Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Cloud data encryption method

An encryption method and cloud data technology, applied in the field of cloud data security management, can solve problems such as public key cryptographic data leakage, and achieve the effects of ensuring security, increasing difficulty, and being easy to distinguish.

Inactive Publication Date: 2018-10-12
江苏知更鸟科技服务有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with conventional technologies, cloud technology truly achieves the integration and utilization of resources, and has higher convenience and flexibility, but the security issues caused by resource sharing cannot be ignored. With the development of computer technology at any time, traditional The encryption method ignores various attacks due to the loopholes in the details, resulting in the public key password being cracked and resulting in data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data encryption method
  • Cloud data encryption method
  • Cloud data encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] Such as figure 1 As shown, the cloud data encryption method includes the following steps:

[0029] S101: Generate a first-level key by using a random number;

[0030] S201: Generate a secondary key according to the primary key, and use the secondary key to encrypt / decrypt the database.

[0031] The secondary key includes a number of record name fields that need to be checked and stored in the database table and column information fields that are temporaril...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud data encryption method, comprising the following steps: S101, generating a primary key by adopting a random number; and S201, according to the primary key, generating asecondary key, and carrying out encryption / decryption processing on a database by utilizing the secondary key, wherein the secondary key comprises a plurality of bits of record name fields which are required to be checked and stored in a database table and a plurality of bits of column information fields temporarily produced in the database table, and adding the column information behind each record name once the record name is added in the database. The cloud data encryption method provided by the invention can greatly increase large integer factorization difficulty, and security of public key cryptography is guaranteed to the utmost extent, so that data security is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of cloud data security management, and in particular relates to a cloud data encryption method. Background technique [0002] At present, with the rapid development of computer and electronic communication technology, including the Internet, the pace of financial electronicization has been greatly accelerated. This electronic and digital trend has affected almost all aspects of social life. Many communication activities between people, including commercial trade, financial affairs and other economic activities, have already flowed on the Internet in the form of digital information. The research, implementation and standardization of e-commerce, e-banking and e-money are ongoing. In full swing. Many important documents that are traditionally based on paper and often require signature and seal, such as deposit certificates, checks, stocks, official letters, contracts, leases, wills, ballots, legal documents, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0869H04L63/0478
Inventor 王爽李泽猛
Owner 江苏知更鸟科技服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products