Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

124 results about "Keystore" patented technology

A Java KeyStore (JKS) is a repository of security certificates – either authorization certificates or public key certificates – plus corresponding private keys, used for instance in SSL encryption. In IBM WebSphere Application Server and Oracle WebLogic Server, a file with extension jks serves as a keystore.

System, method and device for dynamically encrypting data based on key library

The invention discloses a system, method and device for dynamically encrypting data based on a key library, which can be used in the field of information security, and the system comprises an inter-application server, a key library server, a plurality of channel application servers and terminals interacting with respective channel application servers, wherein the key library server is used for configuring a data encryption rule for data interacting among different channel application servers and data interacting in the same channel application server, and generating a corresponding encryption program and a key file according to the data encryption rule; the inter-application server is used for downloading a corresponding encryption program and the key file from the key library server according to a data processing request of each channel application server, and encrypting or decrypting application data; and the channel application servers are used for downloading the corresponding encryption program and the key file from the key library server according to the data processing request of the terminal, and encrypting or decrypting the application data. According to the invention, the system safety can be improved.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Authentication method for network signaling between quantum safety network equipment

The invention discloses an authentication method for network signaling between quantum safety network equipment. The authentication method includes the following steps: creating synchronous signaling key stores used for signaling authentication for both sides between the communicated network equipment, wherein the synchronous signaling key stores are divided into an encrypting signaling key store and a decrypting signaling key store, and setting a read indicator and a write indicator for each signaling key store; a sending end calculating related hash operation message authentication codes H of keys based on key data and a read indicator offset address of the encrypting signaling key store of the sending end, and sending a corresponding signaling data packet to a receiving end; the receiving end receiving the signaling data packet, acquiring a read indicator offset address in the signaling data packet, and judging whether the key data of the read indicator offset address of the decrypting signaling key store of the receiving end is already used or not; and if the key data is not used, calculating H and verifying the content of the signaling data packet. The authentication method for the network signaling between the quantum safety network equipment has the advantages that the authentication is fast, and the method has a certain preventive effect on distributed denial of service (DDoS) attacks, can achieve true one-time-one-key encrypting authentication and is absolutely safe theoretically.
Owner:SHANDONG INST OF QUANTUM SCI & TECH +2

Searching data

A device or “dongle” (32) is provided for coupling to a Windows-based PC (23). The dongle (32) includes a subscriber identity module (SIM) (15), such as the type used in GSM or UMTS cellular or mobile telecommunications networks. A search engine (40) is accessed by the PC (23) by means of a client application (38) on the PC. The search engine (40) generates a list of search results in response to search criteria in a known manner. Further, the search engine is able to return search results relating to data for which there is restricted access (for example, encrypted data). Such data is identified with a tag which may, for example indicated which users or entities are able to access that data. A user's dongle (32) authenticates that user with the network (3) using a authentication arrangement similar to that employed for authenticating users of a GSM or UMTS mobile telecommunications network. The authenticated identity of the user is communicated to the search engine. The search engine then includes in the search results tagged data items for which the tag indicates that the authenticated user has permission to view. Tagged data items that the authenticated user does not have permission to view are not returned in the search results. Therefore, the user not entitled to view data is not distracted by search results corresponding to data that the user is unable to access. The network (3) may include a key store (51) which stores keys that allow encrypted data items identified by the search engine (40) to be decrypted.
Owner:VODAFONE GRP PLC

Data encryption system and method for interaction between tenants and cloud server memory

The invention discloses a data encryption system and method for interaction between tenants and a cloud server memory, and belongs to the technical field of computer data encryption. In the data encryption system, a control terminal is used for being in communication with the tenants and the cloud server memory, and receiving data file request information of the tenants; a data encryption key is obtained from a key manager, encryption and decryption are conducted on data files in safety board, and data file ciphertext is sent to the cloud server memory, or data file plaintext is transmitted to the tenants; the key manager is used for being in communication with the control terminal, generating the data encryption key, sending the data encryption key to the control terminal and sending the data file request information to a key storage; the key storage is used for safely storing the data file request information sent by the key manager. According to the data encryption system and method for interaction between the tenants and the cloud server memory, safety protection of tenant data is achieved through usage of tenant identifications and a symmetric cryptosystem encryption algorithm, intensity and complexity of key management can be reduced, and isolation of the tenant data is guaranteed.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Algorithm and key library generation and updating method

The invention provides an algorithm and key library generation and updating method, and belongs to the technique of computer network communication and the field of information security. The method comprises the steps of generating an algorithm and key library through configuration of a safe management system, wherein the algorithm and key library is composed of an algorithm serial number, an algorithm, a key serial number, a key and a strategy identifier; calculating an increment factor according to the algorithm and key library and the initial version of the algorithm and key library, and issuing the increment factor to an encryption/decryption server; and generating the new version of the algorithm and key library by the encryption/decryption server through PCode operation according to the increment factor and the initial version of the algorithm and key library. The initial version of the algorithm and key library provided by the method is encrypted and then is stored in a database, the security is high and the storage quantity is high. According to the method, the increment factor can be generated randomly; the algorithm and key library can be updated flexibly; the algorithm and key library is safe and reliable; even if a key is intercepted by an attacker; data information contents will not be leaked; the cracking difficulty is increased; the security of data information transmission and user privacy is improved; and the method is high in popularization and implementation value.
Owner:咪付(深圳)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products