Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method and device based on national password, storage medium and electronic equipment

A technology of data processing and equipment, applied in the field of network security

Active Publication Date: 2021-02-23
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, if the OpenSSL software library is used for SSL encryption based on the National Secret Algorithm, a large amount of OpenSSL core code modification work is required to add the National Secret hardware encryption device to OpenSSL, and developers are also required to be very familiar with OpenSSL The core code design, on the one hand, puts forward higher requirements for developers. On the other hand, by changing the core code, the national secret algorithm of the national secret hardware encryption device is replaced by the OpenSSL algorithm, which is highly dependent on OpenSSL. , if the OpenSSL version is upgraded, the core code needs to be re-modified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device based on national password, storage medium and electronic equipment
  • Data processing method and device based on national password, storage medium and electronic equipment
  • Data processing method and device based on national password, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. It should be noted that like numerals and letters denote similar items in the following figures, therefore, once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. The term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements but also other elements not expressly listed elements, or also elements inherent in such a process, method, article, or apparatus. Without further limitations, an element defined by the phrase "comprising a ..." does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising said element. The terms "first"...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, and provides a data processing method and device based on national secret, a storage medium and electronic equipment. The method comprises the steps of converting a data structure of to-be-processed data sent by a target program through an engine interface from a data outgoing standard structure specified by the target program intoa standard structure which can be analyzed by national cryptographic hardware cryptographic equipment to obtain first converted data; sending the first converted data to the national cryptographic hardware cryptographic equipment; converting the data structure of the processed data returned by the national cryptographic hardware cryptographic equipment from the data outgoing standard structure specified by the national cryptographic hardware cryptographic equipment into a standard structure which can be analyzed by the target program to obtain second converted data; and sending the second converted data to the target program through the engine interface, so that the target program performs a subsequent encryption communication process based on the second converted data. According to the method, the cryptographic hardware cryptographic equipment can be added into the target program through an engine mechanism, and core codes of the program do not need to be modified.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a data processing method, device, storage medium and electronic equipment based on national secrets. Background technique [0002] With the rapid development of informatization, more and more attention has been paid to information security, among which secure communication is particularly important. Now mainstream websites and applications generally use HTTPS for communication encryption, that is, an SSL encryption layer is added on the basis of HTTP. With the acceleration of the localization process, the use of national secret algorithms for SSL encryption is becoming more and more common. In order to improve the communication security level and the data processing performance during encryption, it is required to use a hardware cryptographic device that supports national secret algorithms in certain scenarios, so as to increase the encryption level in this way. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L9/32
CPCH04L63/0428H04L9/0819H04L9/3247H04L67/565
Inventor 张云禄刘禄丹
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products