Unlock instant, AI-driven research and patent intelligence for your innovation.

A data encryption and decryption method and system

An encryption and decryption, data technology, applied in digital transmission system, transmission system, key distribution, can solve problems such as security risks, application system backlog of data to be encrypted, large amount of data cannot be read normally, etc., to improve reliability, improve The effect of data security

Active Publication Date: 2018-12-18
Fisherman Information Technology Co Ltd
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This method has certain disadvantages. Once there is a problem with the encryption card software or hardware, when the technician replaces or repairs the encryption card, the application system will not be able to encrypt and decrypt the data, which will lead to a backlog of a large number of data to be encrypted in the application system. data, there is a security risk, or a large amount of data cannot be read normally, affecting the normal work of other systems associated with the application system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption and decryption method and system
  • A data encryption and decryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] see figure 1 As shown, it is a schematic structural diagram of a data encryption and decryption system provided by an embodiment of the present invention. This system comprises processor 110, first password card 120 and second password card 130, and described processor 110 is connected with described first password card 120 and described second password card 130 respectively, and described first passwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption and decryption method and system. The system comprises a processor, a first cipher card and a second cipher card. The first cipher card and the second cipher card store the same first user secret keys, and the processor, when receiving a processing request for service data, sends the processing request to the first cipher card to enable the first cipher card to process the service data by use of the first user secret key when receiving the processing request and to obtain and return first processing data; the processor determines whether the first processing data is received, if not, sends the processing request to the second cipher card so as to enable the second cipher card to process the service data by use of the first user secret key when receiving the processing request and to obtain and return second processing data; and the processor receives the second processing data. By use of the technical scheme provided by the embodiments of the invention, the service data can be continuously processed, and thus the reliability of cipher operation is improved.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a data encryption and decryption method and system. Background technique [0002] With the rapid development of information technology, information security has received more and more attention. In order to enhance data security, most of the data stored in the application system is encrypted, and when the data needs to be read, it is decrypted accordingly. [0003] In the prior art, most application systems use a single encryption card to encrypt and decrypt data, and important data such as user keys in the encryption card are backed up outside the application system. [0004] This method has certain disadvantages. Once there is a problem with the encryption card software or hardware, when the technician replaces or repairs the encryption card, the application system will not be able to encrypt and decrypt the data, which will lead to a backlog of a large n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0894
Inventor 宋志华郭刚宋桂芝
Owner Fisherman Information Technology Co Ltd