Tamper-proof encryption implementation method and device in batch data uploading process

A technology of batch data and implementation method, which is applied in the field of data upload, can solve the problems of inability to ensure authenticity, data monitoring, interception and tampering, etc., and achieve the effect of ensuring non-repudiation, safeguarding interests, and preventing leaks

Inactive Publication Date: 2018-12-07
GUANGDONG QIMING TECHNOLOGY DEVELOPMENT CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is: because the data may be monitored, intercepted and tampered during transmission, and the tampered data is used to regenerate a new MD5 code
The receiver cannot per

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tamper-proof encryption implementation method and device in batch data uploading process
  • Tamper-proof encryption implementation method and device in batch data uploading process

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0054] Example one

[0055] An implementation method of tamper-proof encryption in bulk data upload, which is used to ensure the authenticity and non-repudiation of data, please refer to figure 1 As shown, it includes the following steps:

[0056] 110. Use the 3DES algorithm (Triple Data Encryption Algorithm, a general term for block cipher) to generate a key pair; the key pair can be provided through a third-party security platform for digital signatures, which effectively protects the interests of both parties in the data transmission. The length of the key pair must be sufficiently secure. For example, a 1024-bit key pair can be used. The key pair includes a private key and a public key corresponding to the private key, the private key is assigned to the sending terminal of the data, and the public key is assigned to the receiving terminal of the data.

[0057] 120. The sending terminal uses the SHA256 algorithm (Secure Hash Algorithm, a family of cryptographic hash functions, an...

Example Embodiment

[0063] Example two

[0064] The second embodiment provides a device for implementing anti-tampering encryption in bulk data upload, which is the virtual device of the foregoing embodiment 1, and includes:

[0065] The key pair generation unit is used to generate a key pair using the 3DES algorithm; the key pair includes a private key and a public key corresponding to the private key, the private key is assigned to the sending terminal of the data, and the public key is assigned Data receiving terminal;

[0066] The first encrypted data generating unit is configured to use the SHA256 algorithm to extract the first digital digest from the original data to be sent by the sending terminal, and then use the private key to encrypt the first digital digest with the RSA algorithm to generate the first encrypted data;

[0067] The sending unit is used for the sending terminal to upload the original data and the first encrypted data to be received by the receiving terminal;

[0068] The second e...

Example Embodiment

[0071] Example three

[0072] The third embodiment is an improvement on the basis of the embodiment. The original data to be sent is encrypted first. Even if the transmitted data is intercepted, it will not cause the data to be leaked, and it will more effectively prevent the data from being intercepted. The occurrence of risks. Please refer to figure 2 As shown, it includes the following steps:

[0073] 210. Use the 3DES algorithm to generate a key pair; the key pair is two pairs, and the key pair includes a first private key, a second private key, and a first public key corresponding to the first private key, and The second public key corresponding to the second private key. The key pair can be provided through a third-party security platform for digital signatures to effectively protect the interests of both parties in the data transmission. The length of the key pair must be sufficiently secure. For example, a 1024-bit key pair can be used. The first private key and the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a tamper-proof encryption implementation method and device in the batch data uploading process. The implementation method comprises the following steps of: generating a key pair by using a 3DES algorithm; by a sending terminal, extracting a first digital digest for to-be-sent original data by using a SHA256 algorithm, and then carrying out RSA algorithm encryption on the first digital digest by using a private key to generate first encrypted data; by the sending terminal, uploading the original data and the first encrypted data, so that the original data and the first encrypted data are received by a receiving terminal; by the receiving terminal, extracting a second digital digest for the original data by using the SHA256 algorithm, and then carrying out RSA algorithm encryption on the second digital digest by using a public key to generate second encrypted data; by the receiving terminal, carrying out consistency verification on the second encrypted data and the first encrypted data; and if the consistency verification is passed, determining authenticity and integrity of the data received by the receiving terminal. According to the invention, authenticity and non-repudiation of the data are ensured, and benefits of both data transmission parties are effectively ensured.

Description

technical field [0001] The invention belongs to the technical field of data uploading, and relates to a method and device for implementing anti-tampering encryption in batch data uploading. Background technique [0002] For data transmission through the network, it is necessary to verify the authenticity and integrity of the data to prevent people from causing heavy losses to relevant people through tampering and forging data. Most of the current data transmission anti-counterfeiting is to transmit the MD5 (Message-Digest Algorithm 5 information-digest algorithm) code of the data at the same time when the data is transmitted, and then the receiver generates the MD5 code again after receiving the data, and judges by comparing the MD5 twice Whether the data is complete. The disadvantage of this method is that the data may be monitored, intercepted and tampered during transmission, and a new MD5 code will be regenerated with the tampered data. The receiver cannot perceive thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/14H04L9/32
CPCH04L9/14H04L9/3247H04L63/0428H04L63/08H04L63/083H04L63/123
Inventor 徐杰张勤冯国梁陈杰永邓义
Owner GUANGDONG QIMING TECHNOLOGY DEVELOPMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products