Method and system for integrated protection of data distributed processing in computer networks
A distributed data and computer system technology, applied in the direction of digital data protection, electronic digital data processing, digital transmission system, etc., can solve problems such as password security, destruction of anonymous identification system, leakage, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] In Fig. 1, the integrated protection system corresponding to the distributed data processing of the exemplary embodiment of the present invention includes: a key certification, generation and distribution center (CCGDK); at least one user equipment 2 and at least one distributed data processing server 3. CCGDK1 (Fig. 2) includes a user certification subsystem 4, a secret key table generation subsystem 5, a data logic security computing system 6, a subsystem 7 for generating media for certified users, a public key generation subsystem 8, Identity verification and data integrity checking subsystem 9 , secure arithmetic processor 10 , key distribution subsystem 11 , and secure processing control unit 12 .
[0036] Each user equipment 2 (Fig. 3) comprises a secret key table generation subsystem 13, an internal random decoder 14, an internal random encoder 15, a subsystem 17 including data input from a data medium and an identity verification and data integrity checker The ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


