Data encryption and decryption method, device and system

A data encryption and data technology, applied in the field of Internet technology applications, can solve problems such as complex computing and large workload, and achieve the effect of protecting data privacy

Inactive Publication Date: 2019-03-12
ALIBABA GRP HLDG LTD
View PDF10 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a data encryption and decryption method, device and system to at least solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method, device and system
  • Data encryption and decryption method, device and system
  • Data encryption and decryption method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] According to the embodiment of this application, a system embodiment of data encryption and decryption is provided. It should be noted that this embodiment can be applied to various blockchain application scenarios, including but not limited to payment, transfer, Stocks, securities, real estate, insurance, insurance, medical care, supply chain management and other industries.

[0052] With the development of Internet technology, electronic transactions such as online payment, transfer, and shopping have become more and more popular. Electronic transactions on the traditional Internet require the help of a trusted third-party credit institution to process electronic payment information, which is subject to the credibility of the third-party credit institution. Based on the principle of cryptography, the blockchain enables the two parties to pay directly without the participation of a third-party intermediary, ensuring the security of electronic transactions.

[0053] Th...

Embodiment 2

[0097] According to the embodiment of this application, an embodiment of a data encryption method is also provided. The data encryption method provided by this embodiment can be applied to the data encryption and decryption system provided by Embodiment 1 of this application, including but not limited to this The application scenario described in Example 1 of the application. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here.

[0098] Since anyone can participate in the blockchain network, each device can be used as a node, and each node is allowed to obtain a complete copy of the database. Therefore, all data information on the blockchain is public. In order to protect the privacy and security of u...

Embodiment 3

[0152] According to the embodiment of this application, an embodiment of a data decryption method is also provided. The data decryption method provided by this embodiment can be applied to the data encryption and decryption system provided by Embodiment 1 of this application, including but not limited to this The application scenario described in Example 1 of the application. As an optional embodiment, it can be used to decrypt the encrypted data obtained by the data encryption method in Embodiment 2. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer such as a group of Instructions are executed in a computer system and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0153] This application provides Figure 9 A method of data decryption is shown, Figure 9 is a flow chart of a data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data encryption and decryption method, device and system. The method comprises the steps of generating a block key, and encrypting to-be-uploaded data according to the blockkey to obtain encrypted data; encrypting the block key according to a public key of a preset target object to obtain an encrypted block key corresponding to the preset target object; and generating uploaded data according to the encrypted data and the encrypted block key, and uploading the uploaded data to a block chain. The technical problems of large workload and complex calculation due to access permission control on the data in the block chain are solved.

Description

technical field [0001] This application relates to the field of Internet technology applications, in particular, to a data encryption and decryption method, device and system. Background technique [0002] With the circulation of online virtual currency such as Bitcoin, in order to ensure the normal circulation of the virtual currency, blockchain is the underlying technology and infrastructure of virtual currency such as Bitcoin. Each data block contains the information of a Bitcoin network transaction, which is used to verify the validity of the information (anti-counterfeiting) and generate the next block. That is, in a narrow sense, a blockchain is a chained data structure that combines data blocks in a sequential manner in chronological order and is cryptographically guaranteed to be tamper-proof and unforgeable. Whether it is online transactions of virtual currency or secure data transmission, the existing blockchain technology improves the security of users' activitie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0861H04L9/3247H04L63/0435H04L63/0442H04L63/045H04L63/0823H04L9/321H04L9/3239H04L9/14H04L9/0825H04L9/3263H04L9/50H04L2463/062H04L9/0637H04L2209/24
Inventor 刘文清彭骏涛
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products