[go: up one dir, main page]

CN104318168A - Encryption and decryption method and encryption and decryption system for virtual machine image file - Google Patents

Encryption and decryption method and encryption and decryption system for virtual machine image file Download PDF

Info

Publication number
CN104318168A
CN104318168A CN201410494162.5A CN201410494162A CN104318168A CN 104318168 A CN104318168 A CN 104318168A CN 201410494162 A CN201410494162 A CN 201410494162A CN 104318168 A CN104318168 A CN 104318168A
Authority
CN
China
Prior art keywords
cryptographic algorithm
data
system time
image file
virtual machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410494162.5A
Other languages
Chinese (zh)
Other versions
CN104318168B (en
Inventor
杨耀敏
易乐天
周雄峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Yun Chao Science and Technology Ltd.
Original Assignee
Beijing Yun Chao Artery Science And Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yun Chao Artery Science And Technology Ltd filed Critical Beijing Yun Chao Artery Science And Technology Ltd
Priority to CN201410494162.5A priority Critical patent/CN104318168B/en
Publication of CN104318168A publication Critical patent/CN104318168A/en
Application granted granted Critical
Publication of CN104318168B publication Critical patent/CN104318168B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an encryption and decryption method and an encryption and decryption system for a virtual machine image file, and relates to the field of data encryption. The encryption method comprises the following steps: for the virtual machine image file, establishing a one-to-one correspondence relationship between the system time and an encryption algorithm of each datum to form an encryption algorithm combination; receiving each datum to be encrypted, and obtaining corresponding system time; in the encryption algorithm combination, searching according to the obtained system time, and obtaining the encryption algorithm corresponding to each datum to be encrypted; encrypting the data to be encrypted by utilizing the encryption algorithm and a secret key to obtain encrypted data; adding the obtained system time to the back of the encrypted data, and writing all the encryption data into the virtual machine image file. Therefore, even if a hacker obtains the image file and the secret key, the virtual machine image file cannot be decrypted if the complicated encryption algorithm combination cannot be obtained, so that the security of the mirror file is guaranteed.

Description

A kind of encryption of virtual machine image file, decryption method and system
Technical field
The present invention relates to field of data encryption, particularly relate to a kind of encryption of virtual machine image file, decryption method and system.
Background technology
In Intel Virtualization Technology, the image file of virtual machine serves as the role of virtual disk.That is: the operating system of virtual machine, user data are all be kept in image file.In the place high to security request data, need to be encrypted image file.
At present, data all in virtual machine image file are encrypted, decipher and mostly use identical single algorithm.But cryptographic algorithm cans be counted on one's fingers, once hacker obtains image file and key, the data just likely in quick obtaining image file, thus make the data in virtual machine image file there is great potential safety hazard.
Summary of the invention
The object of the present invention is to provide a kind of encryption of virtual machine image file, decryption method and system, thus solve the foregoing problems existed in prior art.
To achieve these goals, the technical solution used in the present invention is as follows:
An encryption method for virtual machine image file, comprises the steps:
S1, to virtual machine image file, sets up the one-to-one relationship between the system time of each data and cryptographic algorithm, forms cryptographic algorithm combination;
S2, receives each be-encrypted data, and obtains corresponding system time;
S3, in described cryptographic algorithm combination, the system time according to getting in step S2 is retrieved, and obtains the cryptographic algorithm that each described be-encrypted data is corresponding;
S4, utilizes be-encrypted data described in described cryptographic algorithm and double secret key to be encrypted, obtains enciphered data;
S5, adds to the system time got in step S2 after described enciphered data, and all described enciphered datas is all write in virtual machine image file.
Preferably, the described system time in step S1 and S2 is all accurate to delicate.
Particularly, in step S1, the described one-to-one relationship set up between the system time of each data and cryptographic algorithm, is specially, by the kind of the system time of described each data divided by described cryptographic algorithm, between the remainder obtained and described cryptographic algorithm, set up one-to-one relationship; In step S3, described in described cryptographic algorithm combination, system time according to getting in step S2 is retrieved, be specially, the system time got in described rapid S2 is divided by the kind of described cryptographic algorithm, obtain remainder, utilize the described remainder obtained as key, retrieval in described cryptographic algorithm combination.
Preferably, in step S4, described key adopts MD5 value.
An encryption system for virtual machine image file, comprising:
Decision-making module: for virtual machine image file, set up the one-to-one relationship between the system time of each data and cryptographic algorithm, forms cryptographic algorithm combination; Also in described cryptographic algorithm combination, the system time got when receiving each be-encrypted data according to encrypting module is retrieved, and obtains the cryptographic algorithm that each described be-encrypted data is corresponding;
Encrypting module: for receiving each be-encrypted data, and obtain corresponding system time; Also for utilizing be-encrypted data described in described cryptographic algorithm and double secret key to be encrypted, obtain enciphered data; Also for the system time got when receiving each be-encrypted data is added to after described enciphered data, and all described enciphered datas are all write in virtual machine image file.
A decryption method for virtual machine image file, comprises the steps:
S1, to virtual machine image file, sets up the one-to-one relationship between the system time of each data and cryptographic algorithm, forms cryptographic algorithm combination;
S2, receives each enciphered data, and system time when obtaining the encryption of described enciphered data;
S3, in described cryptographic algorithm combination, retrieves according to system time during described enciphered data encryption, obtains the cryptographic algorithm that each described enciphered data is corresponding;
S4, obtains the decipherment algorithm that described cryptographic algorithm is corresponding;
S5, utilizes enciphered data described in described decipherment algorithm and double secret key to be decrypted, obtains data decryption.
Preferably, the described system time in step S1 and S2 is all accurate to delicate.
Particularly, in step S1, the described one-to-one relationship set up between the system time of each data and cryptographic algorithm, is specially, by the kind of the system time of described each data divided by described cryptographic algorithm, between the remainder obtained and described cryptographic algorithm, set up one-to-one relationship; In step S3, described in described cryptographic algorithm combination, system time according to getting in step 2 is retrieved, be specially, system time during described enciphered data encryption is divided by the kind of described cryptographic algorithm, obtain remainder, utilize the described remainder obtained as key, retrieval in described cryptographic algorithm combination.
Preferably, in step S5, described key adopts MD5 value.
A decryption system for virtual machine image file, comprising:
Decision-making module: for virtual machine image file, set up the one-to-one relationship between the system time of each enciphered data and cryptographic algorithm, forms cryptographic algorithm combination; Also in described cryptographic algorithm combination, retrieve according to system time during described enciphered data encryption, obtain the cryptographic algorithm that each described enciphered data is corresponding;
Deciphering module: for receiving each enciphered data, and system time when obtaining the encryption of described enciphered data; Also for obtaining decipherment algorithm corresponding to described cryptographic algorithm; Also for utilizing enciphered data described in described decipherment algorithm and double secret key to be decrypted, obtain data decryption.
The invention has the beneficial effects as follows: by setting up one-to-one relationship by between cryptographic algorithm and the system time of each data in the present invention, form complicated cryptographic algorithm combination, and use the combination of the cryptographic algorithm of this complexity to encrypt and decrypt virtual machine image file.Even if thus hacker is got image file and key, if the cryptographic algorithm combination of this complexity cannot be obtained, also cannot be decrypted virtual machine image file, thus ensure that the safety of image file.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the encryption method of the virtual machine image file that the embodiment of the present invention provides;
Fig. 2 is the structural representation of the encryption system of the virtual machine image file that the embodiment of the present invention provides;
Fig. 3 is the schematic flow sheet of the decryption method of the virtual machine image file that the embodiment of the present invention provides;
Fig. 4 is the structural representation of the decryption system of the virtual machine image file that the embodiment of the present invention provides.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with accompanying drawing, the present invention is further elaborated.Should be appreciated that embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
As shown in Figure 1, embodiments provide a kind of encryption method of virtual machine image file, comprise the steps:
S1, to virtual machine image file, sets up the one-to-one relationship between the system time of each data and cryptographic algorithm, forms cryptographic algorithm combination;
S2, receives each be-encrypted data, and obtains corresponding system time;
S3, in described cryptographic algorithm combination, the system time according to getting in step 2 is retrieved, and obtains the cryptographic algorithm that each described be-encrypted data is corresponding;
S4, utilizes be-encrypted data described in described cryptographic algorithm and double secret key to be encrypted, obtains enciphered data;
S5, adds to the system time got in step 2 after described enciphered data, and all described enciphered datas is all write in virtual machine image file.
In the prior art, when all data in virtual machine image file are encrypted, general multiple data can adopt identical algorithm, because the cryptographic algorithm of data is very limited, after hacker obtains the key of enciphered data, be easy to the image file deciphering of will be encrypted by identical algorithms, thus get the data in image file, like this, the potential safety hazard of virtual machine image file is just caused.In the embodiment of the present invention, in order to solve the easily decrypted of the single algorithm for encryption of multiple data acquisition in virtual machine image file, cause the unsafe problem of image file, provide a kind of encryption method, one-to-one relationship is set up by between cryptographic algorithm and the system time of each data, formation cryptographic algorithm combines, in the combination of this cryptographic algorithm, the corresponding cryptographic algorithm of system time of data, owing to there are multiple data in each image file, each data have corresponding system time, the corresponding cryptographic algorithm of each system time, so in same image file, just employ multiple cryptographic algorithm to be encrypted it, and cryptographic algorithm combination can be flexible and changeable, regularly change.So each image file corresponding cryptographic algorithm combination may be not identical yet, thus encryption image file being carried out to multiple encryption algorithms can be realized, and just do not adopt single algorithm, so, after hacker obtains image file and key, with regard to being not easy, the image file by cryptographic algorithm combined ciphering is decrypted, thus gets the data in image file, like this, just ensure that the safety of image file.
Wherein, the described system time in step S1 and S2 is all accurate to delicate.Like this, the quantity of system time can be more, and the cryptographic algorithm combination of formation can be more complicated, and the enciphered data obtained can be difficult to deciphering more.
In the embodiment of the present invention, in step S1, the described one-to-one relationship set up between the system time of each data and cryptographic algorithm, is specially, by the kind of the system time of described each data divided by described cryptographic algorithm, between the remainder obtained and described cryptographic algorithm, set up one-to-one relationship; In step S3, described in described cryptographic algorithm combination, system time according to getting in step 2 is retrieved, be specially, the system time got in described rapid 2 is divided by the kind of described cryptographic algorithm, obtain remainder, utilize the described remainder obtained as key, retrieval in described cryptographic algorithm combination.Utilize according to the system time after certain rule treatments as retrieval key, the cryptographic algorithm that the data that can find this system time fast use, thus the encryption realized fast data, when system time constantly changes, determine to use the speed of which kind of cryptographic algorithm will play important effect to the processing speed of data encryption, and then the operational efficiency of influential system.As will be understood by the skilled person in the art, other rule can also be adopted to process system time, utilize the system time after process as retrieval key.
In the embodiment of the present invention, described key adopts MD5 value.Key is made to be not easy to be cracked.
As shown in Figure 2, another embodiment of the present invention provides a kind of encryption system of virtual machine image file, comprising:
Decision-making module: for virtual machine image file, set up the one-to-one relationship between the system time of each data and cryptographic algorithm, forms cryptographic algorithm combination; Also in described cryptographic algorithm combination, the system time got when receiving each be-encrypted data according to encrypting module is retrieved, and obtains the cryptographic algorithm that each described be-encrypted data is corresponding;
Encrypting module: for receiving each be-encrypted data, and obtain corresponding system time; Also for utilizing be-encrypted data described in described cryptographic algorithm and double secret key to be encrypted, obtain enciphered data; Also for the system time got when receiving each be-encrypted data is added to after described enciphered data, and all described enciphered datas are all write in virtual machine image file.
The encryption system of the virtual machine image file provided in the embodiment of the present invention, for realizing the encryption method of the virtual machine image file that the above embodiment of the present invention provides.
Its specific implementation process is: encrypting module receives the data from virtual machine image file, and obtains system time corresponding to each data; System time is utilized to use which kind of cryptographic algorithm as key data query encryption in decision-making module; Cryptographic algorithm corresponding for key is fed back to encrypting module by decision-making module, after encrypting module gets cryptographic algorithm, utilize these data of double secret key to be encrypted, obtain enciphered data, system time when receiving be-encrypted data is added to after enciphered data, and writes in virtual machine image file.After all data in virtual image file are all encrypted, just complete the encryption to image file.
As shown in Figure 3, embodiments provide a kind of decryption method of virtual machine image file, comprise the steps:
S1, to virtual machine image file, sets up the one-to-one relationship between the system time of each data and cryptographic algorithm, forms cryptographic algorithm combination;
S2, receives each enciphered data, and system time when obtaining enciphered data encryption;
S3, in described cryptographic algorithm combination, retrieves according to system time during described enciphered data encryption, obtains the cryptographic algorithm that each described enciphered data is corresponding;
S4, obtains the decipherment algorithm that described cryptographic algorithm is corresponding;
S5, utilizes enciphered data described in described decipherment algorithm and double secret key to be decrypted, obtains data decryption.
The decryption method of the virtual machine image file that the embodiment of the present invention provides corresponds to the encryption method of the virtual machine image file provided in above-described embodiment, realizes deciphering to the enciphered data that the encryption method adopted in above-described embodiment obtains.
Wherein, the described system time in step S1 and S2 is all accurate to delicate.
In step S1, the described one-to-one relationship set up between the system time of each data and cryptographic algorithm, be specially, by the kind of the system time of described each data divided by described cryptographic algorithm, between the remainder obtained and described cryptographic algorithm, set up one-to-one relationship; In step S3, described in described cryptographic algorithm combination, system time according to getting in step 2 is retrieved, be specially, system time during described enciphered data encryption is divided by the kind of described cryptographic algorithm, obtain remainder, utilize the described remainder obtained as key, retrieval in described cryptographic algorithm combination.
In step S5, described key adopts MD5 value.
As shown in Figure 4, in one embodiment of the invention, provide a kind of decryption system of virtual machine image file, comprising:
Decision-making module: for virtual machine image file, set up the one-to-one relationship between the system time of each data and cryptographic algorithm, forms cryptographic algorithm combination; Also in described cryptographic algorithm combination, retrieve according to system time during described enciphered data encryption, obtain the cryptographic algorithm that each described enciphered data is corresponding;
Deciphering module: for receiving each enciphered data, and system time when obtaining enciphered data encryption; Also for obtaining decipherment algorithm corresponding to described cryptographic algorithm; Also for utilizing enciphered data described in described decipherment algorithm and double secret key to be decrypted, obtain data decryption.
The decryption system of the virtual machine image file provided in the embodiment of the present invention, for realizing the decryption method of the virtual machine image file that the above embodiment of the present invention provides.
Its specific implementation process is: deciphering module receives the enciphered data from virtual machine image file, and obtains system time corresponding to each enciphered data; The cryptographic algorithm used when utilizing system time to inquire about enciphered data encryption as key in decision-making module; Cryptographic algorithm corresponding for key is fed back to deciphering module by decision-making module, after deciphering module gets cryptographic algorithm, utilizes key and decipherment algorithm corresponding to cryptographic algorithm to be decrypted enciphered data, obtains data decryption.After all enciphered datas in virtual image file are all deciphered, just complete the deciphering to image file.
By adopting technique scheme disclosed by the invention, obtain effect useful as follows: in the embodiment of the present invention, one-to-one relationship is set up by between cryptographic algorithm and the system time of each data, formation cryptographic algorithm combines, in the combination of this cryptographic algorithm, the corresponding cryptographic algorithm of system time of data, owing to there are multiple data in each image file, each data have corresponding system time, the corresponding cryptographic algorithm of each system time, so in same image file, just employ multiple cryptographic algorithm to be encrypted it, and cryptographic algorithm combination can be flexible and changeable, regularly change.So each image file corresponding cryptographic algorithm combination may be not identical yet, thus encryption image file being carried out to multiple encryption algorithms can be realized, and just do not adopt single algorithm, so, after hacker obtains image file and key, with regard to being not easy, the image file by encrypting in algorithm combination is decrypted, thus gets the data in image file, like this, just ensure that the safety of image file.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.
Those skilled in the art it should be understood that the sequential of the method step that above-described embodiment provides can carry out accommodation according to actual conditions, also can carry out according to actual conditions are concurrent.
The hardware that all or part of step in the method that above-described embodiment relates to can carry out instruction relevant by program has come, described program can be stored in the storage medium that computer equipment can read, for performing all or part of step described in the various embodiments described above method.Described computer equipment, such as: personal computer, server, the network equipment, intelligent mobile terminal, intelligent home device, wearable intelligent equipment, vehicle intelligent equipment etc.; Described storage medium, such as: the storage of RAM, ROM, magnetic disc, tape, CD, flash memory, USB flash disk, portable hard drive, storage card, memory stick, the webserver, network cloud storage etc.
Finally, also it should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, commodity or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, commodity or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, commodity or the equipment comprising described key element and also there is other identical element.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should look protection scope of the present invention.

Claims (10)

1. an encryption method for virtual machine image file, is characterized in that, comprises the steps:
S1, to virtual machine image file, sets up the one-to-one relationship between the system time of each data and cryptographic algorithm, forms cryptographic algorithm combination;
S2, receives each be-encrypted data, and obtains corresponding system time;
S3, in described cryptographic algorithm combination, the system time according to getting in step S2 is retrieved, and obtains the cryptographic algorithm that each described be-encrypted data is corresponding;
S4, utilizes be-encrypted data described in described cryptographic algorithm and double secret key to be encrypted, obtains enciphered data;
S5, adds to the system time got in step S2 after described enciphered data, and all described enciphered datas is all write in virtual machine image file.
2. the encryption method of virtual machine image file according to claim 1, is characterized in that, the described system time in step S1 and S2 is all accurate to delicate.
3. the encryption method of virtual machine image file according to claim 1, it is characterized in that, in step S1, the described one-to-one relationship set up between the system time of each data and cryptographic algorithm, be specially, by the kind of the system time of described each data divided by described cryptographic algorithm, between the remainder obtained and described cryptographic algorithm, set up one-to-one relationship; In step S3, described in described cryptographic algorithm combination, system time according to getting in step S2 is retrieved, be specially, the system time got in described rapid S2 is divided by the kind of described cryptographic algorithm, obtain remainder, utilize the described remainder obtained as key, retrieval in described cryptographic algorithm combination.
4. the encryption method of virtual machine image file according to claim 1, is characterized in that, in step S4, described key adopts MD5 value.
5. an encryption system for virtual machine image file, is characterized in that, comprising:
Decision-making module: for virtual machine image file, set up the one-to-one relationship between the system time of each data and cryptographic algorithm, forms cryptographic algorithm combination; Also in described cryptographic algorithm combination, the system time got when receiving each be-encrypted data according to encrypting module is retrieved, and obtains the cryptographic algorithm that each described be-encrypted data is corresponding;
Encrypting module: for receiving each be-encrypted data, and obtain corresponding system time; Also for utilizing be-encrypted data described in described cryptographic algorithm and double secret key to be encrypted, obtain enciphered data; Also for the system time got when receiving each be-encrypted data is added to after described enciphered data, and all described enciphered datas are all write in virtual machine image file.
6. a decryption method for virtual machine image file, is characterized in that, comprises the steps:
S1, to virtual machine image file, sets up the one-to-one relationship between the system time of each data and cryptographic algorithm, forms cryptographic algorithm combination;
S2, receives each enciphered data, and system time when obtaining the encryption of described enciphered data;
S3, in described cryptographic algorithm combination, retrieves according to system time during described enciphered data encryption, obtains the cryptographic algorithm that each described enciphered data is corresponding;
S4, obtains the decipherment algorithm that described cryptographic algorithm is corresponding;
S5, utilizes enciphered data described in described decipherment algorithm and double secret key to be decrypted, obtains data decryption.
7. the decryption method of virtual machine image file according to claim 5, is characterized in that, the described system time in step S1 and S2 is all accurate to delicate.
8. the decryption method of virtual machine image file according to claim 5, it is characterized in that, in step S1, the described one-to-one relationship set up between the system time of each data and cryptographic algorithm, be specially, by the kind of the system time of described each data divided by described cryptographic algorithm, between the remainder obtained and described cryptographic algorithm, set up one-to-one relationship; In step S3, described in described cryptographic algorithm combination, system time according to getting in step 2 is retrieved, be specially, system time during described enciphered data encryption is divided by the kind of described cryptographic algorithm, obtain remainder, utilize the described remainder obtained as key, retrieval in described cryptographic algorithm combination.
9. the decryption method of virtual machine image file according to claim 5, is characterized in that, in step S5, described key adopts MD5 value.
10. a decryption system for virtual machine image file, is characterized in that, comprising:
Decision-making module: for virtual machine image file, set up the one-to-one relationship between the system time of each enciphered data and cryptographic algorithm, forms cryptographic algorithm combination; Also in described cryptographic algorithm combination, retrieve according to system time during described enciphered data encryption, obtain the cryptographic algorithm that each described enciphered data is corresponding;
Deciphering module: for receiving each enciphered data, and system time when obtaining the encryption of described enciphered data; Also for obtaining decipherment algorithm corresponding to described cryptographic algorithm; Also for utilizing enciphered data described in described decipherment algorithm and double secret key to be decrypted, obtain data decryption.
CN201410494162.5A 2014-09-24 2014-09-24 The encryption and decryption method and system of a kind of virtual machine image file Expired - Fee Related CN104318168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410494162.5A CN104318168B (en) 2014-09-24 2014-09-24 The encryption and decryption method and system of a kind of virtual machine image file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410494162.5A CN104318168B (en) 2014-09-24 2014-09-24 The encryption and decryption method and system of a kind of virtual machine image file

Publications (2)

Publication Number Publication Date
CN104318168A true CN104318168A (en) 2015-01-28
CN104318168B CN104318168B (en) 2017-07-11

Family

ID=52373399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410494162.5A Expired - Fee Related CN104318168B (en) 2014-09-24 2014-09-24 The encryption and decryption method and system of a kind of virtual machine image file

Country Status (1)

Country Link
CN (1) CN104318168B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453300A (en) * 2016-09-30 2017-02-22 北京悦畅科技有限公司 Data encryption and decryption method and device, and data transmission system
CN106658061A (en) * 2016-12-06 2017-05-10 讯美科技股份有限公司 Video data security encryption transmission method and system
CN107169373A (en) * 2017-05-11 2017-09-15 山东超越数控电子有限公司 A kind of virtual machine image file guard method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030005284A1 (en) * 2000-01-18 2003-01-02 Martin Euchner Method, system for transmitting data from a transmitter to a receiver and transmitter or receiver
CN1550083A (en) * 2001-08-30 2004-11-24 Method for encrypting and decrypting communication data
CN1972237A (en) * 2006-12-06 2007-05-30 胡祥义 VPN system based on dynamic encryption algorithm
CN102025744A (en) * 2010-12-20 2011-04-20 北京世纪互联工程技术服务有限公司 Import and export system of virtual machine image in cloud computing
CN102447698A (en) * 2011-11-29 2012-05-09 数字金融服务(杭州)有限公司 Network communication information encryption transmission method
CN102968595A (en) * 2012-12-20 2013-03-13 曙光云计算技术有限公司 Method and device for protecting virtual machine system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030005284A1 (en) * 2000-01-18 2003-01-02 Martin Euchner Method, system for transmitting data from a transmitter to a receiver and transmitter or receiver
CN1550083A (en) * 2001-08-30 2004-11-24 Method for encrypting and decrypting communication data
CN1972237A (en) * 2006-12-06 2007-05-30 胡祥义 VPN system based on dynamic encryption algorithm
CN102025744A (en) * 2010-12-20 2011-04-20 北京世纪互联工程技术服务有限公司 Import and export system of virtual machine image in cloud computing
CN102447698A (en) * 2011-11-29 2012-05-09 数字金融服务(杭州)有限公司 Network communication information encryption transmission method
CN102968595A (en) * 2012-12-20 2013-03-13 曙光云计算技术有限公司 Method and device for protecting virtual machine system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453300A (en) * 2016-09-30 2017-02-22 北京悦畅科技有限公司 Data encryption and decryption method and device, and data transmission system
CN106658061A (en) * 2016-12-06 2017-05-10 讯美科技股份有限公司 Video data security encryption transmission method and system
CN107169373A (en) * 2017-05-11 2017-09-15 山东超越数控电子有限公司 A kind of virtual machine image file guard method and system

Also Published As

Publication number Publication date
CN104318168B (en) 2017-07-11

Similar Documents

Publication Publication Date Title
CN102006300B (en) Method, device and system for encrypting cloud storage data
CN101311942B (en) Method and device for encrypting and decrypting software
US9602280B2 (en) System and method for content encryption in a key/value store
US20190340381A1 (en) Method and System for Search Pattern Oblivious Dynamic Symmetric Searchable Encryption
TW201926111A (en) Method and apparatus for encrypting and decrypting product information
CN103049466B (en) A kind of text searching method based on distributed cryptograph storage and system
CN105635144B (en) Data processing method based on cloud platform server and system
JP2020513183A (en) Data tokenization
CN114491637B (en) Data query method, device, computer equipment and storage medium
CN106127075A (en) The encryption method of can search for based on secret protection under a kind of cloud storage environment
WO2024077948A1 (en) Private query method, apparatus and system, and storage medium
CN105450620A (en) Information processing method and device
CN105468940B (en) Method for protecting software and device
US20130185569A1 (en) Data protection system and method based on cloud storage
US20170085540A1 (en) Secure data re-encryption
JP2020535693A (en) Storage data encryption / decryption device and method
CN104424016A (en) Virtual bands concentration for self encrypting drives
CN101488110A (en) Memory encryption method, apparatus and system
CN102811212A (en) Data encryption method with repetitive data deleting function and system thereof
TW202008744A (en) Dynamic cryptographic key expansion
CN110457945A (en) Method, inquiry method, apparatus, service method, apparatus and the storage medium of list inquiry
CN105117635A (en) Local data security protection system and method
US20180165470A1 (en) Secure Database
CN104063672A (en) Data security storage method
US20110107109A1 (en) Storage system and method for managing data security thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170620

Address after: Room 1302, block B, building 1068, Jincheng Road, Jincheng Road, Xiaoshan District, Zhejiang, Hangzhou, 311200

Applicant after: Zhejiang Yun Chao Science and Technology Ltd.

Address before: 100091, room 402, building 1, Wan Lin Building, No. 88, Nongda South Road, Beijing, Haidian District

Applicant before: Beijing Yun Chao artery Science and Technology Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170711

Termination date: 20170924

CF01 Termination of patent right due to non-payment of annual fee