Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method, device, data decryption method and device

A data encryption and data decryption technology, applied in the direction of user identity/authority verification, etc., can solve the problems of reducing data security, increasing the cost of data encryption processing, increasing the risk of key decryption, etc., to achieve the effect of improving security.

Inactive Publication Date: 2016-07-13
PEKING UNIV FOUNDER GRP CO LTD +1
View PDF7 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, regardless of symmetric encryption or asymmetric encryption, the encryptor and decryptor must use the same or corresponding keys. If the same pair of keys is used for encryption operations for a long time, the risk of the key being deciphered will increase. If the key is changed, both parties need to modify it at the same time, which will increase the cost of data encryption processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, device, data decryption method and device
  • Data encryption method, device, data decryption method and device
  • Data encryption method, device, data decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment provides a data encryption method, such as figure 1 The method shown includes:

[0032] S11. Obtain a random number. The random number is used as an identification to distinguish different encrypted data. The random number may be pre-assigned, for example, it may be calculated based on hardware ID, network IP, encryption operation time and other data. In an actual application environment, the random numbers obtained by multiple encryptors are different, and the random numbers obtained by the same encryptor in different time periods may also be different. For example, in Internet applications, the server in the network can be used as a decryptor, and the user terminal can be used as an encryptor. The random number can be generated by the server and then distributed to the corresponding user terminal. Preferably, the random number can be a universally unique identifier (UniversallyUniqueIdentifier, UUID), and the UUID is a combination of the following pa...

Embodiment 2

[0051] This embodiment provides another data encryption method, such as image 3 As shown, the method includes:

[0052] S31. Obtain a random number, a token corresponding to the random number, and a time stamp. A token is a sign of information (a code composed of one or more binary digits). In Internet applications, only the node that obtains the token has the right to send information packets. The token can be generated by the decryption party and sent to the corresponding Encryptor, which enables the encryptor to have the authority to send encrypted data.

[0053] A timestamp (timestamp) is usually a sequence of characters used to uniquely identify a certain moment, for example, it may be the time when encrypted data is generated or the time when data is sent.

[0054] S32. Obtain a key required for encryption according to the random number.

[0055] S33. Use the key to encrypt the content to be encrypted.

[0056] S34. Generate a first abstract using the encrypted cont...

Embodiment 3

[0070] This embodiment provides a data encryption device, such as Figure 5 The unit shown consists of:

[0071] An acquisition unit 51, configured to acquire a random number;

[0072] An encryption key generating unit 52, configured to obtain a key required for encryption according to the random number;

[0073] An encryption unit 53, configured to use the key to encrypt the content to be encrypted;

[0074] The first summary generating unit 54 is configured to generate a first summary using the encrypted content.

[0075] This embodiment also provides a data decryption device corresponding to the above device, such as Figure 6 The unit shown consists of:

[0076] A data packet obtaining unit 61, configured to obtain the data packet obtained according to the above-mentioned data encryption device;

[0077] A second abstract generating unit 62, configured to generate a second abstract using the encrypted content;

[0078] Abstract comparison unit 63, configured to compa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption method, a data encryption device, a data decryption method and a data decryption device. The data encryption method includes the following steps that: a random number is obtained; a key required by encryption is obtained according to the random number; the key is utilized to encrypt content to be encrypted; and a first abstract is generated by using the encrypted content. With the data encryption method provided by the embodiments of the invention adopted, the corresponding key obtained according to the obtained random number can be selected to encrypt the data content, and an encryption mode can be more flexible with low cost; and information such as the abstract can be added into the data, and therefore, the integrity of the encrypted content can be verified, and therefore, the safety of the encrypted data can be improved.

Description

technical field [0001] The invention relates to data encryption technology, in particular to a data encryption method, a data decryption method and a device. Background technique [0002] At present, data encryption technology is usually used in the information field, and encryption technology is generally divided into two categories, namely, symmetric and asymmetric. [0003] Symmetric encryption uses the same key for encryption and decryption, and this encryption technology is widely used today. In the asymmetric encryption method, the encryption and decryption do not use the same key. Usually there are two keys, called the public key and the private key. They must be used in pairs, otherwise the encrypted file cannot be opened. The public key in it It can be disclosed, and the recipient only needs to use his own private key when decrypting. This method can ensure the security of key transmission to a certain extent. [0004] However, regardless of symmetric encryption o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 沈刚胡玉楠
Owner PEKING UNIV FOUNDER GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products