Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A method and device for encryption management

An encryption machine and encryption service technology, applied in the computer field, can solve problems such as application system or user economic loss, achieve safe and effective management, ensure confidentiality, and solve security problems

Active Publication Date: 2022-07-19
CHINA CONSTRUCTION BANK
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Before there is no encryption service system, the data is transmitted in plain text. When the data is intercepted, if the data is leaked to a malicious third party, the modification of the data may bring great economic losses to the application system or users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for encryption management
  • A method and device for encryption management
  • A method and device for encryption management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding and should be considered as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted from the following description for clarity and conciseness.

[0089] It should be pointed out that the embodiments of the present invention and the technical features in the embodiments may be combined with each other without conflict.

[0090] figure 1 It is a schematic diagram of the main steps of the encryption management method according to the embodiment of the present invention.

[0091] like figure 1 As shown, the encryption ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for encryption management, and relates to the technical field of computers. A specific implementation of the method includes: receiving a configuration request from a target node or a peer node; using an encryption machine to hash the first node number, the second node number and the hash time into a first original key; based on the first original key The key generates a seed key, and returns the first node number, the second node number, the seed key and their generation time to the target node and the opposite node; The node number, the seed key and its generation time are used for the interaction between the target node and the peer node. This embodiment can safely and effectively manage the transmission key, solve the security problem of data transmission, and ensure the confidentiality, integrity and consistency of the data.

Description

technical field [0001] The present invention relates to the field of computer technology, and in particular, to a method and device for encryption management. Background technique [0002] With the advancement of informatization work, the various business systems of enterprises and companies are independent of each other, which leads to a series of security problems such as sensitive data transmission, data security storage, transaction message transmission, etc. These problems may lead to data leakage and file damage. Destruction and other security risks may cause immeasurable economic losses. [0003] Data and information security has attracted more and more attention from the public, which is a challenge and an opportunity for enterprises and companies. It can provide better data security protection, and will surely gain the trust of users, thereby occupying more markets. Strengthening the protection ability of data security, for enterprises and companies, is not only se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/06H04L9/08
CPCH04L63/0435H04L63/20H04L63/205H04L9/0643H04L9/0861H04L9/0869H04L9/0825H04L9/0891
Inventor 李爱宏闫党军
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products