Configurable interface encryption method and device, computer equipment and storage medium

An encryption method and encryption algorithm technology, applied in the field of information security, can solve the problems of poor compatibility of encryption algorithms, lack of scalability, and easy leakage of keys, so as to increase security, enhance invisibility, and reduce communication costs. Effect

Active Publication Date: 2022-05-13
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical solution of the present invention is to provide a configurable interface encryption method, device, computer equipment and storage medium for the deficiencies of the prior art, which solves the problem of The key agreed in the existing technology is easy to leak and the security is not high, and it also solves the problem of poor compatibility and scalability of the existing encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configurable interface encryption method and device, computer equipment and storage medium
  • Configurable interface encryption method and device, computer equipment and storage medium
  • Configurable interface encryption method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0057] Before formally introducing the embodiments of the present invention, the technical terms involved in the invention are explained as follows:

[0058] ① Symmetric encryption:

[0059] Using the single-key system encryption method, the same key can be used for both encryption and decryption of information.

[0060] Commonly used symmetric encryption algorithms are: AES, DES, 3DES.

[0061] ②Asymmetric encryption:

[0062] Asymmetric encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, and relates to a configurable interface encryption method and device, computer equipment and a storage medium. The encryption method comprises the following steps: acquiring encryption algorithm type information selected by a user; generating JSON data in a hierarchical data format; encrypting the JSON data to obtain first encrypted data; randomly generating a symmetric encryption key and an asymmetric encryption private key; performing symmetric encryption on a preset interface request parameter by adopting the symmetric encryption key to obtain second encrypted data; encrypting the symmetric encryption key by adopting the asymmetric encryption private key to obtain third encryption data; and splicing the first encrypted data, the second encrypted data and the third encrypted data to obtain interface encrypted data. The problems that in the prior art, an agreed secret key is prone to leakage and not high in safety are solved, and meanwhile the problems that an existing encryption algorithm is poor in compatibility and does not have expandability are solved. Meanwhile, the invention also relates to a block chain technology.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a configurable interface encryption method, device, computer equipment and storage medium. Background technique [0002] In the traditional interface encryption method, the client generally adopts the symmetric encryption method when encrypting data. The client and the server need to agree on the encryption algorithm and the corresponding encryption key in advance, and then the client configures the encryption algorithm and encryption key in the code. key to encrypt the interface data when requested. In this way, when each client connects to the server, it needs to agree on the corresponding encryption method, which is prone to hidden dangers of encryption method and key leakage. The system security is not high, and there is a risk that it may be cracked by the outside. [0003] In addition, the traditional interface encryption method will request the en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/045H04L63/06
Inventor 俞诗洪李炜
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products