Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method for network security

An encryption method and network security technology, applied in the encryption field of network security, can solve problems such as uneven security, high cost, troublesome deployment, etc., and achieve key security, ensure security, and improve encryption.

Pending Publication Date: 2021-11-30
严聚卫
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are still problems in the existing technology to solve network security. There are different encryption security algorithms among various company departments, which were integrated in their respective software modules before, and there is a large degree of repeated development and quality differences. The degree of coupling of application software is very high, and the degree of security is uneven. There are some disadvantages of different degrees in the existing commonly used encrypted transmission methods. Also known as "network gatekeeper" and "physical isolation gatekeeper", it is used to realize the security isolation between networks of different security levels and provide moderately controllable data exchange software and hardware systems, but the security isolation gatekeeper is expensive and difficult to deploy. Trouble and other defects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] see figure 1 , the present invention provides a kind of technical scheme: a kind of encryption method of network security, comprises the following steps:

[0026] Step 1. Regional division: divide the network according to different attributes and functions, and encrypt a single area.

[0027] Step 2. Network boundary protection: Security protection is carried out on the boundary between divided and encrypted networks to prevent the impact of network connection.

[0028] Step 3, RSA transmission: perform RSA encryption on the transmitted key and transmit it in one direction.

[0029] Step 4: Security intrusion detection: detect and protect the RSA encrypted key to prevent bad programs from being added during transmission.

[0030] Step 5, SM encryption: Encrypt the RSA encrypted key with the SM algorithm again.

[0031] Step 6. Algorithm analysis: Perform RSA analysis on the accessed key to ensure the correctness of the key.

[0032] Step 7. Message comparison and ve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security encryption method, and relates to the technical field of network security. The method comprises the following steps: S1, region division: dividing a network according to different attributes and effects, and encrypting a single region, and S2, network boundary protection: performing security protection on boundaries among the divided and encrypted networks to prevent the influence of network concatenation. According to the method, large environment of the whole network is regionally divided into different small environments, the boundary of each small environment is protected, on one hand, the encryption degree can be improved, on the other hand, encryption access can be finely divided, encryption is carried out according to different levels, and the encryption is more meticulous; and through RSA and SM encryption, it can be ensured that the internal key is safer and is not prone to being cracked and infected by common programs. Therefore, it can be guaranteed that the secret key is in a relatively safe environment state in the transmission process, and after the secret key is received, the secret key is cracked and compared through corresponding hardware and software so that the safety of the file can be guaranteed.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an encryption method for network security. Background technique [0002] Network security means that the hardware and software of the network system and the data in the system are protected from being damaged, changed, or leaked due to accidental or malicious reasons, the system runs continuously and reliably, and the network service is not interrupted. And the system must have the ability to protect the security of sensitive information to ensure the reliability and confidentiality of the system and network. A common method to protect sensitive information is encryption. There are many types of cryptographic algorithms that can be used in various occasions. [0003] There are still problems in the existing technology to solve network security. There are different encryption security algorithms among various company departments, which were integrated in their respective ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/14
CPCH04L63/0442H04L63/105H04L9/14
Inventor 严聚卫
Owner 严聚卫
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products