A way to securely distribute torrents
A technology for secure distribution and seeding, applied in the field of information security, can solve problems such as hidden dangers of seed security and software easy to be deciphered
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] In this embodiment, the first device generates a first key, generates a second key based on the first key and derives it, generates a third key based on the first key and derives it, the first device generates seed data, and generates a second key based on the second key. The key and the third key respectively encrypt the seed data to obtain the first seed ciphertext and the second seed ciphertext, distribute the first seed ciphertext to the second device, distribute the second seed ciphertext to the third device, and distribute the second seed ciphertext to the third device. The second device decrypts the first seed ciphertext according to the second key to obtain the seed plaintext, and the third device decrypts the second seed ciphertext according to the third key to obtain the seed plaintext; wherein,
[0046] The first device generates the first key, and the specific method includes:
[0047] When the first device receives several first key synthesis factors input ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


