Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet e-commerce platform user privacy data encryption and decryption method

An e-commerce platform and user privacy technology, applied in the field of information security, can solve problems such as difficulty in upgrading and maintenance, operation errors, and no support for encrypted data sharing, so as to avoid acquisition or illegal operations and improve the encryption level.

Active Publication Date: 2019-04-05
SHENZHEN YIXUNTIANKONG INTERNET TECH CO LTD
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method of extending the database access method is relatively simple and feasible for open source databases, but for commercial databases, it needs to be supported by the manufacturer's code, and it is difficult to upgrade and maintain
In addition, since the key for encryption / decryption is arranged on the database side or locally, the data is stored encrypted when stored in the database and when the data is extracted to decrypt the data to be returned to the user, there is a risk that the software-level encryption method is from the outside Information leakage caused by intrusion into the database system, improper behavior of the database administrator, or operation error
Moreover, identity authentication and access control functions generally adopt simple encryption mechanisms such as password authentication or primary encryption; encrypted keys are generally stored locally or in databases, and are easy to be obtained or illegally operated by authorized users; keys are held by services And perform encryption and decryption operations, does not support encrypted data sharing, and service expansion is not flexible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet e-commerce platform user privacy data encryption and decryption method
  • Internet e-commerce platform user privacy data encryption and decryption method
  • Internet e-commerce platform user privacy data encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0063] Such as figure 2 As shown, the Internet e-commerce platform user privacy data encryption device based on the aforementioned encryption and decryption method is composed of a database field encryption setting unit, an encryption unit, a decryption unit, and a key management unit, wherein the database field encryption setting unit, the encryption unit, and the decryption unit Together they form an application program, that is, the requesting party. The application program and the key management unit exist independently, and the application program requests the ciphertext key from the key management unit; its basic functions are as follows:

[0064] Database field encryption setting unit: according to the characteristics of user privacy information, it is used to set whether the storage fields in the database are encrypted. The principle of judging whether the storage fields are encrypted is determined by the content of the configuration file. For example, if the fields su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet e-commerce platform user privacy data encryption method, which comprises the following steps of: encrypting and storing a ciphertext key, and generating a vector ivaccording to input original user data; Acquiring an encrypted and stored ciphertext key; Decrypting the ciphertext key into a plaintext ciphertext key; Encrypting the original user data byte stream by using an AES256 / CFB8 / NOPADDING algorithm through a plaintext ciphertext key and a vector iv to obtain a first encrypted character string; Carrying out Base64 coding on the first encrypted characterstring to obtain a second encrypted character string; connecting E-, iv and the second encrypted character string in sequence to obtain a third encrypted character string, and storing the third encrypted character string as encrypted data in a database. The user privacy data is encrypted, the user privacy data information of the database system is prevented from being leaked, and the processing efficiency is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for encrypting and decrypting private data of users on an Internet e-commerce platform. Background technique [0002] In the process of providing services on the Internet e-commerce platform, a large number of private information such as names, ID cards, and telephone numbers of users are involved, and most of the private information of users is often stored in the database in plain text. Encrypted storage of user privacy data has become an important means to protect user privacy data from being leaked. At the same time, the newly promulgated Network Security Law and the new regulations on information security level protection clearly require that user privacy data be encrypted and stored. [0003] Currently, data encryption storage methods include (1) purchasing hardware-level encryption equipment for deployment; (2) deploying software-level encryption. Existing ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62H04L9/06
CPCH04L9/0631G06F21/602G06F21/6245
Inventor 关键蒲光锐祝林青林荣园
Owner SHENZHEN YIXUNTIANKONG INTERNET TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products