Encryption method of hierarchical data in hierarchical tree system

A technology of layered data and encryption methods, applied in the field of data processing, can solve the problems of launching decryption keys, affecting the network information security of enterprises and institutions, and high costs, so as to achieve the effect of ensuring security

Active Publication Date: 2012-10-03
INST OF APPLIED MATHEMATICS HEBEI ACADEMY OF SCI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Although any third party intercepts the ciphertext c, since it cannot deduce the decryption key k2 from the public encryption key k1, it cannot recover the plaintext m
[0008] Regardless of whether the asymmetric encryption system or the symmetric encryption system is adopted, it has the disadvantages of difficult key management and distribution management, high cost, and dependence on the CA center, and it is difficult to realize one-to-many file transfer in the system, resulting in high overall use costs. The implementation is difficult, which affects the network information security of enterprises and institutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method of hierarchical data in hierarchical tree system
  • Encryption method of hierarchical data in hierarchical tree system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] figure 1 It is a schematic diagram of a tree-like hierarchical system structure in which the group user G0 is the current user: that is, the level of G0 is the i-th layer, and the group user at the level of writing that has an affiliation relationship with G0 at the i-1 layer is G1, and at the The group users at the writing level who have affiliation relationship with G0 on the i-2 layer are G2, and the group users at the writing level who have an affiliation relationship with G0 on the i-3 layer are G3; G4, G5, G6, etc. are at the i+1th level Group users at the writing level who have affiliation relationship with G0, G7, G8, etc. are group users at the writing level who have affiliation relationship with G0 at the i+2 layer, G9, etc. have affiliation relationship with G0 at the i+3 layer Group users at the writing level, G10, G11, etc. are writing-level users that have a common affiliation with the same layer as G0.

[0038] figure 2 It is a schematic diagram of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method of hierarchical data in a hierarchical tree system, which is used for ensuring the security of information transmission in the system with a hierarchical tree structure. The technical scheme of the invention is that the encryption method comprises the following steps of: firstly, configuring encryption and decryption hardware equipment in the system bya system management center, wherein individual information of the user and feature information of group users are stored in the encryption and decryption hardware equipment; when each user transmits files to other users or group users, encrypting the files by an encryption key generated by the feature information of a target receiver; and when the users receive the transmitted files, decrypting by using a decryption key generated by the feather information, thereby realizing the file transmission various hierarchies in the system. The invention not only can conveniently realize the one-to-oneand one-to-many file transmission, but also ensure the security of the file transmission because an illegal receiver cannot obtain an accurate decryption key.

Description

technical field [0001] The invention relates to a layered data encryption method in a tree-like layered system corresponding to the division of writing levels, belonging to the technical field of data processing. Background technique [0002] In real life, many organizations have a tree-like hierarchical system structure. For example, the military system is divided into army, division, brigade, regiment, battalion, company, and platoon. It is strictly stipulated that subordinates obey their superiors, and superiors can read subordinate documents. Unable to read superior's files. For another example, government agencies, enterprises and public institutions all have similar hierarchical structures. Therefore, it is of great practical significance to study information security issues of this hierarchical structure. [0003] At present, there are two main types of encryption technology products produced by some information security manufacturers at home and abroad, one adopts ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/24G06F21/60
Inventor 胡波程煜黎彤亮崔彦军黄世中刘利军
Owner INST OF APPLIED MATHEMATICS HEBEI ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products