Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption and decryption method and equipment

A data encryption and data decryption technology, which is applied in the field of data security, can solve problems such as low security and cannot meet high security requirements, and achieve the effect of improving security

Active Publication Date: 2017-09-01
BEIJING BANGCLE TECH CO LTD
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a data encryption and decryption method and device, which are used to solve the problem in the prior art that when encrypting a large amount of user data, the existing encryption method has low security and cannot meet high security requirements question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method and equipment
  • Data encryption and decryption method and equipment
  • Data encryption and decryption method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In the prior art, when the network server encrypts user data, it can generally adopt symmetric encryption or asymmetric encryption. Among them, symmetric encryption is mainly based on DES algorithm and AES algorithm, which has the advantages of fast encryption and decryption, and is widely used in data transmission and storage. Asymmetric encryption is mainly based on ECC algorithm and RSA algorithm. Due to its public key and private key More flexible and therefore more secure than symmetric encryption.

[0035] However, when encrypting a large amount of user data, there are at least the following problems in adopting symmetric encryption or asymmetric encryption:

[0036] (1) In symmetric encryption, the same key is used for both encryption and decryption, which makes the key easily leaked and the security of user data cannot be guaranteed;

[0037] (2) The amount of calculation is relatively large when using asymmetric encryption to encrypt data, so when encrypting a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a data encryption and decryption method and equipment. The data encryption method comprises the following steps: determining data to be encrypted that contains a key identifier, wherein a key corresponding to the key identifier is used for encrypting the data to be encrypted, and the key identifier is dynamically allocated by a server; and encrypting the data to be encrypted according to the key to obtain the encrypted data. Before the data to be encrypted is encrypted, the key identifier corresponding to the key that is used for encrypting the data to be encrypted is randomly allocated to the data to be encrypted, and thereby, the corresponding key can be determined according to the key identifier in the data to be encrypted when the data to be encrypted is encrypted, and then the data to be encrypted is encrypted according to the determined key; and the key identifier included in the data to be encrypted is randomly allocated, which means that the key for encrypting the data to be encrypted is randomly allocated, and thereby, compared with the prior art, the security of data encryption can be improved.

Description

technical field [0001] The present application relates to the field of data security, in particular to a data encryption and decryption method and device. Background technique [0002] With the rapid development of Internet technology, more and more network services are provided to users based on Internet technology. For example, Internet technology can provide users with electronic payment services, so that users can realize payment through the network, and provide users with online banking services. , so that users can transfer funds, remittances, etc. through the network. [0003] In the process of providing network services to users, the network server will generate a large amount of user data, for example, the user's username, user password, user's consumption records, and so on. Usually, the network server usually stores the user data, and before storing the user data, in order to ensure the security of the stored user data, the user data may be encrypted, and the enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCG06F21/602H04L9/0819H04L9/0894H04L63/0428H04L63/062H04L67/1097
Inventor 阚志刚陈彪卢佐华方宁彭建芬
Owner BEIJING BANGCLE TECH CO LTD