Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data decryption method and device

A data decryption and data encryption technology, applied in the field of data processing, can solve the problems of longer copying time, cracking, complicated operation, etc., to reduce the consumption of computing resources, improve security, and improve the effect of experience.

Pending Publication Date: 2021-08-24
ALIBABA GRP HLDG LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of Internet technology, cloud storage is accepted by more and more users. Cloud storage can not only bring convenient services to users, but also ensure data security. It is a new trend for users to store data, and a large number of Most platforms corresponding to public cloud storage will establish a key escrow mechanism to achieve the purpose of transparent encryption; however, although single-encrypted data can achieve the purpose of improving data security, there is still the possibility of being cracked, and in the data In the sharing scenario, there is also the problem of key ownership. If you want to share data, you need to copy the data. This process is not only complicated to operate, but also the time to copy data will become longer as the amount of data increases. , data security also has certain risks; therefore, an effective solution is urgently needed to solve this problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data decryption method and device
  • Data decryption method and device
  • Data decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0128] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.

[0129] Terms used in one or more embodiments of the present application are for the purpose of describing specific embodiments only, and are not intended to limit the one or more embodiments of the present application. As used in one or more embodiments of this application and the appended claims, the singular forms "a", "the", and "the" are also intended to include the plural forms unless the context clearly dictates otherwise. It should also be understood that the term "and / or" used in one or more embodiments of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data decryption method and device and a data encryption method and device. The data decryption method comprises the steps of obtaining a data request submitted for encrypted data in a storage space; sending an identity identifier contained in the data request to a key management interface; according to second-level ciphertext data returned by the key management interface, determining a second-level key having a corresponding relationship with the second-level ciphertext data; performing decryption processing on first-level ciphertext data corresponding to the second-level ciphertext data based on the second-level key to obtain a first-level key; and performing decryption processing on the encrypted data according to the first-level key to obtain target data.

Description

technical field [0001] The present application relates to the technical field of data processing, in particular to a data decryption method and device. Background technique [0002] With the development of Internet technology, cloud storage is accepted by more and more users. Cloud storage can not only bring convenient services to users, but also ensure data security. It is a new trend for users to store data, and a large number of Most platforms corresponding to public cloud storage will establish a key escrow mechanism to achieve the purpose of transparent encryption; however, although single-encrypted data can achieve the purpose of improving data security, there is still the possibility of being cracked, and in the data In the sharing scenario, there is also the problem of key ownership. If you want to share data, you need to copy the data. This process is not only complicated to operate, but also the time to copy data will become longer as the amount of data increases. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 廖武钧
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products