Safe method for repeated data deleting
A data deduplication and security technology, applied in encryption devices with shift registers/memory, electrical components, transmission systems, etc., can solve problems such as user data leakage, cannot prevent cloud storage service providers from leaking files, etc., to ensure security sexual effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] The technical solutions of the present invention will be further described in detail below in conjunction with the accompanying drawings and examples.
[0018] Such as figure 1 As shown, the present invention includes: the client encrypts the file to be stored into ciphertext using the same key and different encryption algorithms; the server first judges whether the file has been stored by the hash value of the file; The file is decrypted to get the key, and then encrypted with another encryption algorithm; the server judges whether to perform deduplication by comparing the file with the same encryption algorithm twice encrypted.
[0019] Such as figure 2 As shown, the present invention encrypts files at the client end. When the user uploads a file to the server for the first time, the client first randomly selects an AES key τ, and then generates two ciphertext files. The first ciphertext file C F The file F is encrypted with the key τ using the AES encryption alg...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com