Data encryption, decryption and transmission methods and systems

A data encryption and data decryption technology, applied in the field of data security, can solve the problems of easy leakage of keys, high difficulty, and easy cracking by criminals.

Inactive Publication Date: 2016-05-18
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF6 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Today, there are mainly two existing data encryption methods. One is to use symmetric encryption. Although this method can ensure the privacy of the data transmission process, since the client and server use the same key and the client It is public, so that the source key is easy to leak and also easy to be cracked by criminals; second, the use of asymmetric encryption, such as the RSA key generation mechanism, can ensure that the private key is very difficult to crack when the public key is public. Big, but this mechanism also has shortcomings. Although the private key itself is very difficult to reproduce, the result of encrypting data with the public key is generally unique, that is, whenever the same public key is used to encrypt the same data , the obtained encrypted data is the same, which leaves an opportunity for criminals: by encrypting the massive codebook data and the public key, and then using the encrypted data as a standard database, the If the user's encrypted data is searched in the database, the probability of finding the original data is very high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption, decryption and transmission methods and systems
  • Data encryption, decryption and transmission methods and systems
  • Data encryption, decryption and transmission methods and systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] The core of the present invention is to provide a data encryption method, a decryption method, a transmission method and a system, so as to increase the difficulty of deciphering the encrypted data, and further improve the security of the encrypted data.

[0045] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses data encryption, decryption and transmission methods and systems. The data encryption method comprises the steps of: obtaining original data, and generating a random character string; utilizing a preset data mixing rule, mixing the random character string to the original data, and obtaining mixed data; and utilizing a preset encryption algorithm to encrypt the mixed data, obtaining encrypted data, and sending the encrypted data to a receiving end. According to the invention, for either a symmetric encryption mode or an asymmetric encryption mode, dual insurance by the random character string and an encryption key exists, and even if the same secret key is used to encrypt the same original data, different encrypted data is obtained because of the adding of the random character string, so that the decryption difficulty of the encrypted data is enhanced, and the safety of the encrypted data is further improved.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data encryption method, a decryption method, a transmission method and a system. Background technique [0002] At present, with the popularity of remote management methods for high-end servers, it is becoming more and more common to use clients to remotely manage servers. Compared with the general website login authentication mechanism, the server login authentication mechanism has higher security requirements. For example, in the process of direct data transmission between the client and the server, some key data will be leaked in plain text, such as the user name and password of the server administrator. Therefore, encrypted transmission is required. [0003] Today, there are mainly two existing data encryption methods. One is to use symmetric encryption. Although this method can ensure the privacy of the data transmission process, since the client and server use the sa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0668H04L9/0869H04L9/088
Inventor 邵明伍
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products