Data encryption and decryption and key distribution method and device, equipment and readable storage medium

A technology for encrypting public keys and session keys, which is applied in the computer field and can solve problems such as data leakage, poor security of pseudo-random numbers, and low security of encrypted data

Active Publication Date: 2019-11-19
北京明朝万达科技股份有限公司
View PDF11 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In related technologies, the technical solution adopted in the data leakage prevention system to realize the point-to-point encryption of data is: by using the encryption public-private key and signature public-private key embedded in the program, pseudo-random numbers and algorithms such as RSA, DES, and SHA1, the Data is encryp

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption and key distribution method and device, equipment and readable storage medium
  • Data encryption and decryption and key distribution method and device, equipment and readable storage medium
  • Data encryption and decryption and key distribution method and device, equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, rather than all of them. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of this application.

[0091] The inventor of the present application discovered in the process of implementing the present application that, in related technologies, the technical solution adopted for point-to-point encryption of data in the data leakage prevention system is: through the use of encrypted public and private keys and signature public and private keys embedded in the program , Pseudo-random number and RSA, DES, SHA1 and other algorithms to encrypt data point-to-poi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data encryption method, the method is applied to a first terminal, and the method comprises the steps: determining a to-be-encrypted file selected by a userof the first terminal and a selected target user under the condition that a first intelligent password key is detected to be inserted into the first terminal; calculating the file content of the to-be-encrypted file according to an SM3 algorithm to obtain an abstract of the file content of the to-be-encrypted file; signing the abstract according to a signature private key of a user of the first terminal stored in the first intelligent password key to obtain a signature abstract; taking a true random number generated by the first intelligent password key as a session key, and encrypting the session key according to the target encryption public key and an SM2 algorithm to obtain a session key ciphertext; encrypting the file content of the to-be-encrypted file according to the session key andan SM4 algorithm to obtain ciphertext content; therefore, the security of the encrypted data is improved.

Description

Technical field [0001] The embodiments of the present application relate to the field of computer technology, and in particular to a method, device, electronic device, and readable storage medium for data encryption, key issuance, and data decryption. Background technique [0002] With the rapid development of information science and Internet technology, data security issues have intensified, and network and information security have received unprecedented attention. As a terminal protection method for data security, the data leakage prevention system has received extensive attention and use. The point-to-point encryption and decryption of data is one of the important components of the system, and it also plays a key role in the use and development of the entire system. . [0003] In related technologies, the technical solution adopted in the data leakage prevention system to realize the point-to-point encryption of data is: through the use of encryption public and private keys an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L9/3263H04L63/0428
Inventor 袁朝喻波王志海秦凯安鹏郭岩岭
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products