Data encryption method and device, data decryption method and device, and data processing system

A data and encrypted technology, applied in the field of communication, can solve the problems of multi-central processing units, affecting processing efficiency, data storage speed, etc., to achieve the effect of reducing the number of calls, reducing CPU operations, and improving processing efficiency

Active Publication Date: 2017-04-19
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] During the research and practice of the prior art, the inventors of the present invention found that, in the existing scheme, for each record to be encrypted, the encryption algorithm needs to be called once for each attribute, therefore, it is necessary to repeatedly call Encryption algorithm, and encryption algorithm is usually a calculation-intensive operation that requires more CPU (Central Processing Unit) operations, so it greatly affects the processing efficiency and data storage speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device, data decryption method and device, and data processing system
  • Data encryption method and device, data decryption method and device, and data processing system
  • Data encryption method and device, data decryption method and device, and data processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] This embodiment describes the perspective of the data encryption device, and the data encryption device may specifically be integrated in devices such as terminals, servers, or storage devices.

[0048] A method for encrypting data, comprising: obtaining original relational data that needs to be encrypted; determining attributes that need to be encrypted in the original relational data; using a serialization algorithm to serialize the attributes that need to be encrypted to obtain serialized data; Encrypt the serialized data with a preset encryption algorithm to obtain encrypted data; store the encrypted data as an attribute of the original relational data to obtain encrypted relational data.

[0049] Such as Figure 1b As shown, the specific flow of the data encryption method can be as follows:

[0050] 101. Obtain the original relational data that needs to be encrypted.

[0051] Among them, the original relational data refers to the relational data before encryption...

Embodiment 2

[0072] In this embodiment, description will be made from the perspective of a data decryption apparatus, and the data decryption apparatus may specifically be integrated in a device such as a terminal, a server, or a storage device.

[0073] A method for decrypting data, comprising: obtaining encrypted relational data that needs to be decrypted; determining encrypted data in the encrypted relational data; using a preset decryption algorithm to decrypt the encrypted data to obtain decrypted data; Deserialization algorithm deserializes the decrypted data to obtain deserialized data; stores the deserialized data as attributes of relational data respectively to obtain original relational data.

[0074] Such as figure 2 As shown, the specific flow of the data decryption method can be as follows:

[0075] 201. Obtain encrypted relational data that needs to be decrypted.

[0076] Wherein, the encrypted relational data is obtained by encrypting the original relational data. For a s...

Embodiment 3

[0095] According to the methods described in Embodiments 1 and 2, examples will be given below for further detailed description.

[0096] In this embodiment, the serialization algorithm is specifically the protobuf algorithm as an example for illustration, and the details can be as follows:

[0097] (1) Encryption;

[0098] Such as Figure 3a As shown, a data encryption method, the specific process can be as follows:

[0099] A301. The data encryption device acquires the original relational data that needs to be encrypted.

[0100] For example, after receiving the encryption request, the original relational data that needs to be encrypted is obtained according to the instruction in the encryption request, for example, the original relational data that needs to be encrypted can be obtained from a local or other storage device, and so on.

[0101] Among them, the original relational data refers to the relational data before encryption, and the relational data refers to the da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment discloses a data encryption method and device, a data decryption method and device, and a data processing system. The data encryption method of the embodiment of the invention comprises the following steps of: adopting a serialization algorithm to carry out serialization on attributes which need to be encrypted in original relational data; then, adopting a preset encryption algorithm to encrypt obtained serialization data; and storing encryption data as one attribute of the original relational data so as to obtain encrypted relational data. The embodiment of the invention also provides a corresponding decryption scheme. By use of the scheme provided by the embodiment of the invention, the operation of the CPU (Central Processing Unit) can be reduced, processing efficiency is greatly improved, and data storage speed is greatly improved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a data encryption method, decryption method, device and system. Background technique [0002] With the development of Internet technology, there is more and more information on the Internet, some of which are related to user privacy. Once this information is leaked, it may bring troubles and risks to users. Therefore, how to protect information security becomes more and more important. [0003] In order to prevent information from being obtained illegally, the stored information is usually encrypted and stored. Among them, user information is usually relational data, that is, a record composed of multiple attributes is stored in the database. In order to encrypt and store these information, it is usually necessary to encrypt each attribute of a record separately, and then store it in the database, that is, for the record A=(a1, a2, a3,..., an), it is necessary to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6227G06F2221/2107
Inventor 李真赵子轩
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products