A Safe and Effective Client Deduplication Method Based on Possession Proof
A client-side, safe technology, applied in the field of communication, can solve problems such as potential safety hazards
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0026] The present invention will be further described below in conjunction with examples.
[0027] This embodiment provides a secure and effective client deduplication protocol based on proof of possession, including:
[0028] Initialization: This protocol includes three subjects, namely the client, the key server and the cloud server; the system initializes the security factor, and the key server selects its own private key and public key for communication with the client; secondly, the cloud server selects its own private key and public key;
[0029] The client interacts with the key server to obtain the encryption key of the file: in order to obtain the encryption key of the uploaded file, the client needs to communicate with the key server; the client first uses the hash function to process the message to be uploaded, and then blindly The key server signs the blinded message with its own private key, and then returns the signature to the client, and the client verifies t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com