System security encryption and decryption method and device, computer equipment and storage medium

A system security, encryption and decryption technology, applied in the system security encryption and decryption method, computer equipment and storage medium, device field, can solve the problem of being easily invaded, and achieve the effect of ensuring security

Pending Publication Date: 2022-04-08
深圳通康创智技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In network devices based on the Linux system, important parameters of the device, such as web login account passwords, WiFi account passwords, ssh / telnet account passwords, etc., are directly stored in the configuration file in plain text, which is easy to be invaded or even obtained administrator privileges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System security encryption and decryption method and device, computer equipment and storage medium
  • System security encryption and decryption method and device, computer equipment and storage medium
  • System security encryption and decryption method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0075] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0076] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a system security encryption and decryption method and device, computer equipment and a storage medium. The method comprises the steps of obtaining a data processing request; judging whether the data processing request is a data encryption request or not; if the data processing request is a data encryption request, encrypting original data according to the data processing request in combination with a key to obtain an encryption result; storing an encryption result in a configuration file; when the secret key is updated, re-encrypting the original data corresponding to the encryption result according to the new secret key so as to update the encryption result; if the data processing request is not the data encryption request, reading a corresponding encryption result from the configuration file according to the data processing request; decrypting the encryption result to obtain a decryption result; and outputting a decryption result. By implementing the method provided by the embodiment of the invention, the data of the system can be encrypted and decrypted, and the secret key is updated in real time, so that the security of the data is ensured.

Description

technical field [0001] The present invention relates to an encryption and decryption method, and more specifically refers to a system security encryption and decryption method, device, computer equipment and storage medium. Background technique [0002] In network devices based on the Linux system, important parameters of the device, such as web login account passwords, WiFi account passwords, ssh / telnet account passwords, etc., are directly stored in the configuration file in plain text, which is easy to be invaded or even obtained administrator rights. [0003] Therefore, it is necessary to design a new method to realize the encryption and decryption of the data in the system, and update the key in real time to ensure the security of the data. Contents of the invention [0004] The purpose of the present invention is to overcome the defects of the prior art and provide a system security encryption and decryption method, device, computer equipment and storage medium. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L9/06H04L9/08H04L9/40
Inventor 华泰谢宁李柱栋
Owner 深圳通康创智技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products