Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensitive information trans-encryption method and system under micro-service framework

A sensitive information and micro-service technology, applied in the sensitive information transfer encryption method and system field under the micro-service framework, can solve the problems of complex key mapping relationship, increased development and transformation workload, and decreased search efficiency, so as to ensure security, The effect of reducing the workload of application development and transformation and reducing the workload of key maintenance

Active Publication Date: 2020-12-08
CHINA CITIC BANK
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in the process of implementing the transformation of microservice architecture, in order to ensure the security of transaction password transmission, any caller node and server node in the application need to agree on the symmetric key for encrypting sensitive information and store it in the encryption machine. With the gradual splitting of microservices and the gradual construction of application systems, the number of keys stored in the encryption machine has increased significantly, which directly leads to a continuous decline in search efficiency, and with the increase of keys, the key mapping relationship maintained by the application side will become more complex, which is extremely difficult. Greatly increased the workload of development and transformation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information trans-encryption method and system under micro-service framework
  • Sensitive information trans-encryption method and system under micro-service framework

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to understand the content of the present invention more clearly, it will be described in detail with reference to the drawings and embodiments.

[0037] Such as figure 1 Shown is a flow of a preferred embodiment of the sensitive information transfer encryption method under the microservice framework of the present invention, including the following steps:

[0038] S1. Configure the key agreed between the calling node and the preceding node in the encryption machine, configure the key agreed between the service node and the calling node, configure the key agreed between the service node and the following node, and provide the corresponding key for the calling node and the service node The configuration uses the node ID and authorization code to provide access to the encryption machine.

[0039] S2. After the invoking node receives the packet containing sensitive information (such as payment password) from the preceding node, it sends request information to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a sensitive information trans-encryption method and system under a micro-service framework, a trans-encryption key is dynamically generated by using a main key and an access relationship identifier stored in an encryption machine, and the encryption machine only needs to maintain a small number of mapping relationships between the main key and an application end key, so that the key maintenance workload is greatly reduced.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for converting and encrypting sensitive information under a microservice framework. Background technique [0002] At present, many companies are using Spring Cloud and istio microservice frameworks to carry out microservice architecture transformation. The microservice framework provides a general security mechanism, but it does not consider implementing an encrypted transmission mechanism for sensitive fields at the application layer, such as the confidential transmission of payment passwords. [0003] At present, in the process of implementing the transformation of microservice architecture, in order to ensure the security of transaction password transmission, any caller node and server node in the application need to agree on the symmetric key for encrypting sensitive information and store it in the encryption machine. With the gradual splitti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06G06Q20/38
CPCH04L9/0863H04L63/0428G06Q20/3829
Inventor 朱文义
Owner CHINA CITIC BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products