Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A realization method and system integrating multiple signature encryption algorithms

A technology of encryption algorithm and implementation method, which is applied in transmission system, digital transmission system, computing, etc., can solve problems such as inability to implement multiple encryption algorithms and meet various user integrated usage scenarios, and achieve high signature encryption efficiency and improved Variety and flexibility, the effect of ensuring the speed of operation

Active Publication Date: 2022-05-31
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problems existing in the prior art, the present invention innovatively proposes an implementation method and system for integrating multiple signature encryption algorithms, which effectively solves the problems of being unable to meet multiple user integration scenarios and implementing multiple encryption algorithms , effectively improving the diversity and flexibility of data encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A realization method and system integrating multiple signature encryption algorithms
  • A realization method and system integrating multiple signature encryption algorithms
  • A realization method and system integrating multiple signature encryption algorithms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053]

[0054] The above example is a request to generate a key pair using the asymmetric encryption algorithm SM2. Parse the algorithm (algorithm),

[0055] Socket service request: when the request receiving module receives the socket request message, it parses the socket message

[0058] The 7-8 bits of the socket message, identify operations, such as 01: generate a key pair, 02: signature, 03: verify signature etc.;

[0059] The 9-last bit of the socket message identifies other information, such as key, data to be signed, data to be encrypted, etc.

[0060] Local executable file service: direct invocation in a way that supports the command line.

[0064] [process]

[0065] processnum=5

[0068] web request service: when a request for generating a SM2 key pair in the web request service is received, the

[0069]

[0070]

[0071] Wherein, privatekey and publickey are the key pair of the generated asymmetric encryption algorithm SM2.

[0072] Socket request service: when receivi...

Embodiment 2

[0088] S4, each operation step is monitored, and once an abnormality occurs in the work, the abnormal process is stopped and restarted.

[0091] [monitor]

[0092] init=1

[0093]lownum=2

[0094] highnum=20

[0095]time=5

Embodiment 3

[0105] S4, each operation step is monitored, once abnormality occurs in the work, then stop and restart the abnormal process;

[0106] S5, log each operation step and execution result.

[0107] In step S5, when the startup starts, the log part is initialized, and all log configuration information is

[0108][loginfo]

[0109] logpath= / var / log

[0110] logmaxsize=2

[0111] loglevel=1

[0112] The technical solution of the present invention can also support the hardware acceleration function, and the hardware can be configured to improve the encryption and decryption speed;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes an implementation method for integrating multiple signature encryption algorithms, including: receiving and parsing the information assembly structure in the request message according to the service type requested by the user, and placing the parsed information assembly structure in the message queue Medium; multiple processes in the process pool obtain the business request information in the message queue in parallel, call the signature encryption algorithm for the business request information to perform signature encryption, generate a key pair, and send the generated key pair; according to the requested service type and The parameter format assembles the generated key pair into a response message, and sends the response message back to the user. The invention also proposes an implementation system integrating multiple signature encryption algorithms, which effectively solves the problem of not being able to meet the needs of multiple users for integrated use. Scenarios and the inability to implement multiple encryption algorithms have effectively improved the diversity and flexibility of data encryption.

Description

An implementation method and system for integrating multiple signature encryption algorithms technical field The present invention relates to encryption algorithm field, especially relate to a kind of realization method of integrating multiple signature encryption algorithms and system. Background technique [0002] In today's society, with the advancement of science and technology, the Internet, mobile phones, and computers have brought us countless conveniences. At the same time, security issues of sensitive data such as personal privacy, account passwords, etc. will follow. At present, for the problem of signature, encryption and integrity verification of sensitive data, the more common practice at present is to make Use RSA (asymmetric encryption algorithm) in the international general algorithm for digital signature and verification; AES (symmetric encryption algorithm) for digital signature and verification; Data encryption; digest algorithms SHA1, SHA2 perform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F21/60G06F11/30G06F9/54
CPCH04L9/3247G06F21/602G06F9/546G06F11/3006
Inventor 霍文
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products