Business encryption/decryption method and device

An encryption method and business technology, applied in the computer field, can solve problems such as low key security

Active Publication Date: 2017-01-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides a service encryption and decryption method and device, so as to at least solve the technical problem in the prior art that the security of the key is low when encrypting the service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business encryption/decryption method and device
  • Business encryption/decryption method and device
  • Business encryption/decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] According to an embodiment of the present invention, an embodiment of a service encryption method is provided.

[0026] Optionally, in this embodiment, the above service encryption method can be applied to figure 1 In the hardware environment constituted by the server 102 and the terminal 104 as shown. Such as figure 1 As shown, the server 102 is connected to the terminal 104 through a network. The above-mentioned network includes but not limited to: a wide area network, a metropolitan area network or a local area network. The terminal 104 is not limited to a PC, a mobile phone, a tablet computer, and the like. The service encryption method in the embodiment of the present invention may be executed by the server 102, may also be executed by the terminal 104, and may also be executed jointly by the server 102 and the terminal 104. Wherein, the service encryption method of the embodiment of the present invention executed by the terminal 104 may also be executed by a cli...

Embodiment 2

[0166] According to an embodiment of the present invention, a service encryption device for implementing the above service encryption method is also provided. Image 6 is a schematic diagram of an optional service encryption device according to an embodiment of the present invention, such as Image 6 As shown, the device may include: a first receiving unit 601, a first obtaining unit 603, a first encrypting unit 605, and a first sending unit 607, wherein:

[0167] The first receiving unit 601 is set in the key agent module and is used for receiving the encryption request sent by the service module, wherein the encryption request carries the data to be encrypted.

[0168] The first acquiring unit 603 is arranged in the key agent module, and is used to acquire the target key from a key list, wherein the key list is pre-pulled from the key server.

[0169] The first encryption unit 605 is set in the key agent module, and is used to encrypt the data to be encrypted using the targ...

Embodiment 3

[0202] According to an embodiment of the present invention, a server or terminal for implementing the above service encryption (or service decryption) method is also provided.

[0203] Figure 8 is a structural block diagram of a terminal according to an embodiment of the present invention, such as Figure 8 As shown, the terminal may include: one or more (only one is shown in the figure) processor 801 (such as the key proxy module in the above embodiment), memory 803, and transmission device 805 (such as the key agent module in the above embodiment) sending device), such as Figure 8 As shown, the terminal may also include an input and output device 807 .

[0204] Among them, the memory 803 can be used to store software programs and modules, such as the program instructions / modules corresponding to the service encryption (or service decryption) method and device in the embodiment of the present invention, and the processor 801 runs the software programs and modules stored i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a business encryption / decryption method and a device. The method comprises steps that an encryption request sent by a business module is received by a secret key agent module, and the encryption request contains the to-be-encrypted data; a target secret key is acquired from a secret key list by the secret key agent module, and the secret key list is acquired from a secret key server in advance; the to-be-encrypted data is encrypted by the secret key agent module through utilizing the target secret key to acquire the encrypted data; the encrypted data is sent by the secret key agent module to the business module. Through the method, a technical problem of relatively low security of secret keys during business encryption in the prior art is solved.

Description

technical field [0001] The present invention relates to the computer field, in particular to a service encryption and decryption method and device. Background technique [0002] In the prior art, when encrypting services, the encryption methods used mainly include three types: method 1, directly writing a fixed key in the code or configuration file; method 2, directly saving it in plain text in the shared memory or The key is stored in an encrypted way; the third way is that the key is stored on a server managed by a special manager, and the business can periodically call and obtain the key from the server through the network. [0003] For the above method 1, in general, resources such as codes of most companies are managed through the key server SVN, that is to say, the keys are almost 100% public within the department. This means that everyone can obtain the key at "no cost and zero risk". Specifically, it can be stolen by simply copying it by hand or taking a photo. This...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0281H04L63/0464H04L63/12H04L69/162
Inventor 杨藩
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products