Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and decryption method based on encryption proxy gateway, device and equipment

A technology of proxy gateway and encryption method, which is applied in the direction of secure communication devices, computer security devices, network connections, etc., and can solve problems such as low version update efficiency and large development workload

Active Publication Date: 2020-10-02
TENCENT TECH (SHENZHEN) CO LTD
View PDF14 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above method needs to integrate data encryption components in the client, and requires engineering transformation of the client, resulting in a large development workload and low version update efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and decryption method based on encryption proxy gateway, device and equipment
  • Encryption method and decryption method based on encryption proxy gateway, device and equipment
  • Encryption method and decryption method based on encryption proxy gateway, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0096] In order to facilitate the understanding of the methods provided in the embodiments of the present application, terms involved in the embodiments of the present application are firstly introduced.

[0097] Cloud computing (Cloud Computing) is a computing model that distributes computing tasks on a resource pool composed of a large number of computers, enabling various application systems to obtain computing power, storage space, and information services as needed. The network that provides resources is called a "cloud". From the user's point of view, the resources in the "cloud" can be infinitely expanded, and can be obtained at any time, used on demand, expanded at any time, and paid according to use. The encryption prox...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method and decryption method based on an encryption proxy gateway, a device and equipment, and relates to the technical field of cloud security. The encryption method comprises the following steps: receiving a storage request of a client, wherein the storage request comprises a first user account and plaintext data; when the first user account has the permission, obtaining an encryption key of the first user account; loading encryption configuration corresponding to the plaintext data; encrypting a target field in the plaintext data by adopting an encryption key according to the encryption configuration to obtain encrypted data; and storing the encrypted data into a data warehouse. In the encryption realization process, the client does not need to be transformed, and only needs to use the encryption service provided by the encryption proxy gateway. The development workload of the client is reduced, and the version updating efficiency of the clientis improved.

Description

technical field [0001] The present application relates to the field of cloud security technology, in particular to an encryption method, decryption method, device and equipment based on an encryption proxy gateway. Background technique [0002] With the increasing emphasis on data security in various industries, data encryption has been widely used as a way to ensure data security. [0003] Currently, an encryption component is usually integrated in a client that requires data encryption to implement data encryption. The encryption component can convert the data in the client through an encryption algorithm and an encryption key to obtain ciphertext data, thereby realizing the encryption of the data in the client. [0004] The above method needs to integrate data encryption components in the client, and requires engineering transformation of the client, resulting in a large development workload and low version update efficiency. Contents of the invention [0005] The pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L12/66H04L29/06H04L29/08G06F16/28G06F21/60
CPCH04L9/0877H04L9/3226H04L63/083H04L12/66G06F21/602G06F16/283H04L67/56
Inventor 王轩董志强李滨姬生利
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products