Unlock instant, AI-driven research and patent intelligence for your innovation.

An encryption method and system for different security levels

A technology of security level and encryption method, applied in the field of data security to achieve the effect of improving data security and complexity

Active Publication Date: 2020-03-20
山东合联互联网科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in terms of the technical implementation of white-box cryptography, there is no recognized safe and efficient white-box cryptography scheme so far. Therefore, it is imminent to design a safe and effective cryptographic algorithm that can resist white-box attacks. An important means to ensure network security at present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encryption method and system for different security levels
  • An encryption method and system for different security levels
  • An encryption method and system for different security levels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] An encryption method for different security levels, the method is applied to a server-client architecture or a server-browser architecture distributed system, such as figure 1 The method shown includes:

[0044] S101. The server obtains the user's data encryption request, and returns an encryption factor.

[0045] Specifically, the data encryption request includes a keyword, a security level identifier, the length of the data to be encrypted, and a user identifier. The data to be encrypted may be a key of a certain encryption algorithm. The keyword can be empty.

[0046] Specifically, the method for obtaining the encryption factor is as follows figure 2 Shown, including the following steps:

[0047] S1011. Obtain one or more group identifiers in which the user is located according to the user identifier; the group identifier includes the security level of the group in the group identifier.

[0048] S1012. Determine the number of obtained group IDs.

[0049] A group is a data o...

Embodiment 2

[0080] An encryption system, the system includes a server and a client,

[0081] The server includes:

[0082] The request obtaining module is used for the server to obtain a user's data encryption request, the data encryption request including a keyword, a security level identifier, the length of the data to be encrypted, and a user identifier;

[0083] The target group identification acquiring module is configured to acquire one or more group identifications of the user according to the keyword and the user identification; the group identification includes the security level of the group in the group identification; If there are multiple group IDs obtained, a target group ID is selected according to the agreed algorithm; if there is only one group ID obtained, the obtained group ID is the target group ID; the target The security level of the group is not lower than the security level represented by the security level identifier;

[0084] The feature value acquisition module is conf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption method and system for different security levels. According to a user identification, a keyword and a security level identification, an encryption factor is obtained. data to be encrypted is encrypted according to the encryption factor, the data to be encrypted also can be the key of an encryption algorithm, and the whole encryption process realizes an encryption technology in which the algorithm key is integrated into the encryption algorithm. a corresponding encryption factor is obtained by making full use of personal information and social information of a user, the user can also make a server select a most suitable encryption factor through the keyword and the security level identification, thus, the server can feed back different encryption factors to different users, the encryption factor changes dynamically because of the needs of the user, thereby different white box encryption algorithms are generated at a terminal, not only does the user have a more independent selection of encryption algorithms, but also the complexity of encryption is further improved, and the data security is improved.

Description

Technical field [0001] The present invention relates to the field of data security, in particular to an encryption method and system for different security levels. Background technique [0002] With the development of science and technology, people's research on computer technology has become more comprehensive, and there are more and more ways to detect confidential information. For cryptographic algorithms, the traditional only limited to the interception and analysis of information in the communication channel can no longer meet the needs of attackers. They have gradually begun to target the operating platform of the cryptographic algorithm (such as personal computers, servers, etc.). The more advanced technology to observe and modify the internal state of the algorithm when it is running, so as to obtain confidential information and destroy the confidentiality, integrity, and non-repudiation of the cryptographic algorithm. [0003] This type of attack is called a white box att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0822H04L9/0861H04L9/0866H04L63/0428
Inventor 徐承迪
Owner 山东合联互联网科技有限公司