Unlock instant, AI-driven research and patent intelligence for your innovation.

Centralized encryption management system

A centralized management and encryption processing technology, applied in the field of information encryption/decryption systems, can solve many labor and other problems

Inactive Publication Date: 2005-08-10
ONICIX GRP L A
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there is a problem that a lot of labor is required to build a system using passwords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Centralized encryption management system
  • Centralized encryption management system
  • Centralized encryption management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] One embodiment of the present invention will be described below with reference to the drawings.

[0020] FIG. 1 is a diagram showing an example of the overall configuration of an encrypted centralized management system according to the present embodiment.

[0021] In FIG. 1, 1 is a cryptographic device, which has two ports. Devices such as a network printer 2, a DB server 3, and a network terminal device 4 are connected to one port, and a hub 5 is connected to the other port. The encryption device 1 performs data relay between devices such as a network printer 2 , a DB server 3 , a network terminal device 4 and a hub 5 .

[0022] The network printer 2 is a terminal on which encryption software cannot be physically installed. The DB server 3 is not suitable for a terminal on which redundant encryption software is installed due to issues such as stability of operation. The network terminal device 4 is a terminal that cannot run cryptographic software without an OS (Oper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cryptographic device (1), comprising an encryption and a decryption processing mechanism, which is characterized in that: the encryption processing and the decryption processing of the cryptography are carried out between the terminals introduced with a cryptographic processing function, so as to realize the safety of the terminal ensured by the encryption; the cryptographic device (1) and a plurality of communication terminals (2 to 9) used for carrying out cryptographic communication are connected with the set management terminal (12) of various essential information used for carrying out remote cryptographic communication between a plurality of communication terminals (7 to 9) and the cryptographic device (1), so as to form a cryptographic system. The cryptographic device has the advantage that: the cryptography can be also used in the LAN of the terminal enterprise that the special cryptographic software can not be arranged; and the final encryption in the LAN is one-dimensionally and centralizedly managed in the management terminal (12).

Description

technical field [0001] The present invention relates to a unified centralized management system related to encryption, and particularly relates to a system for encrypting / decrypting information in order to reduce the risk of information being stolen or deleted due to external attacks on the network. Background technique [0002] When a personal computer (PC) is used independently, there is little risk of the information inside the personal computer being stolen, altered, or destroyed. However, when a personal computer is connected to a network such as the Internet, the information exchanged is routed to multiple networks. The possibility of being stolen or falsified on the way is thus significantly increased. [0003] "Information encryption" is one of the methods used to solve this problem. That is, the personal computer on the sending side encrypts the information before sending it to the other party. It is decrypted and reused in the personal computer on the receiving ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/10H04L12/24H04L12/28H04L29/06
CPCH04L2012/2841H04L12/2838H04L63/20H04L63/0428H04L63/0464H04L12/2803H04L41/28H04L9/10H04L9/14H04L12/22H04L12/46
Inventor 井泽诚成田宏光冈本明
Owner ONICIX GRP L A