Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Tamper-proof encryption implementation method and device in batch data uploading process

A technology of batch data and implementation method, which is applied in the field of data upload, can solve the problems of inability to ensure authenticity, data monitoring, interception and tampering, etc., and achieve the effect of ensuring non-repudiation, safeguarding interests, and preventing leaks

Inactive Publication Date: 2018-12-07
GUANGDONG QIMING TECHNOLOGY DEVELOPMENT CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is: because the data may be monitored, intercepted and tampered during transmission, and the tampered data is used to regenerate a new MD5 code
The receiver cannot perceive this situation. If the tampered data and MD5 code continue to be used, although the data passes the verification to ensure the integrity, it is obviously impossible to ensure its authenticity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tamper-proof encryption implementation method and device in batch data uploading process
  • Tamper-proof encryption implementation method and device in batch data uploading process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] A tamper-proof encryption implementation method in batch data upload, which is used to ensure the authenticity and non-repudiation of data, please refer to figure 1 As shown, it includes the following steps:

[0056]110. Use the 3DES algorithm (Triple Data Encryption Algorithm triple data encryption algorithm, which is a general name for block ciphers) to generate a key pair; the key pair can be provided by a third-party security platform for digital signatures, effectively protecting the interests of both parties in data transmission. The length of the key pair should be sufficiently secure, for example, a 1024-bit key pair can be used. The key pair includes a private key and a public key corresponding to the private key, the private key is given to a data sending terminal, and the public key is given to a data receiving terminal.

[0057] 120. The sending terminal uses the SHA256 algorithm (Secure Hash Algorithm secure hash algorithm, which is a family of cryptograph...

Embodiment 2

[0064] Embodiment 2 provides a device for implementing tamper-proof encryption in batch data upload, which is the virtual device of Embodiment 1 above, which includes:

[0065] A key pair generating unit, configured to generate a key pair using the 3DES algorithm; the key pair includes a private key and a public key corresponding to the private key, the private key is given to the data sending terminal, and the public key is given to Data receiving terminal;

[0066] The first encrypted data generation unit is used for the sending terminal to use the SHA256 algorithm to extract the first digital abstract from the original data to be sent, and then use the private key to encrypt the first digital abstract with the RSA algorithm to generate the first encrypted data;

[0067] a sending unit, configured for the sending terminal to upload the original data and the first encrypted data to be received by the receiving terminal;

[0068] The second encrypted data generation unit is u...

Embodiment 3

[0072] Embodiment 3 is an improvement based on the embodiment. It encrypts the original data to be sent first, even if the transmitted data is intercepted, it will not lead to data leakage, and more effectively prevents data from being intercepted and resulting in leakage The occurrence of risk. Please refer to figure 2 As shown, it includes the following steps:

[0073] 210. Use the 3DES algorithm to generate a key pair; the key pair is two pairs, and the key pair includes a first private key, a second private key, and a first public key corresponding to the first private key, and A second public key corresponding to the second private key. The key pair can be provided by a third-party security platform and used for digital signatures to effectively protect the interests of both parties in data transmission. The length of the key pair should be sufficiently secure, for example, a 1024-bit key pair can be used. The first private key and the second private key are assigned...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a tamper-proof encryption implementation method and device in the batch data uploading process. The implementation method comprises the following steps of: generating a key pair by using a 3DES algorithm; by a sending terminal, extracting a first digital digest for to-be-sent original data by using a SHA256 algorithm, and then carrying out RSA algorithm encryption on the first digital digest by using a private key to generate first encrypted data; by the sending terminal, uploading the original data and the first encrypted data, so that the original data and the first encrypted data are received by a receiving terminal; by the receiving terminal, extracting a second digital digest for the original data by using the SHA256 algorithm, and then carrying out RSA algorithm encryption on the second digital digest by using a public key to generate second encrypted data; by the receiving terminal, carrying out consistency verification on the second encrypted data and the first encrypted data; and if the consistency verification is passed, determining authenticity and integrity of the data received by the receiving terminal. According to the invention, authenticity and non-repudiation of the data are ensured, and benefits of both data transmission parties are effectively ensured.

Description

technical field [0001] The invention belongs to the technical field of data uploading, and relates to a method and device for implementing anti-tampering encryption in batch data uploading. Background technique [0002] For data transmission through the network, it is necessary to verify the authenticity and integrity of the data to prevent people from causing heavy losses to relevant people through tampering and forging data. Most of the current data transmission anti-counterfeiting is to transmit the MD5 (Message-Digest Algorithm 5 information-digest algorithm) code of the data at the same time when the data is transmitted, and then the receiver generates the MD5 code again after receiving the data, and judges by comparing the MD5 twice Whether the data is complete. The disadvantage of this method is that the data may be monitored, intercepted and tampered during transmission, and a new MD5 code will be regenerated with the tampered data. The receiver cannot perceive thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/14H04L9/32
CPCH04L9/14H04L9/3247H04L63/0428H04L63/08H04L63/083H04L63/123
Inventor 徐杰张勤冯国梁陈杰永邓义
Owner GUANGDONG QIMING TECHNOLOGY DEVELOPMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products