Log encryption method and device and log decryption method and device

An encryption method and log technology, which are applied to secure communication devices, computer security devices, and key distribution, can solve the problems of low security of log encryption methods, and achieve the effects of improving the difficulty of cracking, solving low security, and improving security.

Active Publication Date: 2019-07-16
SUZHOU KEDA TECH
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present invention provides a log encryption method and d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log encryption method and device and log decryption method and device
  • Log encryption method and device and log decryption method and device
  • Log encryption method and device and log decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] Example one

[0025] According to an embodiment of the present invention, a log encryption method is provided, such as figure 1 As shown, the method includes:

[0026] Step S11, obtain the plaintext log and the key;

[0027] Specifically, the plaintext log may be obtained from the PC terminal, or may be obtained from the mobile terminal. The key can be static or dynamically configured. When the key is dynamically configured, different levels of keys can be determined according to different confidential levels. The key can be stored in local storage or external storage.

[0028] Step S12, converting the plaintext log into an intermediate ciphertext, and converting the key into a key ciphertext;

[0029] Specifically, the plaintext log is converted into the intermediate ciphertext, and the key is converted into the key ciphertext. Through the above conversion, the first encryption of the data can be completed.

[0030] Step S13, encrypt the intermediate ciphertext by using the ke...

Example Embodiment

[0053] Example two

[0054] According to an embodiment of the present invention, a log decryption method is provided, such as figure 2 As shown, the method includes:

[0055] Step S21, obtain the ciphertext log and the key;

[0056] Specifically, the encrypted ciphertext log may be obtained from a PC or a mobile terminal. The key can be static or dynamically configured. When the key is dynamically configured, different levels of keys can be determined according to different confidentiality levels. The key can be stored in local storage or external storage.

[0057] Step S22: Convert the key to obtain the key ciphertext;

[0058] Step S23, using the key ciphertext to decrypt the ciphertext log to obtain an intermediate ciphertext;

[0059] Specifically, the ciphertext log is decrypted for the first time through the key ciphertext to obtain the intermediate ciphertext.

[0060] Step S24: Convert the intermediate ciphertext to obtain a plaintext log.

[0061] Specifically, by converting t...

Example Embodiment

[0081] Example three

[0082] According to an embodiment of the present invention, a log encryption device is provided, such as image 3 As shown, the device includes:

[0083] The first obtaining module 40 is used to obtain the plaintext log and the key; refer to the description of step S11 for details.

[0084] The first conversion module 41 is configured to convert the plaintext log into an intermediate ciphertext, and convert the key into a key ciphertext; refer to the description of step S12 for details.

[0085] The encryption module 42 is configured to encrypt the intermediate ciphertext by using the key ciphertext. See the description of step S13 for details.

[0086] In the embodiment of the present invention, the above-mentioned first obtaining module 40 is used to obtain a plaintext log and a key; the first conversion module 41 is used to convert the plaintext log into an intermediate ciphertext and convert the key Is the key ciphertext; the encryption module 42 is used to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a log encryption method and device and a log decryption method and device, and the log encryption method comprises the steps of obtaining a plaintext log and a secret key; converting the plaintext log into an intermediate ciphertext, and converting the key into a key ciphertext; and encrypting the intermediate ciphertext by using the key ciphertext, so that the problem thatin the prior art, a log encryption method is lower in safety, is solved.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to a log encryption method and decryption method and device. Background technique [0002] With the continuous development of network technology, data privacy protection has become a security function that network operators and Internet companies focus on. When using the Internet, everyone will leave some traces, such as using various system software, service software, application software, etc., which will more or less generate and save related logs. The log information on the Internet is huge, and the operations performed by users on the Internet can be obtained by analyzing related logs. [0003] In the current computer system, when logs are stored in plain text, there are two disadvantages: 1. Relevant users and intruders can easily see the contents of the logs, resulting in information leakage; 2. Relevant users and intruders can be protected from Controlling, tamperi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/18G06F21/60H04L9/08
CPCG06F21/602H04L9/0861G06F16/1815
Inventor 刘胜儒过全张伟康迪胡涛
Owner SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products