http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2013091348-A1

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_83b3cc433802a3bd8599bdbc36a73f41
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_7d7b752e32be4f7551ede055a9f1a4eb
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_8bb531ac161ea927fd276b48f26bc7af
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-76
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0827
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0825
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-062
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0478
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0485
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3073
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0442
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00
filingDate 2012-05-22-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_2d3381a1ba2f7ca66269e5b9edebd9c5
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_593eb9880cd4e0907ed197e6b3f2845e
publicationDate 2013-06-27-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2013091348-A1
titleOfInvention Encryption and decryption method based on proxy, network apparatus, network device, and system
abstract Disclosed are an encryption and decryption method based on proxy, a network apparatus, a network device, and a system, capable of improving the reliability and security of encrypted file transmission based on proxy. The encryption method comprises: generating proxy keys corresponding to at least two proxy servers respectively according to a private key of a sending end and a public key of a receiving terminal, the number of the proxy keys being equal to the number of the proxy servers; and sending encrypted ciphertext and the proxy keys corresponding to the at least two proxy servers respectively to the at least two proxy servers respectively, so that the at least two proxy servers re-encrypt the encrypted ciphertext according to the corresponding proxy keys respectively. The decryption method comprises: obtaining re-encrypted encrypted ciphertext from at least two proxy servers; performing decryption preprocessing on the re-encrypted encrypted ciphertext from the at least two proxy servers, so as to generate preprocessed ciphertext; and decrypting the preprocessed ciphertext.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-111614670-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-113872969-A
priorityDate 2011-12-20-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID11260
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID129576893

Total number of triples: 25.