Unlock instant, AI-driven research and patent intelligence for your innovation.

Data security processing method and device

A data security and processing method technology, applied in the field of data security, can solve problems such as business data leakage, and achieve the effect of increasing security

Inactive Publication Date: 2018-03-13
SHANGHAI QIANLONG INFORMATION TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, if the data stored in the database is stolen by others, others can obtain the encryption key and the corresponding decryption key of each business data stored in the database, and then can intercept the business ciphertext, and use the The encryption key of the stored business data and the corresponding decryption key decrypt the business ciphertext into the plaintext of the business data, resulting in the leakage of business data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security processing method and device
  • Data security processing method and device
  • Data security processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

[0065] It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic ideas of the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the compo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data security processing method and device. The data security processing method is applied to a data security processing system comprising a service key encryption / decryptionserver, and a service data encryption / decryption server. The data security processing method comprises the following steps: the service key encryption / decryption server receives a service key encryption request message sent by the service data encryption / decryption server; the service key encryption / decryption server acquires a first encryption key; the service key encryption / decryption server performs the encryption processing on the service key and acquires the ciphertext of the service key according to the first encryption key; the service key encryption / decryption server sends the ciphertext of the service key to the service data encryption / decryption server, thereby enabling the service data encryption / decryption server to receive and store the ciphertext of the service key sent by the key encryption / decryption server. When the service data encryption / decryption server stores the ciphertext of the service key to the database, the security of the data stored in the database can beincreased, and then the data security is improved.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data security processing method and device. Background technique [0002] In the current era of information explosion, information security has become a very hot topic. Modern information security technology has already done a good job in preventing network attacks. Identity authentication technology, firewall, router technology, security monitoring and auditing technology ensure the security of information in the network to the greatest extent. [0003] In order to prevent business data from being stolen by others during communication, the business data needs to be encrypted. Different business data have different corresponding encryption keys. After the encryption device encrypts the business data with the encryption key into business ciphertext, it needs to store the encryption key and the corresponding decryption key in the database. At this time, if the data stor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0822H04L63/0478H04L63/06
Inventor 伍慧勇梁晓靖李麟傅相奎范从春熊维涛王桐赵加龙
Owner SHANGHAI QIANLONG INFORMATION TECH CO LTD