Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption storage method, data encryption search method, data encryption application method and related equipment

A technology of data encryption and search methods, applied in the field of data security, can solve problems such as malicious attacks, data leakage, data loss of control, etc., to avoid leakage, reduce the risk of data leakage, and improve the safety factor.

Pending Publication Date: 2021-03-16
深圳市琦迹技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in related technologies, when data needs to be sent to other application services for processing, other application services need to decrypt the data first to obtain the plaintext, and then perform calculation and processing. If the data is decrypted, maliciously attacked or Deliberate disclosure, which will lead to loss of data control, and there is a risk of data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption storage method, data encryption search method, data encryption application method and related equipment
  • Data encryption storage method, data encryption search method, data encryption application method and related equipment
  • Data encryption storage method, data encryption search method, data encryption application method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0051] The invention provides a data encryption storage method, which comprises the following steps:

[0052] performing a first encryption process on the plaintext data using a preset first encryption algorithm and a preset first key to obtain first ciphertext data;

[0053] Obtain the first ciphertext data and a ciphertext data processing algorithm corresponding to the first ciphertext data, and use a preset second encryption algorithm and a preset second ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption and storage method, and the method comprises the following steps: encrypting plaintext data to obtain first ciphertext data, and then encrypting the first ciphertext data and a ciphertext data processing algorithm to obtain second ciphertext data and store the second ciphertext data. The data encryption search method comprises the steps of encrypting searchinformation, decrypting second ciphertext data, carrying out operation processing on the search ciphertext data and first ciphertext data by utilizing a ciphertext data processing algorithm, then carrying out comparison judgment according to an operation result, obtaining the first ciphertext data matched with the search information according to a judgment result, and finally, decrypting and outputting plaintext data. A data application method comprises the following steps: decrypting second ciphertext data, processing first ciphertext data by utilizing a ciphertext data processing algorithmto obtain a first data result, and finally decrypting the first data result to obtain plaintext data required by a user. Compared with the prior art, the data encryption storage method, the encryptionsearch method, the encryption search method, the encryption search method, the encryption search application method and the related devices prevent data leakage and are high in safety coefficient.

Description

【Technical field】 [0001] The present invention relates to the field of data security, in particular to a data encryption storage method, encryption search, application method and related equipment. 【Background technique】 [0002] In today's society, data security management is becoming more and more important, especially the data information related to the core interests of enterprises, for example, data information related to the development strategy and technical secrets of enterprises. Estimated economic losses, therefore, the application of anti-data leakage methods in data security management work is particularly important. [0003] In the anti-data leakage method of the related art, the data is encrypted by using symmetric encryption or asymmetric encryption algorithm, and then stored in the database; The key and the decryption function decrypt the ciphertext to obtain the plaintext, and finally calculate and process the plaintext. [0004] However, in related techno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218
Inventor 王根平林培清谢华炎
Owner 深圳市琦迹技术有限公司