Method, system and device for management, synchronization and backup of data encryption key

A data encryption key and encryption key technology, which is applied in the fields of synchronization and backup, and data encryption key management, can solve problems affecting technical convenience and achieve the effects of convenient sharing, high security, and simple operation steps

Inactive Publication Date: 2015-12-30
BEIJING STONE SHIELD TECH
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Photos taken on mobile phones, edited documents, and recorded audio and video data can be easily synchronized to computers or other electronic devi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for management, synchronization and backup of data encryption key
  • Method, system and device for management, synchronization and backup of data encryption key
  • Method, system and device for management, synchronization and backup of data encryption key

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0086] Example 1

[0087] Such as figure 1 As shown, a data encryption key management method according to an embodiment of the present invention includes the following steps:

[0088] Step 110: Generate an encryption key for data encryption on the encryption device;

[0089] Step 120: Store the encryption key in the encryption device and present it in the form of a QR code when viewed by the user;

[0090] Step 130, the encryption device encrypts all stored data using an encryption key to form an encrypted ciphertext;

[0091] Step 140: When the user reads the data, the encryption device uses the generated decryption key to decrypt;

[0092] Step 150: The user reads the data to realize the management of the data encryption key.

[0093] The key used for encryption in this embodiment is a SHA256 key. SHA-256 is a one-way hash algorithm. The plaintext to be transmitted is converted into a message digest through a Hash function operation. Different plaintext corresponds to different message...

Example Embodiment

[0095] Example 2

[0096] Such as figure 2 As shown, the present invention also provides a data encryption key synchronization method, including the following steps:

[0097] Step 210: Generate an encryption key used for data encryption on the encryption device;

[0098] Step 220: Store the encryption key in an encryption device and present it in the form of a QR code when viewed by the user;

[0099] Step 230: The encryption device encrypts all stored data using an encryption key to form an encrypted ciphertext;

[0100] Step 240: Synchronize the encrypted ciphertext to the cloud server;

[0101] Step 250, the reading device downloads the encrypted ciphertext from the cloud server;

[0102] Step 260, the reading device scans the QR code of the encryption key stored on the encryption device to obtain the decryption key;

[0103] Step 270: The reading device uses the decryption key obtained by scanning to decrypt the encrypted ciphertext obtained by the download, so as to realize the synch...

Example Embodiment

[0106] Example 3

[0107] Such as image 3 As shown, the present invention also provides a data encryption key backup method, including the following steps:

[0108] Step 310: Generate an encryption key for data encryption in the encryption device;

[0109] Step 320: Store the encryption key in the encryption device, and present it in the form of a QR code when viewed by the user;

[0110] Step 330: The encryption device encrypts all stored data using an encryption key to form an encrypted ciphertext;

[0111] Step 340: Synchronize the encrypted ciphertext to the cloud server;

[0112] Step 350: Connect the encryption device to the printer, and print the QR code of the encryption key stored on the encryption device; or,

[0113] Send the QR code of the encryption key stored on the encryption device as a picture via email; or,

[0114] Export the electronic version of the QR code of the encryption key stored on the encryption device as a picture or file, and transfer it to a computer or sto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for management, synchronization and backup of a data encryption key. The method comprises the steps that an encryption key of data is generated through encryption equipment and presented in the mode of a two-dimensional code, the encryption equipment processes the data by using a stored key, acquired ciphertext data is uploaded to a cloud server so as to realize sharing of the ciphertext data, and reading equipment requiring to carry out decryption on the data acquires a decryption key of the encrypted data through scanning the two-dimensional code of the encryption key in the encryption equipment and carries out decryption on the data. The invention further relates to a system for management, synchronization and backup of the data encryption key. Simple key management is realized through scanning the two-dimensional code. The invention also relates to a device for management, synchronization and backup of the data encryption key, which comprises the encryption equipment, and reading equipment and the cloud server. The method, the system and the device disclosed by the invention have the beneficial effects of simple operation, high safety, and abilities of realizing shared key management among multiple devices and printing backup of key files, and preventing problems such that the files cannot be opened because of loss of the key and the like.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a data encryption key management, synchronization and backup method, system and device based on two-dimensional code representation. Background technique [0002] At present, the Internet has been fully integrated into our daily life. People come into contact with the Internet every day, and the login passwords of various Internet services and software are very important to us, and the consequences of password theft will be very serious. In order to prevent serious password leaks caused by the same account password on multiple applications, many people will set multiple different passwords for different websites and software. Although this solves certain security problems, it also brings a lot of trouble to memory. Big burden. Hence, there is an increasing demand for password management tools. [0003] There are many ways to manage passwords. The most comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 韩晟王盈徐菲张健李勇杨宏伟
Owner BEIJING STONE SHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products