Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A decryption method, system, electronic equipment and storage medium

A technology for encrypting, decrypting and encrypting data, which is applied in transmission systems, digital transmission systems, electrical components, etc. It can solve the problems of lack of simple and effective encryption and decryption methods for data interaction, and achieve data pointing problems, less computation, and encryption and decryption The effect of simple method

Active Publication Date: 2021-12-28
北京云思畅想科技有限公司
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of this application is to provide an encryption and decryption method, system, electronic equipment and storage medium to solve the problem of lack of simple and effective encryption and decryption methods in the data interaction of the visualized ceph system in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A decryption method, system, electronic equipment and storage medium
  • A decryption method, system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0039] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses an encryption and decryption method, system, electronic equipment and storage medium. The method comprises: collecting effective characters of clusterID in the ceph cluster; reorganizing the effective characters of clusterID through rule A; performing hash operation on the effective characters of clusterID after reorganization to produce key values; forming a binary group; Do an XOR operation to obtain the XOR operation result as a secret key for encryption or decryption; obtain the data or encrypted data of the internal data structure of ceph; use the secret key to encrypt the data of the internal data structure of ceph, or decrypt the encrypted data deal with. The system includes: acquisition module, recombination module, operation module, binary group module, XOR operation module, data acquisition module, encryption and decryption module. The present application solves the problem that the data interaction of the visualized ceph system lacks a simple and effective encryption and decryption method.

Description

technical field [0001] The present application relates to the technical field of encryption and decryption, and in particular, to an encryption and decryption method, system, electronic equipment, and storage medium. Background technique [0002] At present, ceph is a commonly used distributed storage system today. Relevant personnel such as operation and maintenance and big data hope to visually display the mapping relationship of ceph's internal data structure. However, if you want to display the mapping relationship of ceph's internal data structure, data interaction is inevitable. If the security of data interaction is not guaranteed, it will pose a great security threat to the ceph system. [0003] General data interaction requires encryption and decryption to ensure safe data transmission. The existing encryption and decryption technologies cannot be directly used in the ceph system, because there is a ceph cluster in the ceph system, and multiple servers request data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/08G06F21/34G06F21/60
CPCH04L67/1097H04L63/0428H04L9/0816G06F21/34G06F21/602
Inventor 傅治宇黄启功王磊
Owner 北京云思畅想科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products