Method and system for intercepting, encrypting and decrypting data

A data interception, encryption and decryption technology, which is applied in the fields of data interception, encryption and decryption and systems, can solve problems such as being difficult to rest assured, and achieve the effect of strong security

Active Publication Date: 2014-04-02
SHANGHAI CHRUST INFORMATION TECH
View PDF9 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these transmission and storage security mechanisms are provided by cloud service providers, and even the most critical encryption keys may be kept by cloud service providers. This kind of security solution provided by external network service providers is difficult to make Intranet users really feel at ease

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for intercepting, encrypting and decrypting data
  • Method and system for intercepting, encrypting and decrypting data
  • Method and system for intercepting, encrypting and decrypting data

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0038] See figure 1 , The first embodiment of the method for intercepting and encrypting uplink data of this application includes the following steps:

[0039] Step a1, intercept the data packet sent from the client to the server;

[0040] Step a2, find the data item that needs to be encrypted from the intercepted data packet, that is, the original data item; if no original data item is found, send the intercepted data packet directly to the server; if one or more original data are found Item, go to step a3;

[0041] Step a3, for each original data item, encrypt the original data item as a label value; add prefix and suffix before and after each label value to form a label; replace each original data with each label item;

[0042] The intercepted data packet usually consists of two parts: the data item that needs to be encrypted (original data item) and the data item that does not need to be encrypted; after all the original data items in the intercepted data packet are replaced with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for intercepting, encrypting and decrypting data. When the data is transmitted from a client to a server, the sensitive data is encrypted and then leaves off an intranet. When the data is transmitted from the server to the client, the data enters the intranet, and the encrypted data is decrypted so as to obtain the sensitive data. The invention also discloses a system for intercepting, encrypting and decrypting the data. The method and the system have the advantages that the protection, management and control requirements of applicable intranet users on the sensitive data in the governments, enterprises and the like can be ensured, and the safety is higher.

Description

Technical field [0001] This application relates to a method for intercepting sensitive data and encrypting sensitive data during the data transmission process from the internal network to the external network; and correspondingly, during the data transmission process from the external network to the internal network, A method of decrypting encrypted data into sensitive data after entering the intranet. Background technique [0002] Intranet refers to a proprietary computer network constructed by governments, enterprises, or other institutions. Extranet refers to a public computer network, namely the Internet. Information exchanges in modern society are becoming more frequent, and two-way transmission of data between internal and external networks is very common. Taking cloud computing services as an example, users will store a large amount of data in the cloud. How to ensure the data in the transmission process and the security of the data stored in the cloud are issues of grea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/28
Inventor 顾青谢超梁佐泉田文晋赵艳红胡凯冯四风王宁宁贾伟峰倪庆洋梁艳敏
Owner SHANGHAI CHRUST INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products