A Safe and Effective Client Deduplication Method Based on Possession Proof
A client-side, safe technology, applied in the field of communication, can solve problems such as potential safety hazards
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0026] The present invention will be further described below in conjunction with examples.
[0027] This embodiment provides a secure and effective client deduplication protocol based on proof of possession, including:
[0028] Initialization: This protocol includes three subjects, namely the client, the key server and the cloud server; the system initializes the security factor, and the key server selects its own private key and public key for communication with the client; secondly, the cloud server selects its own private key and public key;
[0029] The client interacts with the key server to obtain the encryption key of the file: in order to obtain the encryption key of the uploaded file, the client needs to communicate with the key server; the client first uses the hash function to process the message to be uploaded, and then blindly The key server signs the blinded message with its own private key, and then returns the signature to the client, and the client verifies t...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com