A Distributed Encryption Storage and Authentication Method Based on Local Area Network

An encrypted storage and distributed technology, applied in the field of information security, can solve problems such as adverse user privacy, economic loss, user information leakage, etc., to achieve the effect of taking into account security and timeliness, not easy to decipher, and avoid information leakage

Active Publication Date: 2018-12-04
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With this method, on the one hand, the attacker can easily determine the encryption method based on the encrypted field information, and crack it by hitting the library; on the other hand, since the sensitive information is stored in a centralized manner, once the database server is If compromised, all user information will be leaked, which is not conducive to the protection of user privacy, and may cause huge economic losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Distributed Encryption Storage and Authentication Method Based on Local Area Network
  • A Distributed Encryption Storage and Authentication Method Based on Local Area Network
  • A Distributed Encryption Storage and Authentication Method Based on Local Area Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0030] Encryption and authentication method of the present invention is mainly realized based on local area network, as figure 1 As shown, the client is in the general environment of the Internet, and is connected to the proxy server of the external network by signal, and the proxy server of the external network is connected to the application server by signal, so as to realize the transmission of information from the Internet to the LAN, and the application server transmits the information to the distributed management server , after being processed by the distributed management server (segmentation and weighting), and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed encrypted storage and authentication method based on a local area network. The encrypted storage method disclosed by the invention comprises the steps that a distributed management module segments information according to a certain rule, generates a random code based on each segment, carries out weighted confusion based on the segment information, a segment number and the generated random code, and randomly releases the obtained information to a database storage server; and an encryption module encrypts segmented weighting information in a random encryption mode, and then stores the segmented weighting information in a database by a storage module. The authentication method disclosed by the invention is used for carrying out authentication based on the encrypted storage method, and the principle of the authentication method is to carry out segmented encryption on the information again, and then compare the information with actually stored information to judge whether the authentication is successful. The distributed encrypted storage and authentication method disclosed by the invention has the beneficial effects that sensitive information of a user can be effectively stored in a distributed encrypted storage mode to avoid the leakage of all information resulting from the capture of a single storage server.

Description

technical field [0001] The embodiment of the present invention relates to the encrypted storage technology and the corresponding authentication technology of user privacy information in Internet services, which belongs to the field of information security. More specifically, the embodiment of the present invention relates to a distributed encrypted storage and authentication based on a local area network method. Background technique [0002] With the advent of the "Internet +" era, various Internet services have sprung up like mushrooms. At the same time, the rapid development of new-generation information and communication technologies such as the Internet of Things, cloud computing, big data, and mobile Internet has made Internet information security issues increasingly serious. It has been highlighted that network attacks, illegal intrusions, and hanging horses have shown a trend of rapid growth every year, especially black industry chains such as account hacking and user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0464H04L63/0815H04L63/0838H04L63/20
Inventor 涂霖
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products