System for improving secret information storage and transmission security

A technology for secret information and custodian, applied in the field of improving the security of secret information safekeeping and transmission, it can solve the problems of slow encryption and decryption operation, stolen keys, garbled keys, etc., so as to reduce the risk of leakage and overcome loyalty degree, good protection effect

Active Publication Date: 2020-08-14
HANGZHOU DIANZI UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, both symmetric key encryption and asymmetric key encryption have certain defects. In addition, in the process of information storage, human leakage and theft are also uncontrollable security risks.
[0005] Symmetric key encryption has the following defects: (1) The key is easily stolen during the communication process; (2) Key management and distribution are cumbersome; (3) Identity authentication cannot be performed
[0006] Asymmetric key encryption has the following defects: (1) the speed of encryption and decryption operations is slow; (2) it takes up more computing space resources
[0008] However, there are still several problems in the mixed encryption system used in the information transmission process: (1) The encrypted key is generally a bunch of garbled characters, and information thieves can easily find out which information has been encrypted by the key, and the information is very difficult to obtain. It may be important information; (2) Once the key is damaged or lost during transmission, the information cannot be decrypted; (3) The key still has the risk of being stolen; (4) The loyalty of the key holder cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for improving secret information storage and transmission security
  • System for improving secret information storage and transmission security
  • System for improving secret information storage and transmission security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The specific embodiments of the present invention will be further described and illustrated in detail below in conjunction with the drawings and specific embodiments.

[0066] The process of secret information encryption and key distribution is as follows figure 1 As shown, the process of decrypting secret information is as follows figure 2 As shown, the process of changing the system's custodian authority is as follows image 3 Shown.

[0067] A system for improving the security of secret information storage and transmission, including an image steganography module, a sharing module, an encryption module, a decryption module, a file transmission module, a shadow image confusion module, a system interaction module, a security authentication module and a system database.

[0068] The system interaction module is connected to the security authentication module, the file transmission module, the encryption module, and the decryption module; the encryption module is connected to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a system for improving secret information storage and transmission security. The system comprises an image steganography module, a sharing module, an encryption module, a decryption module, a file transmission module, a shadow image confusion module, a system interaction module, a security authentication module and a system database. A user transmits secret information through the file transmission module, and the system interaction module and the security authentication module are used for login and operation of the user; the encryption of the secret information is carried out through the encryption module, the sharing module, the image steganography module and the shadow image confusion module, and secret keys are split and stored through a plurality of secret keystorages. According to the method, the situation that decryption cannot be carried out due to key loss is effectively overcome, the loyalty problem of a key keeper is effectively solved, the key is not held by a single person any more and is not held by multiple persons any more, better protection of the key can be achieved, and secret information of a user is better protected.

Description

Technical field [0001] The method belongs to the field of computer technology, and particularly relates to a method for improving the security of secret information safekeeping and delivery. Background technique [0002] In today's highly informatized world, the production of massive amounts of information and data has enriched our cyberspace. However, the leakage and theft of information and data has become increasingly serious. For government agencies, corporate hospitals, confidential departments and other institutions, the importance of information security is self-evident. Therefore, for secret information, people usually adopt necessary encryption methods in the process of storage and transmission. [0003] The key is a parameter that is used to input parameters in the algorithm for converting plaintext to ciphertext or ciphertext to plaintext. The keys are divided into symmetric keys and asymmetric keys. Due to the loopholes in the two traditional key encryption methods ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04N1/32
CPCH04L63/045H04L9/085H04L63/0428H04L63/083H04N1/32272
Inventor 袁理锋孙鹏飞刘永李金宸赵云天林杰陈星杵吴炳金徐瀚文
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products