Data information dynamic encryption method capable of preventing violent decryption

A technology of dynamic encryption and data information, applied in the computer field, to achieve the effect of ensuring encryption, improving security, and high randomness

Inactive Publication Date: 2017-10-13
SHANDONG INSPUR GENESOFT INFORMATION TECH CO LTD
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical task of the present invention is to address the above deficiencies, to provide a method for dynamic encryption of data information that prevents being decrypted by violence, to solve how to realize dynamic encryption of data related to military industry, finance, and government secrets, so that each The data or the data of each table corresponds to different encryption keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data information dynamic encryption method capable of preventing violent decryption
  • Data information dynamic encryption method capable of preventing violent decryption
  • Data information dynamic encryption method capable of preventing violent decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] The method for dynamically encrypting data information of the present invention comprises the following steps:

[0027] as attached figure 1 As shown, (1), encryption

[0028] (1) Dynamically generate the encryption key, by controlling the length of the number, dynamically generate a two-digit random number, and then randomly form a dynamic key of numbers and English letters;

[0029] (2), perform DES encryption according to the key generated dynamically, that is, use the key to perform DES encryption, and then use the DES encryption method that oracle itself carries to encrypt the data that needs to be encrypted through the dynamic key;

[0030] (3), secondary encryption, the dynamically generated key and the encrypted ciphertext data are spliced ​​together for secondary encryption;

[0031] (4) Update the database of the data.

[0032] as attached figure 2 As shown, (2), decryption

[0033] (1) Decrypt for the first time, analyze the encrypted data, separate the...

Embodiment 2

[0037] A method for dynamically encrypting data in a table in a military software system includes the following contents and steps:

[0038] ①. Create the encryption function INSPUR_JTGK_KEY(P_TEXT VARCHAR2), the specific code SQL example:

[0039]

[0040]

[0041] ②. Create the decryption function INSPUR_JTGK_DESKEY(P_TEXT VARCHAR2), the specific code SQL example:

[0042]

[0043]

[0044] ③. Create the table SADSADAS, and create the standard SQL as follows:

[0045]

[0046] The X field is the unique index of the data, and the Y field is the encrypted field.

[0047] Encryption tests were performed on the data ""World Competitiveness Report 2017" evaluates each economy based on the four competitiveness factors of "economic performance", "government efficiency", "business efficiency" and "infrastructure".

[0048] INSERT INTO SADSADAS(X,Y)VALUES(SYS_GUID(),INSPUR_JTGK_KEY('The 2017 World Competitiveness Report is evaluated based on the four competitiveness ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data information dynamic encryption method capable of preventing violent decryption, and belongs to the field of computer technologies. The invention aims to solve technical problems of how to realize dynamic encryption for military, financial and government secret-related data and how to enable each piece of data or data of each table to correspond to different encryption keys. The technical scheme is that the data information dynamic encryption method comprises the steps of (A), dynamically generating an encryption key, wherein the encryption key is a combination of random numbers and English characters; (B), performing encrypted storage on the data, performing an encryption operation on secret-related data by using the dynamic encryption key generated in the step (A) in the encrypted storage process, and updating the generated encryption key to an encrypted field of the data; and (C), performing decrypted storage on the encrypted data in the step (B), decrypting the data required to be decrypted and then performing secondary decryption according to a decrypted key value in the decrypted storage process.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method for preventing dynamic encryption of data information decrypted by violence. Background technique [0002] In traditional encryption processing, there are various encryption algorithms, but they are often relatively simple. Once the key is cracked, all database information will be obtained by hackers. In this mode, the dynamic encryption of database confidential tables / data is particularly important. Specifically, it refers to how to use a method to dynamically encrypt data related to military industry, finance, and government secrets, so that each piece of data or data in each table corresponds to a different encryption key, especially for high-risk military industries The processing of confidential data in enterprises, finance and other industries can ensure that the confidential information is stored in a more secure and standardized manner, and to a certain extent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/08H04L9/06
CPCH04L9/0869H04L9/0625H04L9/0891H04L9/14
Inventor 黄金港隋志超张磊
Owner SHANDONG INSPUR GENESOFT INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products