A data encryption, decryption system and method

A data encryption and subsystem technology, applied to the public key and key distribution of secure communication, which can solve problems such as inconvenience of use

Inactive Publication Date: 2008-02-13
农革
View PDF0 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the disadvantages of inconvenient use in the above file encryption application, we combine file encryption, decryption and initial password management through Internet technology in the present invention, so that network users can use file encryption and decryption anytime and anywhere

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption, decryption system and method
  • A data encryption, decryption system and method
  • A data encryption, decryption system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be further elaborated below in conjunction with the accompanying drawings.

[0048] As shown in Figure 1, a data encryption and decryption system includes a client subsystem that accepts user instructions to encrypt and decrypt files, and manages public / private keys, and a client subsystem that accepts job requests, executes The server subsystem that does the job and returns the job result, the client subsystem and the server subsystem communicate data through the Internet. The jobs performed by the server subsystem include the generation, storage, release and management of public / private keys, and the review of the release information of the public key. The server can also make public and private key review requests from different users according to the user's preset settings. Authority control; encrypt the data submitted in the job according to the public key stored in the server by the user; decrypt the data submitted in the job according t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a system and a method that can automatically complete the decryption and encryption of data files via the Internet. The system comprises a client-end subsystem, which performs decryption and encryption by receiving the instructions of client and manages public or private keys, and a server subsystem, which receives job requests from the client-end subsystem, executes jobs and returns job results. A reader first publishes a public key to the server subsystem, and a user symmetrically encrypts a file plaintext by a user-set password Keyl; then the user acquires the public key of reader via the Internet and uses the public key to symmetrically encrypt the password Keyl that is then stored in a file head; after receiving the file of user, the reader first decrypts the ciphertext of the password Keyl in the file head by the private key of reader to acquire the password Keyl, which is then used again to decrypt the cipher text of the file in order to obtain the plaintext. By combining the encryption and decryption of the file and the management of keys with the Internet, the present invention can enable users to conveniently decrypt or encrypt files anytime and anywhere.

Description

technical field [0001] The invention relates to a data encryption and decryption system and method, in particular to a system and method for automatically completing data file encryption and decryption through the Internet. Background technique [0002] The current data encryption methods are mainly divided into two categories: asymmetric and symmetric encryption, and the former is also called public key encryption. Well-known examples of standardized encryption algorithms are RSA public-key asymmetric encryption and AES / DES symmetric encryption, respectively. [0003] An asymmetric public-key encryption system has a pair of public and private keys. The private key is only held by the user himself, while the public key is open to others. Assume that the owner of the private key is user A, and its public and private keys are Xa and Ya, respectively, where the symbols X and Y represent the public key and private key, and the subscript a represents that it belongs to user A. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30
Inventor 农革
Owner 农革
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products