Unlock instant, AI-driven research and patent intelligence for your innovation.
Data information dynamic encryption method capable of preventing violent decryption
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of dynamic encryption and data information, applied in the computer field, to achieve the effect of ensuring encryption, improving security, and high randomness
Inactive Publication Date: 2017-10-13
SHANDONG INSPUR GENESOFT INFORMATION TECH CO LTD
View PDF7 Cites 10 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] The technical task of the present invention is to address the above deficiencies, to provide a method for dynamic encryption of data information that prevents being decrypted by violence, to solve how to realize dynamic encryption of data related to military industry, finance, and government secrets, so that each The data or the data of each table corresponds to different encryption keys
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0026] The method for dynamically encrypting data information of the present invention comprises the following steps:
[0027] as attached figure 1 As shown, (1), encryption
[0028] (1) Dynamically generate the encryption key, by controlling the length of the number, dynamically generate a two-digit random number, and then randomly form a dynamic key of numbers and English letters;
[0029] (2), perform DES encryption according to the key generated dynamically, that is, use the key to perform DES encryption, and then use the DES encryption method that oracle itself carries to encrypt the data that needs to be encrypted through the dynamic key;
[0030] (3), secondary encryption, the dynamically generated key and the encrypted ciphertext data are spliced together for secondary encryption;
[0032] as attached figure 2 As shown, (2), decryption
[0033] (1) Decrypt for the first time, analyze the encrypted data, separate the...
Embodiment 2
[0037] A method for dynamically encrypting data in a table in a military softwaresystem includes the following contents and steps:
[0038] ①. Create the encryption function INSPUR_JTGK_KEY(P_TEXT VARCHAR2), the specific code SQL example:
[0039]
[0040]
[0041] ②. Create the decryption function INSPUR_JTGK_DESKEY(P_TEXT VARCHAR2), the specific code SQL example:
[0042]
[0043]
[0044] ③. Create the table SADSADAS, and create the standard SQL as follows:
[0045]
[0046] The X field is the unique index of the data, and the Y field is the encrypted field.
[0047] Encryption tests were performed on the data ""World Competitiveness Report 2017" evaluates each economy based on the four competitiveness factors of "economic performance", "government efficiency", "business efficiency" and "infrastructure".
[0048] INSERT INTO SADSADAS(X,Y)VALUES(SYS_GUID(),INSPUR_JTGK_KEY('The 2017 World Competitiveness Report is evaluated based on the four competitiveness ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a data information dynamic encryption method capable of preventing violent decryption, and belongs to the field of computer technologies. The invention aims to solve technical problems of how to realize dynamic encryption for military, financial and government secret-related data and how to enable each piece of data or data of each table to correspond to different encryption keys. The technical scheme is that the data information dynamic encryption method comprises the steps of (A), dynamically generating an encryption key, wherein the encryption key is a combination of random numbers and English characters; (B), performing encrypted storage on the data, performing an encryption operation on secret-related data by using the dynamic encryption key generated in the step (A) in the encrypted storage process, and updating the generated encryption key to an encrypted field of the data; and (C), performing decrypted storage on the encrypted data in the step (B), decrypting the data required to be decrypted and then performing secondary decryption according to a decrypted key value in the decrypted storage process.
Description
technical field [0001] The invention relates to the field of computer technology, in particular to a method for preventing dynamic encryption of data information decrypted by violence. Background technique [0002] In traditional encryption processing, there are various encryption algorithms, but they are often relatively simple. Once the key is cracked, all database information will be obtained by hackers. In this mode, the dynamic encryption of database confidential tables / data is particularly important. Specifically, it refers to how to use a method to dynamically encrypt data related to military industry, finance, and government secrets, so that each piece of data or data in each table corresponds to a different encryption key, especially for high-risk military industries The processing of confidential data in enterprises, finance and other industries can ensure that the confidential information is stored in a more secure and standardized manner, and to a certain extent...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.
Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/08H04L9/06
CPCH04L9/0869H04L9/0625H04L9/0891H04L9/14
Inventor 黄金港隋志超张磊
Owner SHANDONG INSPUR GENESOFT INFORMATION TECH CO LTD