Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed system sensitive data transmission protection method and device

A distributed system and sensitive data technology, applied in the field of network security, can solve problems such as vulnerability to attack, troublesome application operation, integration, etc., and achieve the effect of preventing theft and illegal transmission and ensuring integrity

Active Publication Date: 2020-02-28
上海海加网络科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because these applications are cumbersome to operate, are not tightly integrated with the entire system and are vulnerable to attacks, general users are not willing to use them. This problem also exists in distributed systems. Network information security and data redundancy problems are still distributed How to ensure the security of sensitive data transmission is an urgent problem to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed system sensitive data transmission protection method and device
  • Distributed system sensitive data transmission protection method and device
  • Distributed system sensitive data transmission protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings of the present invention.

[0040] The sensitive data transmission protection method disclosed in the present invention is applied to a distributed system. The distributed system includes several nodes. The method includes that each node performs encryption processing and decryption processing, wherein, such as figure 1 As shown, the encryption process includes the following steps:

[0041] Step S100, randomly generate a symmetric key RKey, encrypt the read data through the symmetric key RKey, generate the main body data Body, configure the life length T of the data at the same time, and perform asymmetric encryption on the symmetric key RKey Encryption processing to generate encrypted symmetric key SEC;

[0042] Specifically, during the data transmission process, the node encrypts the data, and the node random...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed system sensitive data transmission protection method and device. The method comprises the following steps: encryption and decryption, and the encryption comprisesthe random generation of a symmetric secret key and the symmetric encryption of data; setting the life length of the data, asymmetrically encrypting the symmetric key, Meanwhile, carrying out hash function hash conversion to finally form encrypted data; wherein the decryption processing comprises the steps of obtaining the head and main body data of the encrypted data, and decrypting the encrypted symmetric key in the head to obtain the symmetric key; performing hash calculation on the main body data, the life length and the encrypted symmetric key in the head, and encrypting a calculation result through the symmetric key to obtain a hash message authentication code; and judging whether the hash message authentication code is matched or not, decrypting the main body data to obtain plaintext data when the hash message authentication code is matched and the life length is valid, and destroying the encrypted symmetric key. According to the invention, the safety in the sensitive data transmission process can be ensured.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for protecting sensitive data transmission in a distributed system. Background technique [0002] In recent years, protecting sensitive data from being leaked has become a hot issue that people pay attention to. In addition to directly stealing physical storage devices, intruders can also steal file data through network attacks; moreover, due to sharing requirements, sensitive data will be accessed by multiple people, which also increases the possibility of leakage. [0003] Encrypting data or files has become a recognized and successful protection method. In fact, people have already developed many excellent encryption algorithms, such as DES, AES, RSA, etc., and some applications such as crypt use these encryption algorithms, and users use these tools to manually complete encryption and decryption. Because these applications are cumbersome to oper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/14H04L9/32
CPCH04L63/045H04L63/12H04L9/14H04L9/3242
Inventor 郑朝晖王健翔周肖宏
Owner 上海海加网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products