Data Migration Method and System

A technology of data and original data, applied in the field of data migration methods and systems, can solve the problems of inability to decrypt and verify password verification data normally, etc.

Active Publication Date: 2020-11-20
北京纬百科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the inconsistency of the service key in the new encryption machine and the original encryption machine, the new encryption machine cannot normally decrypt and verify the old password verification data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data Migration Method and System
  • Data Migration Method and System
  • Data Migration Method and System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0022] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0023] See figure 1 , which shows a schematic flowchart of an embodiment of the data migration method provided by the present application. The data migration method can be applied to an encryption machine, and includes the following steps:

[0024] Step 101, the source enc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data migration method and system. The method comprises the following steps: a migration preparation stage: a source encryption machine sends a key encryption packet generated by a first administrator lock to a target encryption machine, and the target encryption machine sends the key encryption packet to a second administrator lock; When a synchronization request is received, the source encryption machine obtains a first key synchronization packet from the first administrator lock, and the target encryption machine obtains a second key synchronization packet from the second administrator lock; In the data migration stage, the source encryption machine processes the original data ciphertext by using a source service key and encrypts the original data ciphertext by using a temporary key obtained based on a first key synchronization packet to obtain an original data temporary ciphertext; And the target encryption machine processes the original data temporary ciphertext by using the temporary key obtained based on the second key synchronization packet, and encrypts the original data temporary ciphertext by using the target service key. According to the embodiment of the invention, data security migration between encryption machines can be realized.

Description

technical field [0001] The embodiments of the present application relate to the technical field of data security, and in particular, to a data migration method and system. Background technique [0002] Normally, in order to prevent the leakage of password-type data, the user's password is generally not saved in plain text, nor is the reversible ciphertext of the password saved, but the irreversible HMAC (key-related hash operation message authentication of the password) Code, Hash-based Message Authentication Code) value is saved as password verification data. Furthermore, an encryption machine can also be used to encrypt multiple rounds of HMAC values ​​of the password and store them as password verification data. Multiple rounds of HMAC will make illegal users pay more computing power. Moreover, using an encryption machine to encrypt will hide multiple rounds of HMAC values, so that illegal users will not be able to compare the original text, which greatly increases the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 孙吉平钟灵剑
Owner 北京纬百科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products