Methods and apparatuses for data encryption and decryption, method and apparatus for processing secret key request, and data encryption and decryption system

A technology for encrypting keys and decrypting keys, which is applied in the fields of key request processing, decryption, and data encryption. It can solve the problems of high risk of encryption sensitive data leakage, increase the difficulty of cracking, improve security, and solve the effects of high risk of leakage.

Inactive Publication Date: 2017-06-23
ALIBABA GRP HLDG LTD
View PDF7 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method, device and system for data encryption, decryption, and key request processing, so as to at least solve the technical problem of high leakage risk of encrypted sensitive data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and apparatuses for data encryption and decryption, method and apparatus for processing secret key request, and data encryption and decryption system
  • Methods and apparatuses for data encryption and decryption, method and apparatus for processing secret key request, and data encryption and decryption system
  • Methods and apparatuses for data encryption and decryption, method and apparatus for processing secret key request, and data encryption and decryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] According to an embodiment of the present application, an embodiment of a data encryption method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0032]The method embodiments provided in the embodiments of the present application may be executed in mobile terminals, computer terminals or similar computing devices. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal for a data encryption method according to the embodiment of this application.

[0033] like figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 102 (t...

Embodiment 2

[0081] in the above figure 1 Under the operating environment shown, this application also provides Figure 4 The method for decrypting the data is shown. Figure 4 is a flowchart of a data decryption method according to an embodiment of the present application.

[0082] like Figure 4 The method shown includes the following steps:

[0083] Step S402: The terminal obtains a decryption request for decrypting data to be decrypted, wherein the data to be decrypted is an encryption result including ciphertext data and a key version.

[0084] Step S404: Analyzing the data to be decrypted to obtain the ciphertext data and the key version.

[0085] Step S406: Generate a decryption key request carrying the key version, and send the decryption key request to the key server, where the decryption key request is used by the key server to find the decryption key corresponding to the key version and decrypt The algorithm type of the key.

[0086] Step S408: Receive the decryption key a...

Embodiment 3

[0103] in the above figure 1 Under the operating environment shown, this application also provides Figure 5 The processing method for the key request shown. Figure 5 is a flow chart of a key request processing method according to an embodiment of the present application.

[0104] like Figure 5 Shown, this embodiment comprises the following steps:

[0105] Step S502: receiving a key request sent by the terminal for obtaining a key, where the key request includes an encryption key request and a decryption key request.

[0106] Step S504: If the key request is an encryption key request, read the latest version of the encryption key and the algorithm type of the encryption key from the database, and return to the terminal based on the encryption key and the algorithm type of the encryption key.

[0107] Step S506: If the key request is a decryption key request, then obtain the key version from the decryption key request, read the decryption key and the algorithm type of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses methods and apparatuses for data encryption and decryption, a method and apparatus for processing a secret key request, and a data encryption and decryption system. The data encryption method includes: after to-be-encrypted data is obtained, a terminal generates an encryption key request used for requesting an encryption key and sends the encryption key request to a secret key server; response information returned by the secret key server based on the encryption key request is received, wherein the response information at least comprises the encryption key and the algorithm type corresponding to the encryption key; and the to-be-encrypted encryption data is encrypted by employing the encryption key and the algorithm type to obtain encrypted data. According to the method, the technical problem of high leakage risk of sensitive data of the encryption method is solved.

Description

technical field [0001] The present application relates to the field of the Internet, in particular, to a method, device and system for data encryption, decryption, and key request processing. Background technique [0002] Large-scale platforms (such as online trading platforms) generate a large amount of sensitive data (such as order data, etc.) every day. These sensitive data will be opened to many third-party applications (such as order processing, customer management, logistics and merchants, etc.) through the open data platform. ). When opening these sensitive data to third-party applications through the data open platform, if there is no good encryption method, these sensitive data will face a huge risk of leakage. [0003] The prior art provides some security technical means applied to the network, host, and application dimensions to reduce the risk of data being illegally stolen, but they cannot completely solve the problem. As in the prior art: (1) channel encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/067H04L63/14
Inventor 陈圆谜
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products