Off-line data encryption method and decryption method and corresponding apparatus and system

An encryption device and encryption algorithm technology, applied in the direction of digital data protection, etc., can solve the problems of reducing offline data security, symmetric key leakage, etc., to achieve the effect of reducing leakage and improving security

Inactive Publication Date: 2016-03-30
CHINA CONSTRUCTION BANK
View PDF7 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of this, the present invention provides an encryption method, a decryption method, and corresponding devices and systems for offline data, so as to solve the problem that the method for encrypting and decrypting offline data using a symmetric key in the prior art may easily cause the leakage of the symmetric key, thereby Issues that reduce the security of offline data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Off-line data encryption method and decryption method and corresponding apparatus and system
  • Off-line data encryption method and decryption method and corresponding apparatus and system
  • Off-line data encryption method and decryption method and corresponding apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0068] See figure 1 , Which shows a flowchart of an offline data encryption method provided by the present invention. The method is applied to the encryption terminal and specifically includes:

[0069] Step 101: Generate a symmetric key randomly.

[0070] In this embodiment, when the encryption terminal needs to encrypt data, it first randomly generates a set of symmetric keys.

[0071] In the actual application process of the present invent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an off-line data encryption method and decryption method and a corresponding apparatus and system. The encryption method comprises: randomly generating a symmetric key; performing encryption for plain-text off-line data by using the symmetric key and by using a preset first encryption algorithm, to obtain cipher-text off-line data; performing encryption for the symmetric key by using a public key at a decryption end and by using a preset second encryption algorithm, to obtain an encrypted symmetric key; invoking an interface provided by a USB Key, performing encryption for an abstract of the plain-text off-line data by using a private key at an encryption end and by using a preset third encryption algorithm, to obtain a data abstract signature; and sending the abstract of the plain-text off-line data, the cipher-text off-line data, the data abstract signature, and the encrypted symmetric key to the decryption end. According to the method provided by the present invention, encryption for plain-text off-line data, the symmetric key, and the abstract of the plain-text off-line data is implemented, thereby greatly improving security of off-line data.

Description

Technical field [0001] The present invention relates to the technical field of encryption and decryption, and more specifically, to an encryption method, decryption method, and corresponding device and system for offline data. Background technique [0002] There are data exchanged through non-real-time transmission methods such as email sending and storage media copy between the internal systems of the bank and between the banking system and the external system. These data are called offline data. [0003] In order to ensure the anti-counterfeiting and security of offline data, it is necessary to sign and encrypt offline data in the prior art. Among them, the process of turning plaintext offline data into ciphertext offline data is called an encryption process, and the process of turning ciphertext offline data into plaintext offline data is called a decryption process. [0004] Specifically, in the prior art, a symmetric key is used to encrypt and decrypt offline data. The encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/62
Inventor 闫立志郭汉利张晓东李晓敦李爱宏周玉朋
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products