Data encryption method and device based on encryption algorithm and computer equipment

An encryption algorithm and data encryption technology, applied in encryption devices with shift registers/memory, secure communication devices, digital transmission systems, etc., to achieve the effect of protecting AES keys

Active Publication Date: 2020-02-28
深圳市信联征信有限公司
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But if RAS encryption is used to encrypt sensitive data into the database, there will be a problem that the RSA p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device based on encryption algorithm and computer equipment
  • Data encryption method and device based on encryption algorithm and computer equipment
  • Data encryption method and device based on encryption algorithm and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0040] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data encryption method and device based on an encryption algorithm and computer equipment, and the method comprises the steps: carrying out the encryption of a file through anAES encryption algorithm and an AES secret key, and obtaining a file ciphertext; encrypting the secret key of the AES through the public key of the RSA to obtain a secret key ciphertext; storing thepublic key and the private key of the RSA into a KeyStore file of a management tool of the Java data certificate, wherein the KeyStore file generates a KeyStore password; storing the file ciphertext,the key ciphertext and the KeyStore password into an SO dynamic library; and performing code obfuscation on Java program codes used in the encryption process through a ProGuard code obfuscation tool.The method has the beneficial effects that the RSA private key is stored by using the KeyStore key, so that the RSA private key is safer and cannot be violently cracked. And the SO dynamic inventory KeyStore password and the encrypted ciphertext of the RSA are used, so that the KeyStore password and the encrypted ciphertext of the RSA are more difficult to analyze and obtain. Code obfuscation is carried out by using a ProGuard tool, so that the code implementation process cannot be effectively decompiled.

Description

technical field [0001] The present invention relates to an encryption method, device and computer equipment, in particular to a data encryption method, device and computer equipment based on an encryption algorithm. Background technique [0002] AES encryption is a commonly used symmetric encryption method in the industry, which can be used to encrypt sensitive information; encrypt and transmit important and secret data to prevent data from being stolen and information from being leaked. Although the encryption efficiency of AES encryption and decryption is very high, it is not safe. Once his key is leaked, the data can be decrypted. [0003] A commonly used solution in the industry is to use RAS asymmetric encryption to encrypt the AES key. For remote data transmission, this method is no problem. However, if RAS encryption is used to encrypt sensitive data into the database, there will be a problem that the RSA private key is also exposed, because it is all in the local en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0825H04L9/0631Y02D30/50
Inventor 李林瑞王彪陈二鑫
Owner 深圳市信联征信有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products