Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system
    11.
    发明授权
    Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system 有权
    基于代理的加密方法,基于代理的解密方法,网络设备,网络设备和系统

    公开(公告)号:US08873754B2

    公开(公告)日:2014-10-28

    申请号:US13687968

    申请日:2012-11-28

    Inventor: Lei Xu Xiaoxin Wu

    CPC classification number: H04L9/0861 H04L9/0827 H04L9/3073 H04L2209/76

    Abstract: A proxy-based encryption method includes generating, according to a private key of a sending end and a public key of a receiving end, proxy keys that correspond to at least two proxy servers, respectively. The number of the proxy keys is equal to the number of the proxy servers. The method further includes sending encrypted ciphertexts and the proxy keys that correspond to the at least two proxy servers respectively to the at least two proxy servers, respectively, so that the at least two proxy servers re-encrypt the encrypted ciphertexts according to the corresponding proxy keys.

    Abstract translation: 基于代理的加密方法包括根据发送端的私钥和接收端的公开密钥分别生成与至少两个代理服务器对应的代理密钥。 代理密钥的号码等于代理服务器的号码。 该方法还包括分别向至少两个代理服务器发送加密的密文和对应于至少两个代理服务器的代理密钥,使得至少两个代理服务器根据相应的代理对加密的密文重新加密 钥匙

    Method and apparatus for inputting data
    13.
    发明授权
    Method and apparatus for inputting data 有权
    用于输入数据的方法和装置

    公开(公告)号:US09058500B2

    公开(公告)日:2015-06-16

    申请号:US14294700

    申请日:2014-06-03

    Inventor: Xiaoxin Wu Bin Tu

    Abstract: Embodiments of the present invention provide a method and an apparatus for inputting data. The present invention relates to the communications field and aims to improve security of input information. The method includes: acquiring, by a virtual machine manager, input data; performing, by the virtual machine manager, encryption processing on the input data according to an encryption rule of a security connection to obtain encrypted data, where the security connection refers to a connection that is established between an application interface and a server and used for data transmission; and sending, by the virtual machine manager, the encrypted data to the server. The present invention is applicable to a data input scenario.

    Abstract translation: 本发明的实施例提供一种用于输入数据的方法和装置。 本发明涉及通信领域,旨在提高输入信息的安全性。 该方法包括:由虚拟机管理器获取输入数据; 由虚拟机管理器根据安全连接的加密规则执行对输入数据的加密处理以获得加密数据,其中安全连接是指在应用接口和服务器之间建立并用于数据的连接 传输; 并由虚拟机管理器将加密数据发送到服务器。 本发明可应用于数据输入场景。

    METHOD, APPARATUS, TERMINAL, AND SERVER FOR SYNCHRONIZING TERMINAL MIRROR
    14.
    发明申请
    METHOD, APPARATUS, TERMINAL, AND SERVER FOR SYNCHRONIZING TERMINAL MIRROR 有权
    方法,装置,终端和用于同步终端镜的服务器

    公开(公告)号:US20150026293A1

    公开(公告)日:2015-01-22

    申请号:US14318900

    申请日:2014-06-30

    CPC classification number: H04L67/1095 G06F11/1464 G06F11/1484 G06F21/645

    Abstract: A method, an apparatus, a terminal, and a server for synchronizing a terminal mirror are provided. The method includes: obtaining, by a terminal, multiple input events during running of application software; aggregating the multiple input events to obtain an aggregate event; and transmitting the aggregate event to the server, so that after parsing the aggregate event to obtain the multiple input events, the server processes the multiple input events by using a virtual machine that is of the terminal and set on the server, so as to obtain user data generated during the running of the application software. In the present invention, the terminal transmits the input events to the server in an event-driven manner, so that the server obtains the user data that is the same as that on the terminal that runs the application software, thereby ensuring that the server can back up complete user data.

    Abstract translation: 提供了一种用于同步终端镜的方法,装置,终端和服务器。 该方法包括:在运行应用软件期间,由终端获取多个输入事件; 聚合多个输入事件以获得聚合事件; 并且将聚合事件发送到服务器,使得在分析聚合事件以获得多个输入事件之后,服务器通过使用终端并设置在服务器上的虚拟机来处理多个输入事件,以便获得 在应用软件运行期间生成的用户数据。 在本发明中,终端以事件驱动的方式将输入事件发送到服务器,使得服务器获得与运行应用软件的终端上相同的用户数据,从而确保服务器可以 备份完整的用户数据。

    METHOD AND DEVICE FOR RESOURCE MATCHING IN VPC MIGRATION
    15.
    发明申请
    METHOD AND DEVICE FOR RESOURCE MATCHING IN VPC MIGRATION 审中-公开
    用于VPC移动资源匹配的方法和装置

    公开(公告)号:US20140215045A1

    公开(公告)日:2014-07-31

    申请号:US14227649

    申请日:2014-03-27

    CPC classification number: H04L67/10 H04L41/0816

    Abstract: A method for resource matching in virtual private cloud (VPC) migration is provided, including: acquiring a node attribute, a link attribute and an adjacent matrix of a customized network requiring VPC migration according to a VPC migration request, where the node attribute includes a network security device attribute of the customized network; acquiring a node attribute, a link attribute and an adjacent matrix of a cloud network in which the VPC is located, where the adjacent matrices are used for indicating connection relations between any two nodes in the customized network and the cloud network, respectively; obtaining multiple matching resources in the cloud network according to a subgraph isomorphism algorithm, where each of the matching resources matches the node attribute, the link attribute and the adjacent matrix of the customized network; and selecting one of the multiple matching resources as a VPC into which the customized network migrates.

    Abstract translation: 提供了一种虚拟私有云(VPC)迁移中资源匹配的方法,包括:根据VPC迁移请求获取需要VPC迁移的定制网络的节点属性,链路属性和相邻矩阵,其中节点属性包括 定制网络的网络安全设备属性; 获取VPC所在的云网络的节点属性,链路属性和相邻矩阵,其中相邻矩阵分别用于指示定制网络中的任意两个节点与云网络之间的连接关系; 根据子图同构算法在云网中获得多个匹配资源,其中每个匹配资源与定制网络的节点属性,链路属性和相邻矩阵匹配; 并且选择多个匹配资源之一作为自定义网络迁移到的VPC。

    Ciphertext Processing Method, Apparatus, and System
    16.
    发明申请
    Ciphertext Processing Method, Apparatus, and System 审中-公开
    密码处理方法,装置和系统

    公开(公告)号:US20140098960A1

    公开(公告)日:2014-04-10

    申请号:US14104522

    申请日:2013-12-12

    Abstract: Embodiments of the present invention disclose a ciphertext processing method, apparatus, and system. The method includes: selecting a random secret value; calculating a private key according to a partial private key acquired by the local end and the random secret value; calculating a proxy key according to the private key of the local end and a public key publicized by an opposite end, where the public key is calculated by the opposite end according to a random secret value selected by itself and a system public parameter; and sending the proxy key, so that the opposite end acquires a ciphertext obtained after a re-encryption operation is performed, according to the proxy key, on a ciphertext sent by the local end, and performs decryption. Therefore, information security is ensured better and the Public Key Infrastructure (PKI) is avoided, thereby having better extensibility.

    Abstract translation: 本发明的实施例公开了密文处理方法,装置和系统。 该方法包括:选择随机秘密值; 根据由本端获取的部分私钥和随机秘密值计算私钥; 根据本端的私钥计算代理密钥和由相对端公开的公开密钥,根据本身选择的随机密钥值和系统公共参数,公钥由相对端计算; 并发送代理密钥,使得相对端根据代理密钥获取在由本地端发送的密文执行重新加密操作之后获得的密文,并执行解密。 因此,信息安全性得到更好的保障,避免了公钥基础设施(PKI),从而具有更好的可扩展性。

Patent Agency Ranking