Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method and device, and data decryption method and device

A data encryption and data decryption technology, applied in the field of data processing, can solve the problems of easy cracking of encrypted information, easy leakage of fixed keys, and reducing the security of information transmission, and achieve the effect of increasing the difficulty of cracking and improving security.

Active Publication Date: 2019-04-12
BEIJING CHENGSHI WANGLIN INFORMATION TECH CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The fixed key of the above-mentioned encryption method is easy to leak, which makes the encrypted information easy to be cracked and reduces the security of information transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device, and data decryption method and device
  • Data encryption method and device, and data decryption method and device
  • Data encryption method and device, and data decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] see figure 2 , shows a schematic flowchart of a data encryption method in the embodiment of the present application. In this embodiment, applied to the first device, the method may include the following steps, for example:

[0077] Step 201: Generate service request data, a first random number, a second random number and service request parameters based on a service request to a second device.

[0078] It can be understood that, in a scenario where the service request of the first device to the second device has privacy and needs to be kept secret, the service request data corresponding to the service request needs to be encrypted. Due to the use of fixed key encryption methods such as traditional symmetric keys or asymmetric keys, it is easy for attackers to attack the fixed keys stored on the device side to decipher the encrypted service request data. The stored dynamic key encryption method. Considering that business requests have corresponding business request p...

Embodiment 2

[0096] see image 3 , shows a schematic flowchart of another data decryption method in the embodiment of the present application. In this embodiment, applied to the second device, the method may include the following steps, for example:

[0097] Step 301: Receive a service request sent by a first device, where the service request carries encrypted data, a first signature, a first random number, a second random number and service request parameters.

[0098] Based on the above description of the service request parameters generated by the first device corresponding to the service request, the service request parameters received by the second device and sent by the first device are the same as above. Therefore, in some implementations of the embodiments of the present application, the service request parameter includes at least the first device identifier or one other service request parameter.

[0099] It should be noted that, based on the above description of the first prese...

Embodiment 3

[0112] see Figure 4 , which shows a schematic flowchart of another data encryption and data decryption method in the embodiment of the present application. In this embodiment, the method may include the following steps, for example:

[0113] Step 401: The first device generates service request data, a first random number, a second random number and service request parameters based on a service request to the second device.

[0114] Step 402: The first device selects the parameter factor in the service request parameter according to the first preset algorithm and the first random number to generate a dynamic key; and selects the parameter factor in the service request parameter according to the second preset algorithm and the second random number Generate the first signature.

[0115] Step 403: the first device uses the dynamic key to encrypt the service request data to generate encrypted data.

[0116] Step 404: the first device sends a service request to the second device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method and device, and a data decryption method and device. The data encryption method comprises the following steps: when first equipment makes a service request to second equipment, generating corresponding service request data, a first random number, a second random number, and a service request parameter; selecting a parameter factor in the service request parameter by utilizing a first preset algorithm and the first random number to generate a dynamic key; selecting the parameter factor in the service request parameter to generate a first signature by using a second preset algorithm and the second random number; encrypting the service request data by using the dynamic key to obtain encrypted data; and sending the service request carrying the encrypted data, the first signature, the first random number, the second random number and the service request parameter to the second equipment. Therefore, the dynamic key and the first signature aregenerated dynamically for the service request by adopting the preset algorithms and the random numbers, the dynamic key is not fixedly stored and is valid once and not reused, the risk caused by leakage is effectively avoided, the cracking difficulty of the encrypted data is increased, and the safety of data transmission is improved.

Description

technical field [0001] The present application relates to the technical field of data processing, and in particular to a data encryption and data decryption method and device. Background technique [0002] With the rapid development of science and technology, daily life and work are gradually becoming informatized. Information transmission based on modern communication technology is easy to be intercepted by attackers, etc. People pay more and more attention to the security of information in the process of information transmission. Therefore, it is necessary to encrypt the transmission information to enhance security. [0003] In the prior art, generally, a fixed key is used to encrypt the transmission information, and the encrypted encrypted information is obtained for transmission. Specifically, for two devices that need to transmit information, a fixed symmetric key is pre-generated, and symmetric encryption is performed based on the symmetric key to realize information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0869H04L9/3247H04L63/0428H04L63/067
Inventor 李春强杜翔
Owner BEIJING CHENGSHI WANGLIN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products