Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for symmetric encryption transmission of sensitive data in secret-related unit Web application webpage

A sensitive data, symmetric encryption technology, applied in the Internet field, can solve problems such as the inability to effectively protect sensitive information, and achieve the effect of avoiding leakage and resolving conflicts.

Pending Publication Date: 2020-12-04
HENAN VALLEY INNOVATION NETWORK TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the problem that existing sensitive information protection methods cannot effectively protect sensitive information on web pages in web applications, the present invention provides a method for symmetrically encrypted transmission of sensitive data in web application web pages of confidential units

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for symmetric encryption transmission of sensitive data in secret-related unit Web application webpage
  • Method for symmetric encryption transmission of sensitive data in secret-related unit Web application webpage
  • Method for symmetric encryption transmission of sensitive data in secret-related unit Web application webpage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] like figure 1 As shown, the embodiment of the present invention provides a method for symmetrically encrypted transmission of sensitive data in a web application web page of a secret-related unit, including the following steps:

[0043] S101: Determine whether an encryption operation is required;

[0044] Specifically, this embodiment provides two methods for judging tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a symmetric encryption transmission method for sensitive data in a secret-related unit Web application webpage. The method comprises the steps of: 1, judging whether encryptionoperation needs to be carried out or not; 2, when encryption is needed, defining an encryption key; 3, determining to-be-encrypted content in the webpage, and converting the to-be-encrypted content into binary content; 4, performing binary operation on the binary content and an encryption key to obtain an encryption code; 5, generating and storing a corresponding relationship between the encryption code and a display position of the to-be-encrypted content in the webpage; 6, when decryption is needed, restoring and displaying the to-be-encrypted content in the webpage according to the corresponding relationship. According to the invention, automatic or manual encryption and decryption can be carried out on Web page contents in three application scenes of a secret-related unit, so that leakage of sensitive information is avoided to a certain extent.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method for symmetric encrypted transmission of sensitive data in web application pages of secret-related organizations. Background technique [0002] my country is currently in the stage of rapid development of informatization. Informatization construction promotes information exchange and knowledge sharing, and can also significantly improve the efficiency of daily work. The security of sensitive information needs to be paid more attention to, especially the sensitive information of confidential units. At present, the protection schemes for sensitive data are all protection after data persistence. For example, Oracle database encryption is encrypted after data storage. For example, the encryption scheme of Inspur’s secret label system is also encrypted after documents and data are successfully stored. For example, the data encryption storage method disclosed in patent doc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06G06F16/958G06F21/31G06F21/60G06F21/62
CPCH04L63/0435H04L63/0876H04L9/321H04L9/0861G06F21/602G06F21/6263G06F21/31G06F16/958
Inventor 姚金龙郭印武德威谷晶中张阳光
Owner HENAN VALLEY INNOVATION NETWORK TECH