User data encryption method and device

A technology of user data and encryption method, applied in the direction of user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of low security, leakage of user data, cracking of original data, etc., to improve the difficulty of decryption, improve safety effect

Inactive Publication Date: 2014-05-14
BEIJING KINGSOFT NETWORK TECH
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there is a problem with the above data encryption method: if the server is hacked, the encrypted user data may be leaked, so that the user's original data may be cracked, and the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User data encryption method and device
  • User data encryption method and device
  • User data encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0041] Hereinafter, the present invention will be described in detail through specific embodiments.

[0042] figure 1 It is a schematic flowchart of a method for encrypting user data provided by an embodiment of the present invention, including:

[0043] S101: Obtain user data to be encrypted;

[0044] Exemplarily, in the embodiment of the present invention, it is assumed that the user data to be encrypted is: password.

[0045] S102: Use the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a user data encryption method and device. The method comprises the steps of acquiring user data to be encrypted, using a first secret key set for encrypting the user data to obtain the encrypted user data, using a second secret key set for encrypting secret keys in the first secret key set to obtain the encrypted first secret key set, updating the encrypted user data to a server to be stored, storing the encrypted first secret key set locally, and deleting the first secret key set. The user data encryption method and device are used, even though a hacker obtains the encrypted user data and the encrypted first secrete key set, the encrypted user data can not be decrypted through the encrypted first secrete key set to obtain original user data, the decryption difficulty of the user data is improved, and therefore the safety of the user data is improved.

Description

Technical field [0001] The invention relates to the field of computer security, in particular to a method and device for encrypting user data. Background technique [0002] With the development of the Internet, there are more and more data on user accounts and passwords on various shopping websites, social networks, mailboxes, etc. In order to prevent users’ data from being easily stolen and ensure data security, a reliable method Yes: Encrypt user data, and process the original plaintext data according to a certain encryption algorithm to make it a piece of code with no specific meaning. [0003] In the prior art, a commonly used data encryption method is to use a key to encrypt user data, upload the encrypted user data to a server, and save the key locally. [0004] However, the above-mentioned data encryption method has a problem: if the server is attacked by a hacker, the encrypted user data may be leaked, so that the user's original data may be cracked, and the security is low....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 王哲傅盛孙明焱
Owner BEIJING KINGSOFT NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products