Unlock instant, AI-driven research and patent intelligence for your innovation.
A business end user data encryption method and decryption method
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A data encryption and end-user technology, applied in the field of encryption and decryption, can solve problems such as low security, cracked encryption and decryption algorithms, data leakage, etc., and achieve the effect of improving security
Active Publication Date: 2022-02-01
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF6 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0005] Existing data encryption and decryption methods are either based on a specific algorithm for encryption and decryption processing according to the corresponding key. The simple encryption and decryption algorithm itself has the risk of being cracked, and key leakage will directly lead to data leakage, which is less secure. ; or perform special processing based on the underlying memory characteristics and the actual situation of the encryption and decryption scene, which does not have strong versatility and applicability
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0044] Taking the encryption processing of user a data in business A as an example, the process is as follows:
[0045] 1. Start to encrypt the data of user a of business A, call the encryption function, and transmit the parameters A_id, a_id, data;
[0046] 2. Determine whether there is an A_id business key A_key, if not, generate the A business key A_key, if yes, call the business key;
[0047] 3. Generate random user key a_Key, select user data encryption algorithm alg_type, encryption parameter alg_param;
[0048] 4. User a key set generation: Encrypt the business ID with the user ID, fill in a fixed length, record it as the encrypted header infix, and set it as AAAaaa; use a digest algorithm to generate digital summary information for the encrypted header, fill in the fixed length, and record It is the encryption header prefix, which is assumed to be 111111; the encryption algorithm plus the encryption parameter encryption is recorded as the encryption header suffix, whi...
Embodiment 2
[0063] Taking the decryption of the encrypted ciphertext transmitted in Embodiment 1 as an example, the decryption process in this embodiment includes:
[0064] 1. The business end calls the decryption function, and the transmission parameter is the encrypted ciphertext AAAaaadadada;
[0065] 2. Analyze the ciphertext, reversely obtain business A, business user a, and data ciphertext dadada;
[0066] 3. Generate a digital digest 111111 according to the ciphertext header AAAaaa, and perform a balanced binary tree search in the key file according to this digital digest. Since the number of key sets is odd at this time, move the pointer to half the length of the key file One-half of the length of a single key set is subtracted from one place, and the prefix of the key header here is 111111. If it is smaller than the digest value of the key header prefix of the key set to be searched, move the key file pointer to the back Half of the half, if it is greater than the key header pre...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to an encryption and decryption technology, which discloses a user data encryption method and a decryption method at a service end, and improves the security of user key storage and the security of encryption and decryption. The encryption method includes: A. The service end invokes an encryption function, and the transmission parameters include a service identifier, a user identifier and user plaintext data to be encrypted; B. Judging whether there is a service key corresponding to the service identifier, and if not, generating a corresponding C. Generate a random user key according to the user ID, select an encryption algorithm and encryption parameters, encrypt the user plaintext data to be encrypted based on the random user key, and generate user data ciphertext; D. Generate A key set including the key header, business key ciphertext, and user key ciphertext; E. Write the generated key set into the key file. The invention is suitable for encryption and decryption of user data at the service end.
Description
technical field [0001] The invention relates to encryption and decryption technology, in particular to a method for encrypting and decrypting user data at a business end. Background technique [0002] As the carrier of information transmission, the Internet is an insecure information medium, and the communication protocol (TCP / IP protocol) it follows is inherently vulnerable. Because the original intention of designing the protocol was not out of consideration of communication security, but out of consideration of freedom of communication. Therefore, some services based on the TCP / IP protocol are also extremely insecure; Users, steal their network identities or bank account information, and then pretend to be legitimate users, further intrude into information systems, and illegally steal economic, political, and military secrets. In order to ensure the security of the Internet and give full play to the value of its commercial information exchange, people choose data encryp...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.