http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2013091348-A1
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_83b3cc433802a3bd8599bdbc36a73f41 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_7d7b752e32be4f7551ede055a9f1a4eb http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_8bb531ac161ea927fd276b48f26bc7af |
classificationCPCAdditional | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-76 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0827 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0825 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-062 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0478 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0485 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3073 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0442 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 |
filingDate | 2012-05-22-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_2d3381a1ba2f7ca66269e5b9edebd9c5 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_593eb9880cd4e0907ed197e6b3f2845e |
publicationDate | 2013-06-27-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | WO-2013091348-A1 |
titleOfInvention | Encryption and decryption method based on proxy, network apparatus, network device, and system |
abstract | Disclosed are an encryption and decryption method based on proxy, a network apparatus, a network device, and a system, capable of improving the reliability and security of encrypted file transmission based on proxy. The encryption method comprises: generating proxy keys corresponding to at least two proxy servers respectively according to a private key of a sending end and a public key of a receiving terminal, the number of the proxy keys being equal to the number of the proxy servers; and sending encrypted ciphertext and the proxy keys corresponding to the at least two proxy servers respectively to the at least two proxy servers respectively, so that the at least two proxy servers re-encrypt the encrypted ciphertext according to the corresponding proxy keys respectively. The decryption method comprises: obtaining re-encrypted encrypted ciphertext from at least two proxy servers; performing decryption preprocessing on the re-encrypted encrypted ciphertext from the at least two proxy servers, so as to generate preprocessed ciphertext; and decrypting the preprocessed ciphertext. |
isCitedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-111614670-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-113872969-A |
priorityDate | 2011-12-20-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Predicate | Subject |
---|---|
isDiscussedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID11260 http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID129576893 |
Total number of triples: 25.