An encryption method and system for different security levels
A technology of security level and encryption method, applied in the field of data security to achieve the effect of improving data security and complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] An encryption method for different security levels, the method is applied to a server-client architecture or a server-browser architecture distributed system, such as figure 1 The method shown includes:
[0044] S101. The server obtains the user's data encryption request, and returns an encryption factor.
[0045] Specifically, the data encryption request includes a keyword, a security level identifier, the length of the data to be encrypted, and a user identifier. The data to be encrypted may be a key of a certain encryption algorithm. The keyword can be empty.
[0046] Specifically, the method for obtaining the encryption factor is as follows figure 2 Shown, including the following steps:
[0047] S1011. Obtain one or more group identifiers in which the user is located according to the user identifier; the group identifier includes the security level of the group in the group identifier.
[0048] S1012. Determine the number of obtained group IDs.
[0049] A group is a data o...
Embodiment 2
[0080] An encryption system, the system includes a server and a client,
[0081] The server includes:
[0082] The request obtaining module is used for the server to obtain a user's data encryption request, the data encryption request including a keyword, a security level identifier, the length of the data to be encrypted, and a user identifier;
[0083] The target group identification acquiring module is configured to acquire one or more group identifications of the user according to the keyword and the user identification; the group identification includes the security level of the group in the group identification; If there are multiple group IDs obtained, a target group ID is selected according to the agreed algorithm; if there is only one group ID obtained, the obtained group ID is the target group ID; the target The security level of the group is not lower than the security level represented by the security level identifier;
[0084] The feature value acquisition module is conf...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


