Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method, decryption method, device and equipment based on encryption proxy gateway

A proxy gateway and encryption method technology, applied in the direction of secure communication devices, computer security devices, network connections, etc., can solve the problems of large development workload, low version update efficiency, etc.

Active Publication Date: 2021-06-18
TENCENT TECH (SHENZHEN) CO LTD
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above method needs to integrate data encryption components in the client, and requires engineering transformation of the client, resulting in a large development workload and low version update efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, decryption method, device and equipment based on encryption proxy gateway
  • Encryption method, decryption method, device and equipment based on encryption proxy gateway
  • Encryption method, decryption method, device and equipment based on encryption proxy gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0096] In order to facilitate the understanding of the methods provided in the embodiments of the present application, terms involved in the embodiments of the present application are firstly introduced.

[0097] Cloud computing (Cloud Computing) is a computing model that distributes computing tasks on a resource pool composed of a large number of computers, enabling various application systems to obtain computing power, storage space, and information services as needed. The network that provides resources is called a "cloud". From the user's point of view, the resources in the "cloud" can be infinitely expanded, and can be obtained at any time, used on demand, expanded at any time, and paid according to use. The encryption prox...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses an encryption method, decryption method, device and equipment based on an encryption proxy gateway, and relates to the technical field of cloud security. The method includes: receiving a storage request from a client, where the storage request includes a first user account and plaintext data; when the first user account has authority, obtaining an encryption key of the first user account; loading an encryption configuration corresponding to the plaintext data; The encryption configuration uses the encryption key to encrypt the target field in the plaintext data to obtain encrypted data; store the encrypted data in the data warehouse. In the process of implementing encryption, there is no need to modify the client, only the client needs to use the encryption service provided by the encryption proxy gateway. The development workload of the client is reduced and the version update efficiency of the client is improved.

Description

technical field [0001] The present application relates to the field of cloud security technology, in particular to an encryption method, decryption method, device and equipment based on an encryption proxy gateway. Background technique [0002] With the increasing emphasis on data security in various industries, data encryption has been widely used as a way to ensure data security. [0003] Currently, an encryption component is usually integrated in a client that requires data encryption to implement data encryption. The encryption component can convert the data in the client through an encryption algorithm and an encryption key to obtain ciphertext data, thereby realizing the encryption of the data in the client. [0004] The above method needs to integrate data encryption components in the client, and requires engineering transformation of the client, resulting in a large development workload and low version update efficiency. Contents of the invention [0005] The pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L12/66H04L29/06H04L29/08G06F16/28G06F21/60
CPCH04L9/0877H04L9/3226H04L63/083H04L12/66G06F21/602G06F16/283H04L67/56
Inventor 王轩董志强李滨姬生利
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products