Encryption and decryption method and system based on software and hardware collaboration

A software-hardware collaboration, encryption and decryption technology, applied in the field of data security, can solve problems such as key and algorithm leakage, hardware encryption data equipment investment, etc., to achieve the effect of easy-to-use encryption and decryption services and improve security

Pending Publication Date: 2021-11-30
JINGDONG TECH HLDG CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an encryption and decryption method and system based on software-hardware collaboration, which is used to solve the problems in the prior art that keys and algorithms are easily leaked through software-encrypted data or that there is a large investment in equipment through hardware-encrypted data. Advantages of hardware and software encryption to achieve data security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and system based on software and hardware collaboration
  • Encryption and decryption method and system based on software and hardware collaboration
  • Encryption and decryption method and system based on software and hardware collaboration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, the described embodiments are part of the embodiments of the present invention , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0040] The terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein can be practi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption and decryption method and system based on software and hardware cooperation, and belongs to the technical field of data security. The method comprises the steps of obtaining user login information of a calling party, carrying out the identity authentication of a user, obtaining a first exchange key factor of a server side, and generating a first exchange key pair locally; calculating according to the first exchange key factor and the first exchange key pair to obtain a first session key, and encrypting a user login application program identification number and a local IP (Internet Protocol) by using the first session key to generate a first data token; and encrypting and returning the first data token to a calling party, and decrypting the first data token successfully by the calling party and then completing a login process to initiate a service request operation. The encryption and decryption system based on software and hardware cooperation is constructed, automatic generation and updating of the secret key are achieved, and data security protection is achieved by combining the advantages of software and hardware encryption.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to an encryption and decryption method and system based on software and hardware cooperation. Background technique [0002] In recent years, various enterprises, public institutions, and state agencies have established their own information centers, and the scale of each information center is constantly expanding, and its status and role are becoming more and more prominent. People gradually pay attention to security issues. Once the system The leakage of key data stored in the background will bring immeasurable losses to the enterprise. Therefore, establishing a comprehensive security mechanism in the information center can effectively prevent illegal data invasion from outside and inside. [0003] From the perspective of technical implementation, there are currently two types of encryption mechanisms: software encryption and hardware encryption. Software encryption is easy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/33G06F21/64
CPCG06F21/602G06F21/33G06F21/64
Inventor 杨毓李畅吴蔚王绪文李柱保
Owner JINGDONG TECH HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products