Method, system and apparatus for data ciphering and deciphering

A data encryption, encryption and decryption technology, applied in the field of information security, can solve the problem of low security of stored data, and achieve the effect of avoiding large-scale leakage and improving security.

Active Publication Date: 2011-02-02
深圳市金蝶精斗云网络科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] One of the purposes of the present invention is to provide a data encryption and decryption method, system and equipment, aiming to solve the problem of low security of stored data in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and apparatus for data ciphering and deciphering
  • Method, system and apparatus for data ciphering and deciphering
  • Method, system and apparatus for data ciphering and deciphering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0065] In the process of encrypting data, the present invention generates a series of random numbers for each original text to be encrypted, then generates a primary key based on the password and random numbers, and extracts part of the data from the primary key as an encryption key , and then use the encryption key to encrypt the original text to obtain the primary ciphertext, and finally perform data fusion on the primary ciphertext and random numbers to obtain the final ciphertext. In the process of decrypting data, firstly, the final ciphertext is decomposed according to the password provided b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information security and provides a method for data encryption and decryption, a system and a device thereof. The data encryption method comprises the following steps: A. obtaining an original text to be encrypted and receiving passwords input by users; B. generating random numbers according to the original text, and generating primary keys on the basis of the passwords and random numbers and extracting encrypted keys from the primary keys; C. encrypting the original text with the encrypted keys to obtain a primary cipher-text; D. making data integration of the primary cipher-text and random numbers to obtain a final cipher-text. In addition, a data encryption and decryption system, a data encryption and decryption device and a data decryption method are also provided, which then improves the security of data storage.

Description

technical field [0001] The present invention relates to the field of information security, and more specifically, to a data encryption and decryption method, system and equipment. Background technique [0002] At present, a large number of service providers, such as software-as-a-service (SaaS) providers, usually provide financial, customer relationship management, supply chain management and other software to customers. When a customer uses the services provided by these software, the customer's data needs to be stored in the service provider's public database. If the data is not encrypted, some sensitive data may be leaked. To avoid this from happening, it is necessary to encrypt the data. [0003] There are many existing data encryption methods, including symmetric encryption algorithm, asymmetric encryption algorithm, irreversible encryption algorithm and so on. in: [0004] The symmetric encryption algorithm is an earlier encryption algorithm with mature technology. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/16
Inventor 雷中南
Owner 深圳市金蝶精斗云网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products