A data encryption and decryption method, data uploading end, data receiving end and system

A data decryption and data encryption technology, applied in the field of blockchain, can solve data security problems such as hidden dangers

Active Publication Date: 2021-11-23
JIANGXI AGRICULTURAL UNIVERSITY
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Based on this, the object of the present invention is to provide a data encryption and decryption method, a data uploading terminal, a data receiving terminal and a system, which are used to solve the technical problem that the encryption algorithm in the prior art needs to manage keys, which leads to potential safety hazards in data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption and decryption method, data uploading end, data receiving end and system
  • A data encryption and decryption method, data uploading end, data receiving end and system
  • A data encryption and decryption method, data uploading end, data receiving end and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] In the embodiment of the present invention, please refer to image 3 , image 3 It is a schematic diagram of the data encryption method in the embodiment of the present invention, such as image 3 As shown, the method includes step S101 to step S104:

[0055] S101. Obtain data plaintext, perform serialization processing on the data plaintext, and obtain byte stream plaintext.

[0056] First, serialize the data to be encrypted, where the data to be encrypted is the data plaintext, then use the AES key generated by the key generation algorithm to perform AES encryption on the serialized data, and finally encrypt the encrypted data with the k-v key Value pairs are stored in the state of the blockchain world.

[0057] S102. Obtain an AES key, and perform AES algorithm encryption on the byte stream plaintext in combination with the AES key to obtain data ciphertext.

[0058] In the data input phase, the data owner uploads the password of the data to be encrypted to the c...

Embodiment 2

[0090] An embodiment of the present application also provides a data upload terminal, including:

[0091] The data plaintext acquisition module is used to obtain the data plaintext, serialize the data plaintext, and obtain the byte stream plaintext;

[0092] The encryption module is used to obtain the AES key, and combines the AES key to perform AES algorithm encryption on the byte stream plaintext to obtain the data ciphertext;

[0093] An encoding module, configured to encode the data ciphertext to obtain the string ciphertext;

[0094] The writing module is used to write the string ciphertext into the blockchain database via data uplink.

[0095] To sum up, the data uploader in the above-mentioned embodiments of the present invention performs AES algorithm encryption on the byte stream plaintext obtained by serializing the data plaintext combined with the AES key to the data plaintext, and the obtained data ciphertext is uploaded to the In the blockchain database, when th...

Embodiment 3

[0097] Another aspect of the embodiment of the present application provides a data receiving end, including:

[0098] The data ciphertext acquisition module is used to obtain the data ciphertext sent by the blockchain database;

[0099] The authentication module is used to obtain the decryption password input by the user, and obtain the preset password from the Bloom filter of the blockchain database, and authenticate the decryption password and the preset password. The preset password is pre-stored before the data ciphertext is uploaded to the chain passphrase into the Bloom filter;

[0100] The first execution module, when the authentication is passed, decrypts the data ciphertext with the AES algorithm, deserializes the data ciphertext decrypted by the AES algorithm, obtains the data plaintext corresponding to the data ciphertext, and outputs the data plaintext;

[0101] The second execution module outputs data ciphertext when the authentication fails.

[0102] To sum up,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a data encryption and decryption method, a data uploading terminal, a data receiving terminal and a system. The method includes an encryption method and a decryption method. The encryption method includes: obtaining data plaintext and an AES key, and combining the AES key to encrypt the data plaintext, Obtain the data ciphertext; encode the data ciphertext to obtain a string ciphertext and write it into the blockchain database. The decryption method includes: obtaining data ciphertext, a decryption password and a preset password, and authenticating the decryption password and the preset password; when the authentication is passed, outputting the data plaintext; when the authentication is not passed, outputting the data ciphertext. The above data encryption and decryption method, data uploading end, data receiving end and system, through password authentication, does not involve key distribution, and different Bloom filters can be set for different groups of data for verification, so as to realize the differential verification of data , to ensure data security, and solve the technical problem that encryption algorithms in the prior art need to manage keys, resulting in potential safety hazards in data security.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a data encryption and decryption method, a data uploading terminal, a data receiving terminal and a system. Background technique [0002] Information security is a hot topic of widespread concern in today's society, and the protection of private data is the top priority. Privacy data not only needs to be kept secret from other users except the data owner, but also needs to be kept secret from the data storage unit. The development of cryptography provides technical support for the former, and the emergence of blockchain technology removes obstacles for the latter. [0003] The smart contract is the key logic code in the blockchain, which runs in a securely isolated virtual machine and is the middle layer of data from the client to the database. A smart contract is essentially a series of codes that are automatically executed by a computer. According to preset condit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/6245G06F21/602
Inventor 易文龙赵小敏赵应丁李求德殷华徐亦璐
Owner JIANGXI AGRICULTURAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products