Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption and decryption method and device

A technology for data encryption and data to be encrypted, which is applied in the field of cryptography, and can solve problems such as the inability to meet the security sharing requirements of big data, the difficulty in managing ciphertext data, and the high overhead of system key generation and storage.

Active Publication Date: 2018-10-16
RAJAX NETWORK &TECHNOLOGY (SHANGHAI) CO LTD
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of data sharing, if a single symmetric encryption method is used, multiple entities will share the decryption key, and data security is low; if a single asymmetric method is used, the system needs to generate a public-private key pair for each user. In the participating scenarios, the system key generation and storage overhead is too large
And as the amount of data continues to increase, it is difficult to manage huge ciphertext data locally
Therefore, traditional data encryption technology cannot meet the requirements of the Internet O 2 Big data security sharing requirements in the industry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method and device
  • Data encryption and decryption method and device
  • Data encryption and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and beneficial effects of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] The embodiment of the present invention provided in the embodiment of the present invention is applicable to O 2 In most scenarios of O, time and space are the basic characteristics of data in this scenario. For example, in the takeaway scene, from the time the customer places an order to the delivery by the rider, it is a normal order time cycle, and the merchant's food pickup address and the user's delivery address are necessary spatial information. Another example is the car-calling scenario. From the time the driver receives the order to the time when the driver arrives at th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention relate to the technical field of cryptography, and in particular to a data encryption and decryption method and a data encryption and decryption device, used to improve data security in the sharing process. The method comprises: determining access constraint information of the data to be encrypted, wherein the access constraint information includes N constraint information; encrypting the data to be encrypted by the first key to obtain a first ciphertext, wherein the first key is a symmetric key; generating a plurality of pairs of second keys according to the N constraint information; encrypting at least a partial key parameter of the first key using the second public key for each second public key to obtain a second ciphertext, wherein the second private key corresponding to the second public key is used to decrypt the second ciphertext; storing the first ciphertext and the second ciphertext in the cloud storage server, and storing each second private keyand access condition in the key management center, wherein the key management center is configured to send the second private key corresponding to the current information satisfying the access condition to the client according to the current information of the client. In this way, the security of shared data may be improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of cryptography, and in particular, to a data encryption and decryption method and device. Background technique [0002] With the Internet O 2 The O industry is growing day by day, and major Internet companies have accumulated massive amounts of user information and behavior data, and these data are shared by merchants, third-party logistics, data analysts, operation and maintenance personnel, etc., making it difficult to protect user privacy and valuable data. Therefore, how data managers desensitize users' private information, when, where and how to share data are problems to be solved. [0003] In the prior art, the data encryption technology can guarantee the security of data transmission and storage, including symmetric and asymmetric methods. In the process of data sharing, if a single symmetric encryption method is used, multiple entities will share the decryption key, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/14H04L29/06H04L29/08
CPCH04L9/0894H04L9/14H04L63/0428H04L63/0435H04L63/083H04L63/0876H04L63/10H04L67/1097
Inventor 裴新范晓锋王彬熊莺
Owner RAJAX NETWORK &TECHNOLOGY (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products