Method, system and device for management, synchronization and backup of data encryption key
A data encryption key and encryption key technology, which is applied in the fields of synchronization and backup, and data encryption key management, can solve problems affecting technical convenience and achieve the effects of convenient sharing, high security, and simple operation steps
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0086] Example 1
[0087] Such as figure 1 As shown, a data encryption key management method according to an embodiment of the present invention includes the following steps:
[0088] Step 110: Generate an encryption key for data encryption on the encryption device;
[0089] Step 120: Store the encryption key in the encryption device and present it in the form of a QR code when viewed by the user;
[0090] Step 130, the encryption device encrypts all stored data using an encryption key to form an encrypted ciphertext;
[0091] Step 140: When the user reads the data, the encryption device uses the generated decryption key to decrypt;
[0092] Step 150: The user reads the data to realize the management of the data encryption key.
[0093] The key used for encryption in this embodiment is a SHA256 key. SHA-256 is a one-way hash algorithm. The plaintext to be transmitted is converted into a message digest through a Hash function operation. Different plaintext corresponds to different message...
Example Embodiment
[0095] Example 2
[0096] Such as figure 2 As shown, the present invention also provides a data encryption key synchronization method, including the following steps:
[0097] Step 210: Generate an encryption key used for data encryption on the encryption device;
[0098] Step 220: Store the encryption key in an encryption device and present it in the form of a QR code when viewed by the user;
[0099] Step 230: The encryption device encrypts all stored data using an encryption key to form an encrypted ciphertext;
[0100] Step 240: Synchronize the encrypted ciphertext to the cloud server;
[0101] Step 250, the reading device downloads the encrypted ciphertext from the cloud server;
[0102] Step 260, the reading device scans the QR code of the encryption key stored on the encryption device to obtain the decryption key;
[0103] Step 270: The reading device uses the decryption key obtained by scanning to decrypt the encrypted ciphertext obtained by the download, so as to realize the synch...
Example Embodiment
[0106] Example 3
[0107] Such as image 3 As shown, the present invention also provides a data encryption key backup method, including the following steps:
[0108] Step 310: Generate an encryption key for data encryption in the encryption device;
[0109] Step 320: Store the encryption key in the encryption device, and present it in the form of a QR code when viewed by the user;
[0110] Step 330: The encryption device encrypts all stored data using an encryption key to form an encrypted ciphertext;
[0111] Step 340: Synchronize the encrypted ciphertext to the cloud server;
[0112] Step 350: Connect the encryption device to the printer, and print the QR code of the encryption key stored on the encryption device; or,
[0113] Send the QR code of the encryption key stored on the encryption device as a picture via email; or,
[0114] Export the electronic version of the QR code of the encryption key stored on the encryption device as a picture or file, and transfer it to a computer or sto...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap