse coefficients corresponding to the transverse transmission capabilities and the longitudinal coefficients corresponding to the longitudinal transmission capabilities, a key matrix is constructed from the known transverse coefficients and longitudinal coefficients. The key matrix is a two-dimensional matrix which is composed of matrix rows corresponding to the transverse coefficients and matrix columns corresponding to the longitudinal coefficients, wherein elements of the key matrix represent keys of the cloud server. And then each element of the key matrix is calculated based on the values of the transverse coefficients and the longitudinal coefficients, based on linear relations, nonlinear relations or other mathematical models, so as to construct the key matrix. Wherein the selection and calculation of the keys should follow the relevant security and encryption standards. The generated key matrix is ensured to have enough security and randomness so as to protect sensitive information of the cloud server.
In some embodiments, the determining the key matrix corresponding to the cloud server according to the lateral coefficient and the longitudinal coefficient includes: determining the matrix row number and the matrix column number corresponding to the key matrix according to the transverse coefficient and the longitudinal coefficient, and generating an initial matrix according to the matrix row number and the matrix column number; and adjusting the initial matrix by using a random number to obtain the key matrix corresponding to the cloud server.
Illustratively, the number of rows and columns of the key matrix to be generated is determined based on the values of the transverse coefficients and the longitudinal coefficients. And generating an initial matrix according to the determined matrix row number and matrix column number. The elements of the initial matrix may be randomly generated values or initialized according to a specific rule. And then the random number generator is utilized to randomly adjust the elements in the initial matrix. This may increase the randomness and unpredictability of the key. The random adjustment may be based on a specific algorithm and adjustment rules. After random adjustment, the final key matrix is obtained. The elements of the matrix represent keys corresponding to the cloud server.
Illustratively, to ensure the security of the key, a secure random number generator should be used, and the associated security and encryption standards are followed. The generated key matrix is ensured to have enough randomness and security so as to protect sensitive information of the cloud server.
In addition, the process of generating the key matrix is verified and tested according to actual requirements, so that the generated key matrix is ensured to meet the design requirements and the expectations of a data relationship model.
Specifically, the key matrix corresponding to the cloud server can be obtained by determining the number of rows and columns of the matrix according to the transverse coefficient and the longitudinal coefficient, generating an initial matrix, and then adjusting the initial matrix by means of the random number. This can increase the randomness and security of the key and ensure the trustworthiness and reliability of the cloud server.
In some embodiments, after the initial matrix is adjusted by using a random number to obtain the key matrix corresponding to the cloud server, the method further includes: obtaining a data transmission maximum value and a data transmission minimum value corresponding to the cloud server; and adjusting the key matrix according to the data transmission maximum value and the data transmission minimum value to obtain the adjusted key matrix.
Illustratively, the data transmission maximum value and the data transmission minimum value of the cloud server are determined according to the service requirement and the limitation condition of the data transmission. The data transmission maximum value and the data transmission minimum value can be determined according to factors such as network bandwidth, equipment performance and the like.
Illustratively, the adjusted key matrix is obtained according to the following formula:
where p represents the adjusted key matrix,representing the maximum value of data transmission,/->Represents the minimum data transmission, h represents the transverse coefficient, z represents the longitudinal coefficient, +.>Representing the key matrix before adjustment.
Step S104, obtaining the printing content, encrypting the printing content according to the key matrix, obtaining an encryption result corresponding to the printing content, and transmitting the encryption result to a cloud printer.
The print content is illustratively obtained from a user and may be in the form of text, images, etc. The printed content is then encrypted using an encryption algorithm, such as a symmetric encryption algorithm (e.g., AES), an asymmetric encryption algorithm (e.g., RSA), etc., using a key matrix. And further converts the print content according to a prescribed data format or encoding scheme for processing in the encryption process.
Illustratively, the print content is encrypted using the elements in the key matrix as keys, thereby converting the print content into an encryption result.
Illustratively, the encryption result is transmitted to the cloud printer, so that the security and reliability of the transmission can be ensured. The encrypted transmission may be performed using a network transmission protocol (e.g., HTTPS) to protect confidentiality of the encryption result. The specific transmission mode can be selected according to the actual requirements and the system architecture.
In some embodiments, encrypting the print content according to the key matrix to obtain an encryption result corresponding to the print content includes: obtaining corresponding encrypted text coding information of the printing content when the corresponding coding progress is in the key matrix; obtaining the encryption result corresponding to the printing content according to the encryption text coding information, the data encryption authority and the password text transmission coefficient; wherein the encryption result is obtained according to the following formula:
m represents the encryption result, h represents the transverse coefficient, z represents the longitudinal coefficient,matrix values corresponding to the ith row and jth column in the key matrix are represented by +.>Indicating the coding progress as +.>The encrypted text at that time encodes information,representing initial coding information corresponding to the printing content corresponding to the encrypted text coding information, x representing the cipher text transmission coefficient, q representing the data encryption authority, < >>Representing the number of transmissions per unit time.
Illustratively, the encoding progress of the print content in the key matrix is determined according to the business requirements and design requirements. The progress may be represented by an integer value or a specific flag indicating the portion of the key matrix that has been used for encryption. And acquiring corresponding encrypted text coding information from the key matrix according to the coding progress of the printing content. The information may be the location of the portion of the content in the key matrix that has been used for encryption and related information to identify the encryption of each byte or piece of text.
Illustratively, the encryption result of the print content is calculated based on the encrypted text encoding information, the data encryption rights, and the cipher text transmission coefficient. The specific calculation mode can be determined according to the encryption algorithm and the transmission rule. Comprising the following steps: and determining the starting position and the length of the printing content to be encrypted according to the encrypted text coding information. And judging whether the designated printing content is encrypted according to the data encryption authority. And carrying out corresponding encryption operation on the printing content according to the password text transmission coefficient. This may include the execution of encryption algorithms, the generation and application of keys and algorithm parameters, and the like. After encryption calculation, an encryption result corresponding to the printing content is obtained. The result may be ciphertext or encrypted content to ensure that only authorized users can decrypt and obtain the original printed content.
Illustratively, the encryption result may be obtained according to the following formula:
m represents the encryption result, h represents the transverse coefficient, z represents the longitudinal coefficient,matrix values corresponding to the ith row and jth column in the key matrix are represented by +.>Indicating the coding progress as +.>Encrypted text encoded information +_>Initial encoding information corresponding to print content corresponding to encrypted text encoding information is represented, x representsThe cipher text transmission coefficient, q represents the data encryption authority,representing the number of transmissions per unit time.
Specifically, by obtaining the encoding progress of the print content and the encrypted text encoding information, and calculating the encryption result based on the data encryption authority and the cipher text transmission coefficient, stepwise encryption and protection of the print content can be realized. This can control and protect the encryption process of the print content as needed, and ensure secure transmission and decryption of the print result.
Referring to fig. 2, fig. 2 is a flowchart illustrating another data encryption method of a cloud printer according to an embodiment of the present invention, where the data encryption method of the cloud printer is applied to the cloud printer.
As shown in fig. 2, the cloud printer data encryption method includes steps S501 to 502.
Step S501, an encryption result and a key matrix transmitted by a cloud server are obtained.
Illustratively, the connection with the cloud server is achieved by using a corresponding network protocol (e.g., HTTPS, SSH, etc.) and authentication means, and ensures successful establishment of communication with the cloud server. Once the connection with the cloud server is successful, the acquisition of the encryption result and key matrix obtained by encrypting the print content by the cloud server is achieved by using an appropriate API or command.
And step S502, decrypting the encryption result according to the key matrix to obtain the printing content corresponding to the encryption result.
Illustratively, the encryption result is decrypted using a key matrix. Ensuring that decryption operations are performed using decryption algorithms and parameters that match the encryption process. This may require conversion of the encryption result into an appropriate format for decryption operations.
Illustratively, the encryption result is decrypted based on the element in the key matrix as a key. And further, decryption is performed according to, for example, reverse substitution, reverse shift, or the like, to obtain print contents corresponding to the encryption result.
In some embodiments, the decrypting the encrypted result according to the key matrix to obtain the print content corresponding to the encrypted result includes: obtaining a corresponding decryption execution condition of the encryption result when the corresponding coding progress in the key matrix; and decrypting the encryption result according to the decryption execution condition and the initial execution condition to obtain the printing content corresponding to the encryption result.
Illustratively, the corresponding decryption execution condition is obtained from the key matrix according to the encoding progress of the encryption result in the key matrix. The decryption execution conditions may include information of an encryption algorithm, an encryption mode, an initial vector, and the like used in the encryption process. Before decryption takes place, the initial execution conditions need to be determined. These conditions typically include information related to the key matrix, such as keys, decryption algorithms, parameters, etc. The initial execution conditions may require an authentication or parsing process prior to decryption. And performing decryption operation on the encryption result according to the obtained decryption execution conditions and the initial execution conditions. It is ensured that the decryption operation is performed using decryption algorithms and parameters that match the encryption process. Decryption operations may be performed using an encryption library or algorithm implementation.
Illustratively, the encryption result is decrypted using a decryption algorithm and parameters provided in the decryption execution conditions to obtain decrypted data. And the consistency of the initial execution condition and the decryption execution condition is maintained, so that the correct matching and application of the decryption algorithm and parameters are ensured. After decryption, the corresponding print content can be obtained. This may be text content, images, etc., depending on the type of original data before encryption and the encryption algorithm.
Wherein a correct match and application of the decryption execution conditions and the initial execution conditions is important for a successful decryption of the encryption result. The accuracy and the security management of the secret key are ensured, and the decryption algorithm and the parameters are correctly used to normally decrypt the encryption result and obtain the original printing content.
At the same time, it is also necessary to ensure that the decryption process is verified and tested to ensure the correctness and reliability of the decryption operation. This may include verifying that the decryption results agree with expected values and ensuring that the decryption process does not result in corruption or distortion of the data.
Illustratively, by acquiring decryption execution conditions at the time of encoding progress of the encryption result in the key matrix, and decrypting the encryption result according to the decryption execution conditions and the initial execution conditions, the corresponding print content can be obtained. This allows the original print content to be restored and subsequent processing and operation to be performed.
The application scene of the cloud printer data encryption method provided by the embodiment of the application is as follows: the cloud server obtains transverse transmission capacity and longitudinal transmission capacity and determines a data relationship between the transverse transmission capacity and the longitudinal transmission capacity; the cloud server determines a transverse coefficient corresponding to the transverse transmission capacity and a longitudinal coefficient corresponding to the longitudinal transmission capacity according to the data relationship; the cloud server determines a key matrix corresponding to the cloud server according to the transverse coefficient and the longitudinal coefficient; the cloud server obtains printing content, encrypts the printing content according to the key matrix, obtains an encryption result corresponding to the printing content, and transmits the encryption result to a cloud printer; the cloud printer obtains an encryption result and a key matrix transmitted by a cloud server; and the cloud printer decrypts the encryption result according to the key matrix to obtain the printing content corresponding to the encryption result. Therefore, the encryption operation ensures that the printing content is not easily decrypted and acquired by unauthorized users in the transmission process, so that the encryption result can be safely transmitted to the cloud printer, the security of the printing content in the transmission process is protected, and the data is prevented from being stolen or tampered. Therefore, the problem that confidentiality of the printing content is possibly threatened when the printing content is transmitted between the cloud server and the cloud printer in the related technology is solved, and further the security of the printing content is damaged is solved.
Referring to fig. 3, fig. 3 is a schematic diagram of a cloud printer data encryption device 200 provided in an embodiment of the present application, where the cloud printer data encryption device 200 includes a relationship obtaining module 201, a coefficient determining module 202, a matrix determining module 203, and a data encryption module 204, where the relationship obtaining module 201 is configured to obtain a transverse transmission capability and a longitudinal transmission capability, and determine a data relationship between the transverse transmission capability and the longitudinal transmission capability; a coefficient determining module 202, configured to determine a transverse coefficient corresponding to the transverse transmission capability and a longitudinal coefficient corresponding to the longitudinal transmission capability according to the data relationship; a matrix determining module 203, configured to determine a key matrix corresponding to the cloud server according to the transverse coefficient and the longitudinal coefficient; the data encryption module 204 is configured to obtain print content, encrypt the print content according to the key matrix, obtain an encryption result corresponding to the print content, and transmit the encryption result to a cloud printer.
In some embodiments, the coefficient determining module 202 performs, in the determining, according to the data relationship, a transverse coefficient corresponding to the transverse transmission capability and a longitudinal coefficient corresponding to the longitudinal transmission capability:
Determining a key index and a query coefficient according to the data relationship;
determining a transverse coefficient corresponding to the transverse transmission capability and a longitudinal coefficient corresponding to the longitudinal transmission capability according to the key index and the query coefficient;
wherein the lateral coefficient is obtained according to the following formula:
the longitudinal coefficients are obtained according to the following formula:
h represents the transverse coefficient, z represents the longitudinal coefficient, lambda represents the query coefficient,representing the corresponding coding feature when said key indicator is u,>representing the unit transfer amount average.
In some embodiments, the matrix determining module 203 performs, in the determining the key matrix corresponding to the cloud server according to the lateral coefficient and the longitudinal coefficient:
determining the matrix row number and the matrix column number corresponding to the key matrix according to the transverse coefficient and the longitudinal coefficient, and generating an initial matrix according to the matrix row number and the matrix column number;
and adjusting the initial matrix by using a random number to obtain the key matrix corresponding to the cloud server.
In some embodiments, the matrix determining module 203 further performs, after the initial matrix is adjusted by using a random number to obtain the key matrix corresponding to the cloud server, the following steps:
Obtaining a data transmission maximum value and a data transmission minimum value corresponding to the cloud server;
and adjusting the key matrix according to the data transmission maximum value and the data transmission minimum value to obtain the adjusted key matrix.
In some embodiments, the data encryption module 204 performs, in the process of encrypting the print content according to the key matrix to obtain an encryption result corresponding to the print content:
obtaining corresponding encrypted text coding information of the printing content when the corresponding coding progress is in the key matrix;
obtaining the encryption result corresponding to the printing content according to the encryption text coding information, the data encryption authority and the password text transmission coefficient;
wherein the encryption result is obtained according to the following formula:
m represents the encryption result, h represents the transverse coefficient, z represents the longitudinal coefficient,matrix values corresponding to the ith row and jth column in the key matrix are represented by +.>Indicating the coding progress as +.>The encrypted text at that time encodes information,representing initial coding information corresponding to the printing content corresponding to the encrypted text coding information, x representing the cipher text transmission coefficient, q representing the data encryption authority, < > >Representing the number of transmissions per unit time.
In some embodiments, the cloud printer data encryption device 200 may be applied to a cloud server.
It should be noted that, for convenience and brevity of description, the specific working process of the cloud printer data encryption device 200 described above may refer to the corresponding process in the foregoing embodiment of the cloud printer data encryption method, which is not described herein again.
Referring to fig. 4, fig. 4 is a schematic diagram of a cloud printer data encryption device 400 provided in an embodiment of the present application, where the cloud printer data encryption device 400 includes a data acquisition module 401 and a data decryption module 402, where the data acquisition module 401 is configured to obtain an encryption result and a key matrix transmitted by a cloud server; and the data decryption module 402 is configured to decrypt the encryption result according to the key matrix, and obtain print content corresponding to the encryption result.
In some embodiments, the data decryption module 402 performs, in the process of decrypting the encrypted result according to the key matrix to obtain the print content corresponding to the encrypted result:
obtaining a corresponding decryption execution condition of the encryption result when the corresponding coding progress in the key matrix;
And decrypting the encryption result according to the decryption execution condition and the initial execution condition to obtain the printing content corresponding to the encryption result.
In some embodiments, the cloud printer data encryption apparatus 400 may be applied to a cloud printer.
It should be noted that, for convenience and brevity of description, the specific working process of the cloud printer data encryption device 200 described above may refer to the corresponding process in the foregoing embodiment of the cloud printer data encryption method, which is not described herein again.
Referring to fig. 5, fig. 5 is a schematic block diagram of a cloud server according to an embodiment of the present invention.
As shown in fig. 5, the cloud server 300 includes a processor 301 and a memory 302, and the processor 301 and the memory 302 are connected by a bus 303, such as an I2C (Inter-integrated Circuit) bus.
In particular, the processor 301 is used to provide computing and control capabilities, supporting the operation of the entire cloud server. The processor 301 may be a central processing unit (Central Processing Unit, CPU), the processor 301 may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field-programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. Wherein the general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Specifically, the Memory 302 may be a Flash chip, a Read-Only Memory (ROM) disk, an optical disk, a U-disk, a removable hard disk, or the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 5 is merely a block diagram of a portion of the structure associated with an embodiment of the present invention and is not limiting of the cloud server to which an embodiment of the present invention is applied, and that a particular server may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
The processor is used for running a computer program stored in the memory, and implementing any one of the cloud printer data encryption methods provided by the embodiment of the invention when the computer program is executed.
In an embodiment, the processor is configured to run a computer program stored in a memory and to implement the following steps when executing the computer program:
acquiring transverse transmission capability and longitudinal transmission capability, and determining a data relationship between the transverse transmission capability and the longitudinal transmission capability;
determining a transverse coefficient corresponding to the transverse transmission capacity and a longitudinal coefficient corresponding to the longitudinal transmission capacity according to the data relationship;
Determining a key matrix corresponding to the cloud server according to the transverse coefficient and the longitudinal coefficient;
and obtaining the printing content, encrypting the printing content according to the key matrix, obtaining an encryption result corresponding to the printing content, and transmitting the encryption result to a cloud printer.
In some embodiments, the processor 301 performs, in the determining, according to the data relationship, a lateral coefficient corresponding to the lateral transmission capability and a longitudinal coefficient corresponding to the longitudinal transmission capability:
determining a key index and a query coefficient according to the data relationship;
determining a transverse coefficient corresponding to the transverse transmission capability and a longitudinal coefficient corresponding to the longitudinal transmission capability according to the key index and the query coefficient;
wherein the lateral coefficient is obtained according to the following formula:
the longitudinal coefficients are obtained according to the following formula:
h represents the transverse coefficient, z represents the longitudinal coefficient, lambda represents the query coefficient,representing the corresponding coding feature when said key indicator is u,>representing the unit transfer amount average.
In some embodiments, the processor 301 performs, in the determining the key matrix corresponding to the cloud server according to the lateral coefficient and the longitudinal coefficient:
Determining the matrix row number and the matrix column number corresponding to the key matrix according to the transverse coefficient and the longitudinal coefficient, and generating an initial matrix according to the matrix row number and the matrix column number;
and adjusting the initial matrix by using a random number to obtain the key matrix corresponding to the cloud server.
In some embodiments, the processor 301 further performs, in the process after the initial matrix is adjusted by using the random number to obtain the key matrix corresponding to the cloud server:
obtaining a data transmission maximum value and a data transmission minimum value corresponding to the cloud server;
and adjusting the key matrix according to the data transmission maximum value and the data transmission minimum value to obtain the adjusted key matrix.
In some embodiments, the processor 301 performs, in the process of encrypting the print content according to the key matrix to obtain an encryption result corresponding to the print content:
obtaining corresponding encrypted text coding information of the printing content when the corresponding coding progress is in the key matrix;
obtaining the encryption result corresponding to the printing content according to the encryption text coding information, the data encryption authority and the password text transmission coefficient;
Wherein the encryption result is obtained according to the following formula:
m represents the encryption result, h represents the transverse coefficient, z represents the longitudinal coefficient,matrix values corresponding to the ith row and jth column in the key matrix are represented by +.>Indicating the coding progress as +.>The encrypted text at that time encodes information,representing initial coding information corresponding to the printing content corresponding to the encrypted text coding information, x representing the cipher text transmission coefficient, q representing the data encryption authority, < >>Representing the number of transmissions per unit time.
It should be noted that, for convenience and brevity of description, a person skilled in the art may clearly understand that, in the specific working process of the cloud server described above, reference may be made to a corresponding process in the foregoing embodiment of the cloud printer data encryption method, which is not described herein again.
The embodiment of the invention also provides a storage medium for computer readable storage, wherein the storage medium stores one or more programs, and the one or more programs can be executed by one or more processors to realize the steps of any cloud printer data encryption method provided by the embodiment specification of the invention.
The storage medium may be an internal storage unit of the cloud server according to the foregoing embodiment, for example, a hard disk or a memory of the cloud server. The storage medium may also be an external storage device of the cloud server, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the cloud server.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware embodiment, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
It should be understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments. While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (8)

1. A cloud printer data encryption method, which is applied to a cloud server, the method comprising:
acquiring transverse transmission capability and longitudinal transmission capability, and determining a data relationship between the transverse transmission capability and the longitudinal transmission capability; wherein the data relationship refers to a linear relationship, a nonlinear relationship, or other specific functional relationships; determining a data relationship between the lateral transport capability and the longitudinal transport capability comprises: preprocessing the first data related to the transverse transmission capacity and the second data related to the longitudinal transmission capacity, and analyzing the preprocessed first data and the preprocessed second data based on a preset statistical analysis algorithm to obtain a data relationship between the transverse transmission capacity and the longitudinal transmission capacity;
determining a transverse coefficient corresponding to the transverse transmission capacity and a longitudinal coefficient corresponding to the longitudinal transmission capacity according to the data relationship;
determining a key matrix corresponding to the cloud server according to the transverse coefficient and the longitudinal coefficient;
obtaining printing content, encrypting the printing content according to the key matrix, obtaining an encryption result corresponding to the printing content, and transmitting the encryption result to a cloud printer;
The determining, according to the data relationship, a transverse coefficient corresponding to the transverse transmission capability and a longitudinal coefficient corresponding to the longitudinal transmission capability, including:
determining a key index and a query coefficient according to the data relationship;
determining a transverse coefficient corresponding to the transverse transmission capability and a longitudinal coefficient corresponding to the longitudinal transmission capability according to the key index and the query coefficient;
wherein the lateral coefficient is obtained according to the following formula:
the longitudinal coefficients are obtained according to the following formula:
h represents the transverse coefficient, z represents the longitudinal coefficient, lambda represents the query coefficient,representing the corresponding coding feature when said key indicator is u,>representing a unit transmission quantity average value;
the determining the key matrix corresponding to the cloud server according to the transverse coefficient and the longitudinal coefficient comprises the following steps:
determining the matrix row number and the matrix column number corresponding to the key matrix according to the transverse coefficient and the longitudinal coefficient, and generating an initial matrix according to the matrix row number and the matrix column number;
and adjusting the initial matrix by using a random number to obtain the key matrix corresponding to the cloud server.
2. The method according to claim 1, wherein after the initial matrix is adjusted by using a random number to obtain the key matrix corresponding to the cloud server, the method further comprises:
Obtaining a data transmission maximum value and a data transmission minimum value corresponding to the cloud server;
and adjusting the key matrix according to the data transmission maximum value and the data transmission minimum value to obtain the adjusted key matrix.
3. The method according to claim 1, wherein encrypting the print content according to the key matrix to obtain an encryption result corresponding to the print content comprises:
obtaining corresponding encrypted text coding information of the printing content when the corresponding coding progress is in the key matrix;
obtaining the encryption result corresponding to the printing content according to the encryption text coding information, the data encryption authority and the password text transmission coefficient;
wherein the encryption result is obtained according to the following formula:
m represents the encryption result, h represents the transverse coefficient, z represents the longitudinal coefficient,matrix values corresponding to the ith row and jth column in the key matrix are represented by +.>Indicating the coding progress as +.>Said encrypted text encoded information when +.>Representing initial coding information corresponding to the printing content corresponding to the encrypted text coding information, x representing the cipher text transmission coefficient, q representing the data encryption authority, < > >Representing the number of transmissions per unit time.
4. A cloud printer data encryption method, which is applied to a cloud printer, the method comprising:
obtaining an encryption result and a key matrix transmitted by a cloud server;
and decrypting the encryption result according to the key matrix to obtain the printing content corresponding to the encryption result.
5. The method according to claim 4, wherein decrypting the encrypted result according to the key matrix to obtain the print content corresponding to the encrypted result comprises:
obtaining a corresponding decryption execution condition of the encryption result when the corresponding coding progress in the key matrix;
and decrypting the encryption result according to the decryption execution condition and the initial execution condition to obtain the printing content corresponding to the encryption result.
6. The utility model provides a cloud printer data encryption device which characterized in that is applied to cloud server, includes:
the relation acquisition module is used for acquiring transverse transmission capacity and longitudinal transmission capacity and determining a data relation between the transverse transmission capacity and the longitudinal transmission capacity; wherein the data relationship refers to a linear relationship, a nonlinear relationship, or other specific functional relationships; determining a data relationship between the lateral transport capability and the longitudinal transport capability comprises: preprocessing the first data related to the transverse transmission capacity and the second data related to the longitudinal transmission capacity, and analyzing the preprocessed first data and the preprocessed second data based on a preset statistical analysis algorithm to obtain a data relationship between the transverse transmission capacity and the longitudinal transmission capacity;
The coefficient determining module is used for determining a transverse coefficient corresponding to the transverse transmission capacity and a longitudinal coefficient corresponding to the longitudinal transmission capacity according to the data relationship;
the matrix determining module is used for determining a key matrix corresponding to the cloud server according to the transverse coefficient and the longitudinal coefficient;
the data encryption module is used for obtaining printing content, encrypting the printing content according to the key matrix, obtaining an encryption result corresponding to the printing content and transmitting the encryption result to the cloud printer;
the coefficient determining module performs, in determining a transverse coefficient corresponding to the transverse transmission capability and a longitudinal coefficient corresponding to the longitudinal transmission capability according to the data relationship: determining a key index and a query coefficient according to the data relationship;
determining a transverse coefficient corresponding to the transverse transmission capability and a longitudinal coefficient corresponding to the longitudinal transmission capability according to the key index and the query coefficient;
wherein the lateral coefficient is obtained according to the following formula:
the longitudinal coefficients are obtained according to the following formula:
h represents the transverse coefficient, z represents the longitudinal coefficient, lambda represents the query coefficient, Representing the corresponding coding feature when said key indicator is u,>representing a unit transmission quantity average value;
the matrix determining module performs, in determining a key matrix corresponding to the cloud server according to the transverse coefficient and the longitudinal coefficient: determining the matrix row number and the matrix column number corresponding to the key matrix according to the transverse coefficient and the longitudinal coefficient, and generating an initial matrix according to the matrix row number and the matrix column number;
and adjusting the initial matrix by using a random number to obtain the key matrix corresponding to the cloud server.
7. A cloud printer data encryption device, characterized in that is applied to cloud printer, includes:
the data acquisition module is used for acquiring an encryption result and a key matrix transmitted by the cloud server;
and the data decryption module is used for decrypting the encryption result according to the key matrix to obtain the printing content corresponding to the encryption result.
8. A cloud server, which is characterized by comprising a processor and a memory;
the memory is used for storing a computer program;
the processor is configured to execute the computer program and implement the cloud printer data encryption method according to any one of claims 1 to 3 when the computer program is executed.
CN202410186582.0A 2024-02-07 2024-02-20 Cloud printer data encryption method and related device Pending CN117749532A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202410172796 2024-02-07
CN2024101727962 2024-02-07

Publications (1)

Publication Number Publication Date
CN117749532A true CN117749532A (en) 2024-03-22

Family

ID=90281634

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410186582.0A Pending CN117749532A (en) 2024-02-07 2024-02-20 Cloud printer data encryption method and related device

Country Status (1)

Country Link
CN (1) CN117749532A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104428788A (en) * 2012-06-28 2015-03-18 谷歌公司 Secure printing in a cloud-based print system
CN109379380A (en) * 2018-12-06 2019-02-22 联想图像(天津)科技有限公司 Data transmission method, data receiver method and remote printing system, mobile terminal
CN109902498A (en) * 2019-02-27 2019-06-18 南京师范大学 Data ciphering method, data decryption method and corresponding device and equipment
CN113928031A (en) * 2021-10-26 2022-01-14 深圳市链科网络科技有限公司 Cloud printing method and device
CN116846542A (en) * 2023-07-21 2023-10-03 山东云海国创云计算装备产业创新中心有限公司 Data encryption and decryption method and device and electronic equipment
CN116954530A (en) * 2023-09-19 2023-10-27 珠海芯烨电子科技有限公司 Printer data processing method and server
CN116991343A (en) * 2023-09-28 2023-11-03 珠海芯烨电子科技有限公司 Printer sharing management method and server
CN117348824A (en) * 2023-12-04 2024-01-05 珠海芯烨电子科技有限公司 Cloud printing system and related device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104428788A (en) * 2012-06-28 2015-03-18 谷歌公司 Secure printing in a cloud-based print system
CN109379380A (en) * 2018-12-06 2019-02-22 联想图像(天津)科技有限公司 Data transmission method, data receiver method and remote printing system, mobile terminal
CN109902498A (en) * 2019-02-27 2019-06-18 南京师范大学 Data ciphering method, data decryption method and corresponding device and equipment
CN113928031A (en) * 2021-10-26 2022-01-14 深圳市链科网络科技有限公司 Cloud printing method and device
CN116846542A (en) * 2023-07-21 2023-10-03 山东云海国创云计算装备产业创新中心有限公司 Data encryption and decryption method and device and electronic equipment
CN116954530A (en) * 2023-09-19 2023-10-27 珠海芯烨电子科技有限公司 Printer data processing method and server
CN116991343A (en) * 2023-09-28 2023-11-03 珠海芯烨电子科技有限公司 Printer sharing management method and server
CN117348824A (en) * 2023-12-04 2024-01-05 珠海芯烨电子科技有限公司 Cloud printing system and related device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李林等: "基于密钥矩阵的科技创新数据加密共享***设计", 《电子设计工程》, 17 March 2023 (2023-03-17), pages 15 - 18 *

Similar Documents

Publication Publication Date Title
US8001384B2 (en) Authentication system, authentication method, attesting device, verification device, their programs, and recording medium
CN101430751B (en) Data management apparatus and data management method
CN101300570B (en) Method and system for distributing network coding content using digital sign
CN100399737C (en) Method of data protection
US9021257B2 (en) Secret information distribution system, secret information distribution method and program
US9230114B1 (en) Remote verification of file protections for cloud data storage
US20200134205A1 (en) Data processing apparatus and data processing method for internet of things system
CN113821810B (en) Data processing method and system, storage medium and electronic equipment
CN116451263B (en) Hard disk data storage method, device, equipment and storage medium
CN114223175A (en) Generating a sequence of network data while preventing acquisition or manipulation of time data
US8346742B1 (en) Remote verification of file protections for cloud data storage
JP5972181B2 (en) Tamper detection device, tamper detection method, and program
Yoosuf et al. LDuAP: lightweight dual auditing protocol to verify data integrity in cloud storage servers
CN111212026A (en) Data processing method and device based on block chain and computer equipment
US11983160B2 (en) Apparatus and method for providing sensor data based on blockchain
Yoosuf Lightweight fog‐centric auditing scheme to verify integrity of IoT healthcare data in the cloud environment
KR102443255B1 (en) Method for Generating Encryption Key and Digital Signature Based on Lattices
CN116827821B (en) Block chain cloud-based application program performance monitoring method
WO2013153628A1 (en) Calculation processing system and calculation result authentication method
CN116842559A (en) Data encryption storage model and data encryption storage method based on blockchain
Malgari et al. A novel data security framework in distributed cloud computing
CN113949591B (en) Data encryption protection method and system based on block chain
CN117749532A (en) Cloud printer data encryption method and related device
CN113672955B (en) Data processing method, system and device
EP3739806A1 (en) Apparatus and method for generating secret key, apparatus and method for generating evaluation key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination