Method, system and device for management, synchronization and backup of data encryption key

A data encryption key and encryption key technology, which is applied in the fields of synchronization and backup, and data encryption key management, can solve problems affecting technical convenience and achieve the effects of convenient sharing, high security, and simple operation steps

Inactive Publication Date: 2015-12-30
BEIJING STONE SHIELD TECH
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Photos taken on mobile phones, edited documents, and recorded audio and video data can be easily synchronized to computers or other electronic devices through the cloud, but the encryption, key management and key synchronization problems of these data also affect such convenience of technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for management, synchronization and backup of data encryption key
  • Method, system and device for management, synchronization and backup of data encryption key
  • Method, system and device for management, synchronization and backup of data encryption key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] Such as figure 1 As shown, a method for managing a data encryption key in an embodiment of the present invention includes the following steps:

[0088] Step 110, generating an encryption key used for data encryption on the encryption device;

[0089] Step 120, storing the encryption key in the encryption device, and presenting it in the form of a two-dimensional code when viewed by the user;

[0090] Step 130, the encryption device encrypts all stored data using an encryption key to form encrypted ciphertext;

[0091] Step 140, when the user reads the data, the encryption device uses the generated decryption key to decrypt;

[0092] Step 150: The user reads the data to realize the management of the data encryption key.

[0093] The key used for encryption in this embodiment is the SHA256 key. SHA-256 is a one-way hash algorithm, which converts the plaintext to be transmitted into a message digest through a Hash function operation. Different plaintext corresponds to ...

Embodiment 2

[0096] Such as figure 2 As shown, the present invention also provides a method for synchronizing data encryption keys, comprising the following steps:

[0097] Step 210, generating an encryption key used for data encryption on the encryption device;

[0098] Step 220, storing the encryption key in the encryption device, and presenting it in the form of a two-dimensional code when viewed by the user;

[0099] Step 230, the encryption device encrypts all stored data using an encryption key to form encrypted ciphertext;

[0100] Step 240, synchronizing the encrypted ciphertext to the cloud server;

[0101] Step 250, the reading device downloads the encrypted ciphertext from the cloud server;

[0102] Step 260, the reading device scans the two-dimensional code of the encryption key stored on the encryption device to obtain the decryption key;

[0103] In step 270, the reading device decrypts the downloaded encrypted ciphertext by using the decryption key obtained through scan...

Embodiment 3

[0107] Such as image 3 As shown, the present invention also provides a backup method of a data encryption key, comprising the following steps:

[0108] Step 310, generating an encryption key used for data encryption at the encryption device;

[0109] Step 320, storing the encryption key in the encryption device, and presenting it in the form of a two-dimensional code when viewed by the user;

[0110] Step 330, the encryption device encrypts all stored data using an encryption key to form encrypted ciphertext;

[0111] Step 340, synchronizing the encrypted ciphertext to the cloud server;

[0112] Step 350, connect the encryption device to the printer, and print the two-dimensional code of the encryption key stored on the encryption device; or,

[0113] Email the QR code of the encryption key stored on the encryption device as a picture; or,

[0114] Export the electronic version of the QR code of the encryption key stored on the encryption device in the form of a picture o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for management, synchronization and backup of a data encryption key. The method comprises the steps that an encryption key of data is generated through encryption equipment and presented in the mode of a two-dimensional code, the encryption equipment processes the data by using a stored key, acquired ciphertext data is uploaded to a cloud server so as to realize sharing of the ciphertext data, and reading equipment requiring to carry out decryption on the data acquires a decryption key of the encrypted data through scanning the two-dimensional code of the encryption key in the encryption equipment and carries out decryption on the data. The invention further relates to a system for management, synchronization and backup of the data encryption key. Simple key management is realized through scanning the two-dimensional code. The invention also relates to a device for management, synchronization and backup of the data encryption key, which comprises the encryption equipment, and reading equipment and the cloud server. The method, the system and the device disclosed by the invention have the beneficial effects of simple operation, high safety, and abilities of realizing shared key management among multiple devices and printing backup of key files, and preventing problems such that the files cannot be opened because of loss of the key and the like.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a data encryption key management, synchronization and backup method, system and device based on two-dimensional code representation. Background technique [0002] At present, the Internet has been fully integrated into our daily life. People come into contact with the Internet every day, and the login passwords of various Internet services and software are very important to us, and the consequences of password theft will be very serious. In order to prevent serious password leaks caused by the same account password on multiple applications, many people will set multiple different passwords for different websites and software. Although this solves certain security problems, it also brings a lot of trouble to memory. Big burden. Hence, there is an increasing demand for password management tools. [0003] There are many ways to manage passwords. The most comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 韩晟王盈徐菲张健李勇杨宏伟
Owner BEIJING STONE SHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products