Supercharge Your Innovation With Domain-Expert AI Agents!

Data encryption storage method realized based on national cryptographic algorithm

A technology of data encryption and national secret algorithm, applied in the field of data encryption storage based on the national secret algorithm, can solve problems such as inability to guarantee security and low efficiency, and achieve the effect of improving encryption efficiency, improving security, and reducing performance overhead.

Pending Publication Date: 2022-03-08
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of encrypting and storing large files, the traditional method is to transfer the large files to a physical encryption machine for encryption, and then return them for storage. Although this can ensure the security of the data, it cannot guarantee the security of the transmission process. , and inefficient (will depend on various factors such as bandwidth)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption storage method realized based on national cryptographic algorithm
  • Data encryption storage method realized based on national cryptographic algorithm
  • Data encryption storage method realized based on national cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0046] The present invention is mainly aimed at designing how to ensure the security of data storage of large files during the process of using key management services, and realizes secure storage of data under the premise of ensuring efficiency.

[0047] The present invention includes three algorithms, SM2, SM3 and SM4, which are relatively mature and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption storage method implemented based on a national secret algorithm, which belongs to the field of data security and comprises four parts: issuing of an agreed Key, generation of a master key, generation of a data key and data encryption. The key management service serves as a life cycle management center of the key and is responsible for centralized management of the key, and the key cannot be obtained from the periphery and can be used by deriving a data key through a master key; and the encryption and decryption of the data are locally realized in a form of safely transmitting a data key. The data storage risk is reduced, and the security of the encryption key is improved.

Description

technical field [0001] The invention relates to the field of data security, in particular to a data encryption storage method based on a national secret algorithm. Background technique [0002] Strictly speaking, security technologies for data are mainly divided into three categories: hiding, access control, and cryptography. Data transmission security, data storage security, data access security control, etc. are all areas of data security. In order to solve this kind of data security problem, the national secret encryption algorithm is implemented, and the commercial version includes SM1, SM2, SM3, SM4, SM7 and SM9 algorithms. [0003] In the process of encrypting and storing large files, the traditional method is to transfer the large files to a physical encryption machine for encryption, and then return them for storage. Although this can ensure the security of the data, it cannot guarantee the security of the transmission process. , and is inefficient (will depend on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62H04L9/08
CPCG06F21/602G06F21/6218H04L9/0861H04L9/0894
Inventor 徐士强高传集董玉全
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More