Service key creation and service data encryption method, device and system

A business key and business data technology, which is applied in the fields of business key creation and business data encryption, can solve the problems that smooth switching cannot be achieved, and business data cannot be normally encrypted and decrypted.

Inactive Publication Date: 2019-08-23
ADVANCED NEW TECH CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, if the data on the business side is always only encrypted with a set of cryptographic devices, if the cryptographic device fails, a large amount of business data cannot be encrypted and decrypted normally; or, a large amount of data migration work is required when upgrading hardware devices, which cannot smooth switching

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service key creation and service data encryption method, device and system
  • Service key creation and service data encryption method, device and system
  • Service key creation and service data encryption method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order for those skilled in the art to better understand the technical solutions in the embodiments of this specification, the technical solutions in the embodiments of this specification will be described in detail below in conjunction with the drawings in the embodiments of this specification. Obviously, the described implementation Examples are only some of the embodiments in this specification, not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in this specification shall fall within the scope of protection.

[0043] In the embodiment of this specification, the process of business key creation and business data encryption involves a cryptosystem, and its system architecture diagram can be as follows figure 1 As shown, it includes one service end device 10 and at least two encryption end devices 20, 30 and so on.

[0044] Among them, the specific form of the service end device can be a specific server o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a service key creation and service data encryption method, device and system. The invention discloses a service key creating method. The method comprises: a service end obtaining an XA from a first password end; wherein the XA is a first secret key ciphertext of the service secret key obtained after the service secret key plaintext X is encrypted by using A; wherein the service key is generated by a first password end; the service end sending a first encryption conversion request carrying XA and C to the first password end; the first password end obtaining a first encryption conversion result XC according to the first encryption conversion request, and returning the XC to the service end; wherein the XC is obtained by encrypting X by using C; the service end sendinga second encryption conversion request carrying the XC to the second password end; the second password end obtaining a second encryption conversion result XB according to the second encryption conversion request, and returning the XB to the service end; wherein the XB is a second root key ciphertext of the service key obtained by encrypting X by using B; and the service end correspondingly storing the XA and the XB.

Description

technical field [0001] The embodiments of this specification relate to the field of Internet application technology, and in particular to a method, device, and system for creating a service key and encrypting service data. Background technique [0002] When processing sensitive data such as user passwords and bank information, it is usually necessary to encrypt the data before transmission and storage. [0003] In the prior art, a commonly used encryption method with a higher security level is to use a cryptographic device for encryption. For example, the business end first applies for a service key from the cryptographic device, and the business key is sent to the business end in ciphertext by the cryptographic device. If the business end sends the data to be encrypted together with the key ciphertext to the cryptographic device, it can obtain The data ciphertext returned by the cryptographic device. [0004] However, if the data on the business side is always only encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0816H04L9/0861
Inventor 谷胜才肖淑婷林孝旦赵阳
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products