Tamper-proof encryption implementation method and device in batch data uploading process
A technology of batch data and implementation method, which is applied in the field of data upload, can solve the problems of inability to ensure authenticity, data monitoring, interception and tampering, etc., and achieve the effect of ensuring non-repudiation, safeguarding interests, and preventing leaks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0054] Example one
[0055] An implementation method of tamper-proof encryption in bulk data upload, which is used to ensure the authenticity and non-repudiation of data, please refer to figure 1 As shown, it includes the following steps:
[0056] 110. Use the 3DES algorithm (Triple Data Encryption Algorithm, a general term for block cipher) to generate a key pair; the key pair can be provided through a third-party security platform for digital signatures, which effectively protects the interests of both parties in the data transmission. The length of the key pair must be sufficiently secure. For example, a 1024-bit key pair can be used. The key pair includes a private key and a public key corresponding to the private key, the private key is assigned to the sending terminal of the data, and the public key is assigned to the receiving terminal of the data.
[0057] 120. The sending terminal uses the SHA256 algorithm (Secure Hash Algorithm, a family of cryptographic hash functions, an...
Example Embodiment
[0063] Example two
[0064] The second embodiment provides a device for implementing anti-tampering encryption in bulk data upload, which is the virtual device of the foregoing embodiment 1, and includes:
[0065] The key pair generation unit is used to generate a key pair using the 3DES algorithm; the key pair includes a private key and a public key corresponding to the private key, the private key is assigned to the sending terminal of the data, and the public key is assigned Data receiving terminal;
[0066] The first encrypted data generating unit is configured to use the SHA256 algorithm to extract the first digital digest from the original data to be sent by the sending terminal, and then use the private key to encrypt the first digital digest with the RSA algorithm to generate the first encrypted data;
[0067] The sending unit is used for the sending terminal to upload the original data and the first encrypted data to be received by the receiving terminal;
[0068] The second e...
Example Embodiment
[0071] Example three
[0072] The third embodiment is an improvement on the basis of the embodiment. The original data to be sent is encrypted first. Even if the transmitted data is intercepted, it will not cause the data to be leaked, and it will more effectively prevent the data from being intercepted. The occurrence of risks. Please refer to figure 2 As shown, it includes the following steps:
[0073] 210. Use the 3DES algorithm to generate a key pair; the key pair is two pairs, and the key pair includes a first private key, a second private key, and a first public key corresponding to the first private key, and The second public key corresponding to the second private key. The key pair can be provided through a third-party security platform for digital signatures to effectively protect the interests of both parties in the data transmission. The length of the key pair must be sufficiently secure. For example, a 1024-bit key pair can be used. The first private key and the s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap