Data encryption method, device, computer device and storage medium

A technology for data encryption and business data, applied in secure communication devices, digital transmission systems, and key distribution, it can solve problems such as private key security risks, private key theft, and inconvenient operation, so as to improve user experience and ensure ease of use. , the effect of improving productivity

Inactive Publication Date: 2019-03-19
SHENZHEN QIANHAI HUANRONG LIANYI INFORMATION TECH SERVICES CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing cryptographic privacy information, that is, encrypted data is generally encrypted and decrypted by the private key, and the current private key is generally hosted in the management mode of the server, which has security risks and is easy to be tampered with or copied. If the user keeps the secret key by himself Inconvenient and easy to lose, if the secret key is stored in the UKEY wallet, since the UKEY wallet only provides a storage function, the information can still be stolen after storing it
[0004] The above three methods all have the risk of the private key being stolen, which leads to the risk that the encrypted data can still be tampered with and copied, and the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, device, computer device and storage medium
  • Data encryption method, device, computer device and storage medium
  • Data encryption method, device, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0052] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0053] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data encryption method, a device, a computer device and a storage medium. The method comprises the following steps: acquiring a request data packet; extracting business dataand a request type in the request data packet; acquiring a private key based on the request type; acquiring a private key based on the request type; processing the business data with the private keyto obtain a processing result; performing a format conversion on the processing result to obtain a message in a unified format; sending the message with unified format to a terminal. According to thedata encryption method, the device, the computer device and the storage medium, the service data is encrypted by using the private key according to different request types and different scenes, and different request types have different encryption types, thereby improving data security after encryption. The encryption is performed in the storage device, so that the service data to be encrypted cannot escape the storage device once it is written which ensures that the data cannot be tampered and copied, and the convenience of the private key is ensured. Setting different private keys in different scenes can effectively control the problem of malicious use of the private key, and dynamically determining the scene corresponding to the request type can eliminate the cumbersome memory.

Description

technical field [0001] The present invention relates to a data encryption method, and more specifically refers to a data encryption method, device, computer equipment and storage medium. Background technique [0002] Cryptography is a technique used to obfuscate, in the hopes of turning normal, recognizable information into something unrecognizable. Of course, for a small number of people, this unidentifiable information can be reprocessed and recovered. [0003] Existing cryptographic privacy information, that is, encrypted data is generally encrypted and decrypted by the private key, and the current private key is generally hosted in the management mode of the server, which has security risks and is easy to be tampered with or copied. If the user keeps the secret key by himself Inconvenient and easy to lose, if the secret key is stored in the UKEY wallet, since the UKEY wallet only provides a storage function, the information can still be stolen after storing it. [0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0861
Inventor 冯凯
Owner SHENZHEN QIANHAI HUANRONG LIANYI INFORMATION TECH SERVICES CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products