CN105227566A - Cipher key processing method, key handling device and key handling system - Google Patents
Cipher key processing method, key handling device and key handling system Download PDFInfo
- Publication number
- CN105227566A CN105227566A CN201510672476.4A CN201510672476A CN105227566A CN 105227566 A CN105227566 A CN 105227566A CN 201510672476 A CN201510672476 A CN 201510672476A CN 105227566 A CN105227566 A CN 105227566A
- Authority
- CN
- China
- Prior art keywords
- key
- fragment
- server
- clouds
- private key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Abstract
The invention provides a kind of cipher key processing method, key handling device and key handling system, belong to communication technical field, it can solve the low problem of existing cipher key processing method fail safe.Cipher key processing method of the present invention comprises the steps: to receive secret generating request, generate a pair PKI and private key, and private key is divided into a main fragment and the auxiliary fragment of N part, and main for portion wherein fragment is uploaded in local key server, auxiliary for N part fragment is uploaded at least one high in the clouds key server; N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key; By PKI, data are encrypted, form message ciphertext, and be uploaded to high in the clouds data server; Receive the request of query messages ciphertext, obtain the message ciphertext of high in the clouds data server, and from the key server of high in the clouds, obtain at least a auxiliary fragment, obtain main fragment from local key server, reconstruct private key is decrypted with message cipher text.
Description
Technical field
The invention belongs to communication technical field, be specifically related to a kind of cipher key processing method, key handling device and key handling system.
Background technology
Along with information-based and digitized universal, secret key safety sex chromosome mosaicism more and more receives the concern of people.Common business exchange activity etc. is all that is the fail safe of all Online activities all depends on private key without exception based on the fail safe of private key, therefore protects the safety of private key to be the vital part of network security.
In prior art, there are the following problems: usually adopt the mode of the single key of centralised storage (this key is normally stored on home server) to encrypt and decrypt data during data owner's uploading data, now the safety decision-making of key is in the safety of physical equipment.But Internet of things node and cloud device easily suffer physical attacks, assailant implements physical damage makes node normally work, or equipment of stealing obtains sensitive information.Assailant tackles the data transmitted in network and signaling, distort, when forging, if obtain the unique communication key stored in a device, just can obtain user sensitive information further or cause information transmission errors.
Summary of the invention
The present invention is directed to the problems referred to above that existing cipher key processing method exists, the cipher key processing method providing a kind of fail safe high, key handling device and key handling system.
The technical scheme that the technical problem that the present invention solves adopts is a kind of cipher key processing method, comprises the steps:
Receive secret generating request, generate a pair PKI and private key, and private key is divided into a main fragment and the auxiliary fragment of N part, and main for portion wherein fragment is uploaded in local key server, auxiliary for N part fragment is uploaded at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key;
By PKI, data are encrypted, form message ciphertext, and be uploaded to high in the clouds data server;
Receive the request of query messages ciphertext, obtain the message ciphertext of high in the clouds data server, and from the key server of high in the clouds, obtain at least a auxiliary fragment, obtain main fragment from local key server, reconstruct private key is decrypted with message cipher text.
Preferably, the number of described high in the clouds key server is N, and stores a private key fragment in each high in the clouds key server.
Preferably, the request of described reception query messages ciphertext comprises:
Receive the message cryptogram search request of searching ciphertext mode.
Preferably, described by PKI data are encrypted after also comprise:
Described PKI is destroyed, or described PKI is stored to the step in local key server.
Preferably, described generation a pair PKI and private key, comprising:
Adopt key-function, according to the parameter of setting, stochastic generation PKI and private key;
Describedly by PKI, data to be encrypted, to comprise:
Adopting encryption function, is message ciphertext by data encryption;
Described reconstruct private key, comprising:
Adopt reconstruction of function, be at least aly stored in fragment in the key server of high in the clouds and a fragment be stored in local key server, reconstruct private key according to what receive;
Described message cipher text is decrypted and comprises:
Adopt decryption function, according to the private key of reconstruct, by message decrypt ciphertext.
The technical scheme that the technical problem that the present invention solves adopts is a kind of key handling device, comprising:
Key production module, for according to secret generating request, generates a pair PKI and private key;
Key management module, for private key being divided into a main fragment and the auxiliary fragment of N part, and being uploaded in local key server by main for portion wherein fragment, being uploaded to by auxiliary for N part fragment at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key;
Encrypting module, for being encrypted data by described PKI, being formed message ciphertext, and described message ciphertext is uploaded to high in the clouds data server;
Reconstructed module, for obtaining at least a auxiliary fragment from the key server of high in the clouds, obtains main fragment from local key server, reconstruct private key;
Deciphering module, for the request according to received query messages ciphertext, is obtained the message ciphertext of high in the clouds data server, and is decrypted by the private key message cipher text of reconstruct.
Preferably, described key handling device also comprises: index module,
Described index module, for carrying out index to the message ciphertext being uploaded to high in the clouds data server
Preferably, described PKI also for being destroyed by described PKI, or is stored in local key server by described key management module.
Preferably, described key management module is used for the auxiliary fragment of N part private key to be uploaded in the key server of N number of high in the clouds, and stores a auxiliary fragment in each high in the clouds key server.
The technical scheme that adopts of technical problem that the present invention solves is a kind of key handling system, comprises above-mentioned key handling device, and local data service device, local key server and at least one high in the clouds key server.
The present invention has following beneficial effect:
Cipher key processing method of the present invention, is divided into multiple fragment by private key, i.e. a main fragment and the auxiliary fragment of N part, and adopts distributed storage mode to be stored in by private key in different servers, to guarantee the fail safe of the storage of private key.And auxiliary for private key fragment is existed in the key server of high in the clouds, the storage pressure of local key server can be alleviated.
In key handling device in the present invention key management module just private key be divided into multiple fragment, i.e. a main fragment and the auxiliary fragment of N part, and adopt distributed storage mode to be stored in by private key in different servers, to guarantee the fail safe of the storage of private key.And auxiliary for private key fragment is existed in the key server of high in the clouds, the storage pressure of local key server can be alleviated.
Key handling system in the present invention comprises above-mentioned key handling device, therefore its fail safe is higher.
Accompanying drawing explanation
Fig. 1 is the flow chart of the cipher key processing method of embodiments of the invention 1;
Fig. 2 is the schematic diagram of the key handling system of embodiments of the invention 3.
Embodiment
For making those skilled in the art understand technical scheme of the present invention better, below in conjunction with the drawings and specific embodiments, the present invention is described in further detail.
Embodiment 1:
As shown in Figure 1, the present embodiment provides a kind of cipher key processing method, and it comprises the steps:
Step S1, the request of reception secret generating, generate double secret key, namely generate a pair PKI and private key, and private key is divided into a main fragment and the auxiliary fragment of N part, and main for portion wherein fragment is uploaded in local key server, auxiliary for N part fragment is uploaded at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key.
In this step, it is concrete when local data owner is for being uploaded to high in the clouds data server by data (message plaintext), key production module uses key-function G, according to the parameter alpha of setting, stochastic generation PKI pk and private key sk, i.e. G (α)-> (pk, sk); Wherein, PKI pk is used for encryption, and private key sk is used for deciphering.Wherein, what key-function adopted is ElGamal algorithm, and other can certainly be adopted to well known to a person skilled in the art algorithm.
Wherein, to be preferably in step sl uploaded in the key server of N number of high in the clouds by auxiliary for N part fragment, and to store a auxiliary fragment in the key server of each high in the clouds, this kind of storage mode makes the storage of auxiliary fragment safer.Such as say, 3 parts of auxiliary fragments and portion main fragment is needed during setting reconstruct private key, if by three parts of auxiliary fragment store in three high in the clouds key servers, then need to break up three high in the clouds key servers and a local key server can reconstruct private key, if by three parts of auxiliary fragment store in a high in the clouds key server, then only need to break up a high in the clouds key server and a local key server and restructural private key, therefore, be not difficult to find out to exist in different cloud servers safer respectively by auxiliary fragment.
Wherein, main fragment and at least a auxiliary fragment must be had in step S1 could to reconstruct private key refer to: the auxiliary fragment obtaining at least a private key sk from multiple key server, and obtain the main fragment of a private key sk stored in local key server, namely can derive and calculate complete private key sk; From local key server, obtain the main fragment of a private key if fail and/or fail to get the auxiliary fragment of private key be stored in the key server of high in the clouds, complete private key sk can not be reconstructed and be decrypted with message cipher text.
Step S2, by PKI, data to be encrypted, to form message ciphertext, and be uploaded to high in the clouds data server.
In this step, the PKI pk that concrete encrypting module generates according to key production module, use encryption function E, by data (message expressly) m encryption, form message ciphertext c, the message ciphertext c now generated, by message storage module, is stored in the data server of high in the clouds, what wherein encryption function adopted is ElGamal algorithm, and other can certainly be adopted to well known to a person skilled in the art algorithm.
Wherein, PKI is after completing data encryption, and PKI will be destroyed or be stored in local key server by PKI.
The request of step S3, reception query messages ciphertext, obtains the message ciphertext of high in the clouds data server, and obtains private key fragment in the home server and at least part of high in the clouds key server of storage private key fragment, and reconstruct private key is decrypted with message cipher text; Wherein,
When obtaining at least a auxiliary fragment from the key server of high in the clouds, and obtain the main fragment in home server, the private key now reconstructed then is deciphered in order to message cipher text; Otherwise otherwise.
In this step, when the concrete validated user when certification needs to access high in the clouds data, index module adopts searching ciphertext mode to send inquiry request, now receives this inquiry request, obtains message ciphertext c from high in the clouds data server; Cipher key reconstruction module is sent to small part inquiry request to the multiple cloud servers storing private key fragment, after at least part of cloud server receives inquiry request, returns the key fragment had separately to reconstructed module.Reconstructed module adopts reconstruction of function R, and by the auxiliary fragment of t part received and the local main fragment of portion stored, wherein 1≤t≤N, regenerates private key sk, i.e. R (t, 1)->sk; Message ciphertext c, by decryption function D, is decoded as message expressly m, i.e. D (c, sk)->m by deciphering module; User can obtain the message expressly m wanting to access, and wherein reconstruction of function is the matrix change algorithm obtaining the auxiliary fragment of private key; What decryption function adopted is ElGamal algorithm, and other can certainly be adopted to well known to a person skilled in the art algorithm.In this step can by regulating the size of t value, to increase the fail safe of the method, t value is larger, and fail safe is higher.
In sum, in the cipher key processing method of the present embodiment, private key is divided into multiple fragment, i.e. a main fragment and the auxiliary fragment of N part, and adopts distributed storage mode to be stored in by private key in different servers, to guarantee the fail safe of the storage of private key; And well known to a person skilled in the art and be, be stored in data in local key server comparatively safer in the key server of high in the clouds, in the present embodiment will wherein main fragment store in home server, and this main fragment when in the end reconstructing private key, don't fail to be found can to decipher (at least one certainly also will be found to be stored in auxiliary fragment in the key server of high in the clouds), thus make the security performance of the method for the present embodiment higher.Simultaneously, adopt the mode of single key in the prior art, that is a private key is only comprised, therefore no matter this private key is stored in home server or cloud server, as long as a server is broken up can find this private key, therefore security performance is low, and in the cipher key processing method of the present embodiment, at least will break up plural server could obtain complete private key, to be decrypted data ciphertext, thus improve the fail safe of key, but also the number obtaining fragment in the key server of high in the clouds can be adjusted, to increase key safety.It should be noted that at this, can be more safer in local key server although in the prior art private key is stored in completely, but completely private key file is stored in the problem that the storage pressure of local key server can be caused in local key server larger, adopts the mode of distributed storage private key then can well alleviate the storage pressure of local key server in the present embodiment.
Embodiment 2:
As shown in Figure 2, the present embodiment provides a kind of key handling device, comprising: key production module, key management module, encrypting module, deciphering module, reconstructed module; Wherein, key production module, for according to secret generating request, generates a pair PKI and private key; Key management module, for private key being divided into a main fragment and the auxiliary fragment of N part, and being uploaded in local key server by main for portion wherein fragment, being uploaded to by auxiliary for N part fragment at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key; Encrypting module, for being encrypted data by described PKI, being formed message ciphertext, and described message ciphertext is uploaded to high in the clouds data server; Reconstructed module, for obtaining at least a auxiliary fragment from the key server of high in the clouds, obtains main fragment from local key server, reconstruct private key; Deciphering module, for the request according to received query messages ciphertext, is obtained the message ciphertext of high in the clouds data server, and is decrypted by the private key message cipher text of reconstruct.
In the key handling device of the present embodiment, private key is divided into a main fragment and the auxiliary fragment of N part by key management module, and is uploaded in local key server by main for portion wherein fragment, is uploaded to by auxiliary for N part fragment at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key, in brief, private key is divided into multiple fragment by key management module, and multiple fragment store is in multiple server, multiple server will be broken up when reconstructing private key and being decrypted, therefore the fail safe of the key handling device of the present embodiment is higher.And main fragment is uploaded in local key server and not only can improves the storage pressure that fail safe can also slow down local key server by key management module in the present embodiment.
Preferably, the present embodiment key handling device also comprises index module, for carrying out index to the message ciphertext being uploaded to high in the clouds data server.
Concrete, when the validated user of certification needs to access high in the clouds data, user can adopt searching ciphertext mode to send inquiry request by index module, obtains message ciphertext from high in the clouds data server.
Preferably, PKI also for being destroyed by PKI, or is stored in local key server by the key management module in the present embodiment.Wherein, being destroyed by PKI is mode the safest.
Preferably, the key management module of the present embodiment is used for the auxiliary fragment of N part private key to be uploaded in the key server of N number of high in the clouds, and stores a auxiliary fragment in each high in the clouds key server, to make the storage of auxiliary fragment safer.
Embodiment 3:
As shown in Figure 2, the present embodiment provides a kind of key handling system, and it comprises key handling device in embodiment 2, and local data service device, local key server and at least one high in the clouds key server.Wherein, local data service device is used for storing message ciphertext, and high in the clouds key server is for storing the auxiliary fragment of private key, and local key server is for storing main fragment and the PKI of private key.
Key handling system due to the present embodiment comprises key handling device in embodiment 2, therefore its fail safe is better.
Be understandable that, the illustrative embodiments that above execution mode is only used to principle of the present invention is described and adopts, but the present invention is not limited thereto.For those skilled in the art, without departing from the spirit and substance in the present invention, can make various modification and improvement, these modification and improvement are also considered as protection scope of the present invention.
Claims (10)
1. a cipher key processing method, is characterized in that, comprises the steps:
Receive secret generating request, generate a pair PKI and private key, and private key is divided into a main fragment and the auxiliary fragment of N part, and main for portion wherein fragment is uploaded in local key server, auxiliary for N part fragment is uploaded at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key;
By PKI, data are encrypted, form message ciphertext, and be uploaded to high in the clouds data server;
Receive the request of query messages ciphertext, obtain the message ciphertext of high in the clouds data server, and from the key server of high in the clouds, obtain at least a auxiliary fragment, obtain main fragment from local key server, reconstruct private key is decrypted with message cipher text.
2. cipher key processing method according to claim 1, is characterized in that, the number of described high in the clouds key server is N, and stores a private key fragment in each high in the clouds key server.
3. cipher key processing method according to claim 1, is characterized in that, the request of described reception query messages ciphertext comprises:
Receive the message cryptogram search request of searching ciphertext mode.
4. cipher key processing method according to claim 1, is characterized in that, described by PKI data are encrypted after also comprise:
Described PKI is destroyed, or described PKI is stored to the step in local key server.
5. cipher key processing method according to claim 1, is characterized in that, described generation a pair PKI and private key, comprising:
Adopt key-function, according to the parameter of setting, stochastic generation PKI and private key;
Describedly by PKI, data to be encrypted, to comprise:
Adopting encryption function, is message ciphertext by data encryption;
Described reconstruct private key, comprising:
Adopt reconstruction of function, be at least aly stored in fragment in the key server of high in the clouds and a fragment be stored in local key server, reconstruct private key according to what receive; Described message cipher text is decrypted and comprises:
Adopt decryption function, according to the private key of reconstruct, by message decrypt ciphertext.
6. a key handling device, is characterized in that, comprising:
Key production module, for according to secret generating request, generates a pair PKI and private key;
Key management module, for private key being divided into a main fragment and the auxiliary fragment of N part, and being uploaded in local key server by main for portion wherein fragment, being uploaded to by auxiliary for N part fragment at least one high in the clouds key server; Wherein, N be more than or equal to 1 integer, and main fragment and at least a auxiliary fragment must be had to reconstruct private key;
Encrypting module, for being encrypted data by described PKI, being formed message ciphertext, and described message ciphertext is uploaded to high in the clouds data server;
Reconstructed module, for obtaining at least a auxiliary fragment from the key server of high in the clouds, obtains main fragment from local key server, reconstruct private key;
Deciphering module, for the request according to received query messages ciphertext, is obtained the message ciphertext of high in the clouds data server, and is decrypted by the private key message cipher text of reconstruct.
7. key handling device according to claim 6, is characterized in that, described key handling device also comprises: index module,
Described index module, for carrying out index to the message ciphertext being uploaded to high in the clouds data server.
8. key handling device according to claim 6, is characterized in that, described PKI also for being destroyed by described PKI, or is stored in local key server by described key management module.
9. key handling device according to claim 6, is characterized in that, described key management module is used for the auxiliary fragment of N part private key to be uploaded in the key server of N number of high in the clouds, and stores a auxiliary fragment in each high in the clouds key server.
10. a key handling system, is characterized in that, described key handling system comprises the key handling device according to any one of claim 6-9, and local data service device, local key server and at least one high in the clouds key server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510672476.4A CN105227566A (en) | 2015-10-16 | 2015-10-16 | Cipher key processing method, key handling device and key handling system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510672476.4A CN105227566A (en) | 2015-10-16 | 2015-10-16 | Cipher key processing method, key handling device and key handling system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105227566A true CN105227566A (en) | 2016-01-06 |
Family
ID=54996245
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510672476.4A Pending CN105227566A (en) | 2015-10-16 | 2015-10-16 | Cipher key processing method, key handling device and key handling system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105227566A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106161449A (en) * | 2016-07-19 | 2016-11-23 | 青松智慧(北京)科技有限公司 | Transmission method without key authentication and system |
CN106357401A (en) * | 2016-11-11 | 2017-01-25 | 武汉理工大学 | Private key storage method and private key use method |
CN106961336A (en) * | 2017-04-18 | 2017-07-18 | 北京百旺信安科技有限公司 | A kind of key components trustship method and system based on SM2 algorithms |
CN107276752A (en) * | 2016-06-27 | 2017-10-20 | 收付宝科技有限公司 | The methods, devices and systems that limitation key is decrypted are paid to cloud |
CN109462608A (en) * | 2018-12-19 | 2019-03-12 | 杭州安恒信息技术股份有限公司 | Data encryption processing method, apparatus and system |
CN110069949A (en) * | 2019-04-19 | 2019-07-30 | 浙江鲸腾网络科技有限公司 | A kind of electronic contract signature method, apparatus, equipment and medium |
WO2020063354A1 (en) * | 2018-09-28 | 2020-04-02 | 北京金山安全软件有限公司 | Block chain private key storage and recovery method, device and system |
CN111143863A (en) * | 2019-12-22 | 2020-05-12 | 浪潮电子信息产业股份有限公司 | Data processing method, device, equipment and computer readable storage medium |
CN111245597A (en) * | 2020-01-17 | 2020-06-05 | 众安信息技术服务有限公司 | Key management method, system and equipment |
CN111723390A (en) * | 2020-06-28 | 2020-09-29 | 天津理工大学 | Commercial data protection method and system based on supply chain management |
CN112468514A (en) * | 2020-12-15 | 2021-03-09 | 天津普泽工程咨询有限责任公司 | System and method for realizing electronic bidding encryption in VPN (virtual private network) |
CN113434904A (en) * | 2021-07-02 | 2021-09-24 | 网易(杭州)网络有限公司 | Data processing method and device, computer equipment and storage medium |
CN113434905A (en) * | 2021-07-05 | 2021-09-24 | 网易(杭州)网络有限公司 | Data sharing method and device, computer equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8561211B1 (en) * | 2001-07-31 | 2013-10-15 | Marvell International Ltd. | System and method for enhanced piracy protection in a wireless personal communication device |
CN103595793A (en) * | 2013-11-13 | 2014-02-19 | 华中科技大学 | Cloud data safe deleting system and method without support of trusted third party |
-
2015
- 2015-10-16 CN CN201510672476.4A patent/CN105227566A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8561211B1 (en) * | 2001-07-31 | 2013-10-15 | Marvell International Ltd. | System and method for enhanced piracy protection in a wireless personal communication device |
CN103595793A (en) * | 2013-11-13 | 2014-02-19 | 华中科技大学 | Cloud data safe deleting system and method without support of trusted third party |
Non-Patent Citations (2)
Title |
---|
LING FANG ZENG 等: "SeDas:A Self-Destructing Data System Based on Active Storage Framework", 《IEEE TRANSACTIONS ON MAGNETICS》 * |
陈世斌: "基于分布式对象存储系统的数据自毁研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107276752A (en) * | 2016-06-27 | 2017-10-20 | 收付宝科技有限公司 | The methods, devices and systems that limitation key is decrypted are paid to cloud |
CN107276752B (en) * | 2016-06-27 | 2020-10-30 | 吕文华 | Method, device and system for decrypting cloud payment restriction key |
CN106161449A (en) * | 2016-07-19 | 2016-11-23 | 青松智慧(北京)科技有限公司 | Transmission method without key authentication and system |
CN106357401A (en) * | 2016-11-11 | 2017-01-25 | 武汉理工大学 | Private key storage method and private key use method |
CN106357401B (en) * | 2016-11-11 | 2019-09-10 | 武汉理工大学 | A kind of storage of private key and application method |
CN106961336B (en) * | 2017-04-18 | 2019-11-26 | 北京百旺信安科技有限公司 | A kind of key components trustship method and system based on SM2 algorithm |
CN106961336A (en) * | 2017-04-18 | 2017-07-18 | 北京百旺信安科技有限公司 | A kind of key components trustship method and system based on SM2 algorithms |
WO2020063354A1 (en) * | 2018-09-28 | 2020-04-02 | 北京金山安全软件有限公司 | Block chain private key storage and recovery method, device and system |
CN109462608A (en) * | 2018-12-19 | 2019-03-12 | 杭州安恒信息技术股份有限公司 | Data encryption processing method, apparatus and system |
CN110069949A (en) * | 2019-04-19 | 2019-07-30 | 浙江鲸腾网络科技有限公司 | A kind of electronic contract signature method, apparatus, equipment and medium |
CN111143863A (en) * | 2019-12-22 | 2020-05-12 | 浪潮电子信息产业股份有限公司 | Data processing method, device, equipment and computer readable storage medium |
CN111245597A (en) * | 2020-01-17 | 2020-06-05 | 众安信息技术服务有限公司 | Key management method, system and equipment |
CN111245597B (en) * | 2020-01-17 | 2023-09-15 | 众安信息技术服务有限公司 | Key management method, system and equipment |
CN111723390A (en) * | 2020-06-28 | 2020-09-29 | 天津理工大学 | Commercial data protection method and system based on supply chain management |
CN111723390B (en) * | 2020-06-28 | 2023-04-07 | 天津理工大学 | Commercial data protection method and system based on supply chain management |
CN112468514A (en) * | 2020-12-15 | 2021-03-09 | 天津普泽工程咨询有限责任公司 | System and method for realizing electronic bidding encryption in VPN (virtual private network) |
CN113434904A (en) * | 2021-07-02 | 2021-09-24 | 网易(杭州)网络有限公司 | Data processing method and device, computer equipment and storage medium |
CN113434905A (en) * | 2021-07-05 | 2021-09-24 | 网易(杭州)网络有限公司 | Data sharing method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105227566A (en) | Cipher key processing method, key handling device and key handling system | |
IL261137A (en) | System and method for performing secure communications | |
US20140355757A1 (en) | Encryption / decryption of data with non-persistent, non-shared passkey | |
CN104158827B (en) | Ciphertext data sharing method, device, inquiry server and upload data client | |
US11316671B2 (en) | Accelerated encryption and decryption of files with shared secret and method therefor | |
CN104506483A (en) | Method for encrypting and decrypting information and managing secret key as well as terminal and network server | |
CN104253694A (en) | Encrypting method for network data transmission | |
CN103414682A (en) | Method for cloud storage of data and system | |
CN104052658A (en) | Privacy protection system and method based on social network | |
CN102891898A (en) | Network bid inviting and bidding system based on cloud storage | |
CN105100115A (en) | Data storage method for privacy protection based on encryption password and data fractionation | |
CN104967693A (en) | Document similarity calculation method facing cloud storage based on fully homomorphic password technology | |
KR101608815B1 (en) | Method and system for providing service encryption in closed type network | |
CN107465665A (en) | A kind of file encryption-decryption method based on fingerprint identification technology | |
CN103607278A (en) | Safe data cloud storage method | |
CN109067517B (en) | Encryption and decryption device, encryption and decryption method and communication method of hidden key | |
CN104270242A (en) | Encryption and decryption device used for network data encryption transmission | |
CN204180095U (en) | A kind of ciphering and deciphering device for network data encryption transmission | |
CN104270380A (en) | End-to-end encryption method and system based on mobile network and communication client side | |
CN105827585A (en) | Re-encryption method, re-encryption system and re-encryption device | |
CN103354637B (en) | A kind of internet-of-things terminal M2M communication encrypting method | |
CN102045343A (en) | DC (Digital Certificate) based communication encrypting safety method, server and system | |
CN110086789A (en) | A kind of method, apparatus, equipment and the medium of data transmission | |
CN103746993A (en) | Cloud storage data encryption method with client-controlled decryption private key and server-performed encryption and decryption | |
CN106257859A (en) | A kind of password using method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160106 |