Data encryption method, system and terminal

A data encryption and encryption key technology, applied in the field of information security, can solve the problems of being attacked, leaked, unable to modify the password, etc., to achieve the effect of enhancing security and ensuring security

Active Publication Date: 2019-11-01
WATCHDATA SYST +1
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing data encryption and storage methods usually have the following defects: input and verification of user passwords in an untrusted environment, there is a risk of leakage; data encryption and storage in an untrusted environment, there is a risk of being attacked; data, the password cannot be changed, or all data needs to be re-encrypted with a new password; all data encrypted with the same password has the same encryption key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, system and terminal
  • Data encryption method, system and terminal
  • Data encryption method, system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that unless specifically stated otherwise, the relative arrangement, numerical expressions and numerical values ​​of the components and steps set forth in these embodiments do not limit the scope of the present invention.

[0039] At the same time, it should be understood that, for ease of description, the sizes of the various parts shown in the drawings are not drawn in accordance with actual proportional relationships.

[0040] The following description of at least one exemplary embodiment is actually only illustrative, and in no way serves as any limitation to the present invention and its application or use.

[0041] The technologies, methods, and equipment known to those of ordinary skill in the relevant fields may not be discussed in detail, but where appropriate, the technologies, methods, and equipment should be regarded...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data encryption method, system and a terminal. The method comprises the following steps: a trusted component receiving a verification password input in a trusted environment; and if the verification password is successfully verified, performing corresponding operation on the encryption key and the association relationship between the encryption key and the user password based on a preset key management rule and operation information input in the trusted environment, encrypting the data based on the encryption key, and storing the encrypted data. According to the method, the system and the terminal, the user password can be input and verified in the trusted environment, and the password is prevented from being monitored, intercepted and leaked. Data is encrypted and stored in a trusted environment, so that the security is remarkably enhanced. A plurality of different encryption keys can be managed and protected by one password. The encryptionkey is not changed when the password is modified, the target data does not need to be encrypted again, and the security of the data can be ensured.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular to a data encryption method, system and terminal. Background technique [0002] Currently, most of the terminals integrate a Trusted Execution Environment (TEE) and a Rich Execution Environment (REE). REE is composed of a client application (CA, ClientApplication) and an application operating system. TEE consists of a trusted application (TA, Trusted Application) and a trusted operating system (Trusted OS, Trusted Operating System). REE supports a wealth of applications, but REE has certain security risks. Existing data encryption and storage methods usually have the following shortcomings: input and verification of user passwords in an untrusted environment, there is a risk of leakage; data encryption and storage in an untrusted environment, there is a risk of attack; for encrypted Data, the password cannot be changed, or all data needs to be re-encrypted with a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06G06F21/60
CPCH04L9/3226H04L9/0863H04L63/083H04L9/0869G06F21/602
Inventor 张渊成秋良李勃
Owner WATCHDATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products