Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key separation combined encryption method and system

An encryption method and the technology of the key distribution center, applied in the key distribution, can solve the problems of increasing storage space, increasing the risk of leakage, and the computing performance of the user terminal and server are not very high, so as to reduce the storage capacity and improve the encryption and decryption efficiency Effect

Active Publication Date: 2019-03-26
ZTE CORP
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above two methods involve one party participating in the encryption and decryption of files, especially the first one, which has high requirements on the performance of the mobile phone, and when the key of this party is lost, the private information will be leaked, and the second one requires server-side The computing performance is very strong, but in the mobile Internet environment, the computing performance of the user terminal and the server side (not limited to the set-top box) is not very high
In addition, when users want to share encrypted data with other users, one way is to send the key to other users, but it will increase the risk of leakage, and the other way is to re-encrypt the document with a new key, but it will increase storage space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key separation combined encryption method and system
  • Key separation combined encryption method and system
  • Key separation combined encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0044] figure 1 is a flow chart of a combined encryption method for key separation provided by an embodiment of the present invention, such as figure 1 shown, including:

[0045] Step S101: the user terminal divides the data into the first part of the data and the second part of the data, and encrypts the first part of the data with the terminal key obtained from the key distribution center KDC to obtain the ciphertext of the first part of the data;

[0046] Step S102: The user terminal sends the ciphertext of the first part of the data and the second part of the data to the server, so that the server encrypts the second part of the data using the server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key separation combined encryption method and system, and relates to the field of data security and computer network technology. The method comprises the following steps: dividing data into a first part of the data and a second part of the data by a user terminal; encrypting the first part of the data to obtain a first partial ciphertext of the data by utilizing the terminal key obtained from a key distribution center (KDC); sending the first partial ciphertext of the data and the second part of the data to a server end by the user terminal, so that the server end utilizes a server end key obtained from the KDC to encrypt the second part of the data to obtain a second partial ciphertext of the data.

Description

technical field [0001] The invention relates to the technical fields of data security and computer network, in particular to a combined encryption method and system with key separation. Background technique [0002] With the rapid development of mobile Internet and wireless network technology, a large amount of digital data is generated every day. People are paying more and more attention to the privacy and security of data. Data encryption is one of the main means to protect privacy. On the one hand, in order to ensure data security, the encryption algorithms and keys used for encryption are becoming more and more complex, especially when the computing power of the device is limited, such as mobile phones, set-top boxes, etc., the encryption and decryption will take a long time and affect the user experience; on the other hand, At present, encryption usually means that one party sets a key and then encrypts the file, and then stores the encrypted data and key on the server ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/083H04L63/0428
Inventor 王明昕
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products