Unlock instant, AI-driven research and patent intelligence for your innovation.

A business end user data encryption method and decryption method

A data encryption and end-user technology, applied in the field of encryption and decryption, can solve problems such as low security, cracked encryption and decryption algorithms, data leakage, etc., and achieve the effect of improving security

Active Publication Date: 2022-02-01
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Existing data encryption and decryption methods are either based on a specific algorithm for encryption and decryption processing according to the corresponding key. The simple encryption and decryption algorithm itself has the risk of being cracked, and key leakage will directly lead to data leakage, which is less secure. ; or perform special processing based on the underlying memory characteristics and the actual situation of the encryption and decryption scene, which does not have strong versatility and applicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A business end user data encryption method and decryption method
  • A business end user data encryption method and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Taking the encryption processing of user a data in business A as an example, the process is as follows:

[0045] 1. Start to encrypt the data of user a of business A, call the encryption function, and transmit the parameters A_id, a_id, data;

[0046] 2. Determine whether there is an A_id business key A_key, if not, generate the A business key A_key, if yes, call the business key;

[0047] 3. Generate random user key a_Key, select user data encryption algorithm alg_type, encryption parameter alg_param;

[0048] 4. User a key set generation: Encrypt the business ID with the user ID, fill in a fixed length, record it as the encrypted header infix, and set it as AAAaaa; use a digest algorithm to generate digital summary information for the encrypted header, fill in the fixed length, and record It is the encryption header prefix, which is assumed to be 111111; the encryption algorithm plus the encryption parameter encryption is recorded as the encryption header suffix, whi...

Embodiment 2

[0063] Taking the decryption of the encrypted ciphertext transmitted in Embodiment 1 as an example, the decryption process in this embodiment includes:

[0064] 1. The business end calls the decryption function, and the transmission parameter is the encrypted ciphertext AAAaaadadada;

[0065] 2. Analyze the ciphertext, reversely obtain business A, business user a, and data ciphertext dadada;

[0066] 3. Generate a digital digest 111111 according to the ciphertext header AAAaaa, and perform a balanced binary tree search in the key file according to this digital digest. Since the number of key sets is odd at this time, move the pointer to half the length of the key file One-half of the length of a single key set is subtracted from one place, and the prefix of the key header here is 111111. If it is smaller than the digest value of the key header prefix of the key set to be searched, move the key file pointer to the back Half of the half, if it is greater than the key header pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption and decryption technology, which discloses a user data encryption method and a decryption method at a service end, and improves the security of user key storage and the security of encryption and decryption. The encryption method includes: A. The service end invokes an encryption function, and the transmission parameters include a service identifier, a user identifier and user plaintext data to be encrypted; B. Judging whether there is a service key corresponding to the service identifier, and if not, generating a corresponding C. Generate a random user key according to the user ID, select an encryption algorithm and encryption parameters, encrypt the user plaintext data to be encrypted based on the random user key, and generate user data ciphertext; D. Generate A key set including the key header, business key ciphertext, and user key ciphertext; E. Write the generated key set into the key file. The invention is suitable for encryption and decryption of user data at the service end.

Description

technical field [0001] The invention relates to encryption and decryption technology, in particular to a method for encrypting and decrypting user data at a business end. Background technique [0002] As the carrier of information transmission, the Internet is an insecure information medium, and the communication protocol (TCP / IP protocol) it follows is inherently vulnerable. Because the original intention of designing the protocol was not out of consideration of communication security, but out of consideration of freedom of communication. Therefore, some services based on the TCP / IP protocol are also extremely insecure; Users, steal their network identities or bank account information, and then pretend to be legitimate users, further intrude into information systems, and illegally steal economic, political, and military secrets. In order to ensure the security of the Internet and give full play to the value of its commercial information exchange, people choose data encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/06H04L9/14
CPCH04L63/0428H04L9/0866H04L9/0861H04L9/0643H04L9/0894H04L9/14
Inventor 董海鹏代波
Owner SICHUAN CHANGHONG ELECTRIC CO LTD