CN104735020A - Method, device and system for acquiring sensitive data - Google Patents

Method, device and system for acquiring sensitive data Download PDF

Info

Publication number
CN104735020A
CN104735020A CN201310697945.9A CN201310697945A CN104735020A CN 104735020 A CN104735020 A CN 104735020A CN 201310697945 A CN201310697945 A CN 201310697945A CN 104735020 A CN104735020 A CN 104735020A
Authority
CN
China
Prior art keywords
sensitive data
user
ciphertext
data
data management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310697945.9A
Other languages
Chinese (zh)
Inventor
林汇宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201310697945.9A priority Critical patent/CN104735020A/en
Publication of CN104735020A publication Critical patent/CN104735020A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a method, a device and a system for acquiring sensitive data, and belongs to the field of the Internet. The method comprises the following steps: a data management client sends a user identifier to a data management server; the data management server acquires a corresponding sensitive data ciphertext from the stored corresponding relation between the user identifier and the sensitive data ciphertext according to the user identifier, and sends the acquired sensitive data ciphertext to the data management client; the data management client receives the sensitive data ciphertext and forwards the sensitive data ciphertext to a decryption device; and the decryption device decrypts the sensitive data ciphertext to obtain sensitive data, and sends the sensitive data to the data management client. By storing the sensitive data ciphertext in the data management server and storing a decryption key and a decryption algorithm in the decryption device, the security of the sensitive data is improved.

Description

A kind of method, equipment and system obtaining sensitive data
Technical field
The present invention relates to internet arena, particularly a kind of method, equipment and system obtaining sensitive data.
Background technology
Along with the fast development of Internet technology, business based on the Internet also gets more and more, some of them can relate to the sensitive data of user based on the business of the Internet, this sensitive data can be the data such as the password of user account, the ID card No. of user and name, and the sensitive data that business relates to often is stored in the server that Internet data center comprises.
The data management staff of Internet data center needs the sensitive data obtaining certain user sometimes, and now data management staff can send the request of acquisition to the server storing sensitive data by terminal, and the user ID of this user is carried in this acquisition request.This server is according to this user ID, corresponding sensitive data ciphertext is obtained with the corresponding relation of sensitive data ciphertext from the user ID stored, according to the private key self stored, the sensitive data ciphertext obtained is decrypted, obtain sensitive data, and send to this terminal by deciphering the sensitive data obtained.
Realizing in process of the present invention, inventor finds that prior art at least exists following problem:
Owing to not only storing sensitive data ciphertext in server, the also private key of store decrypted, when the private key of sensitive data ciphertext and deciphering is simultaneously stolen, thief can be decrypted this sensitive data ciphertext according to the private key of deciphering, obtain sensitive data, thus cause the leakage of sensitive data.
Summary of the invention
In order to solve the problem of prior art, embodiments provide a kind of method, the equipment and system that obtain sensitive data.Described technical scheme is as follows:
First aspect, provide a kind of method obtaining sensitive data, described method comprises:
User ID is sent to data management server by data management client;
Described data management server, according to described user ID, obtains corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext, the sensitive data ciphertext of acquisition is sent to described data management client;
Described data management client receives described sensitive data ciphertext, and described sensitive data ciphertext is issued decryption device;
Described decryption device is decrypted described sensitive data ciphertext, obtains sensitive data, and described sensitive data is sent to described data management client.
Second aspect, provide the another kind of method obtaining sensitive data, described method comprises:
User ID is sent to data management server, makes described data management server obtain corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext;
Receive the sensitive data ciphertext that described data management server sends, and described sensitive data ciphertext is transmitted to decryption device, described decryption device is decrypted described sensitive data ciphertext;
Receive the sensitive data that described decryption device sends.
The third aspect, provide a kind of system obtaining sensitive data, described system comprises:
Data management client, for sending to data management server by user ID;
Described data management server, for according to described user ID, obtains corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext, the sensitive data ciphertext of acquisition is sent to described data management client;
Described data management client, for receiving described sensitive data ciphertext, and issues decryption device by described sensitive data ciphertext;
Described decryption device, for being decrypted described sensitive data ciphertext, obtains sensitive data, and described sensitive data is sent to described data management client.
Fourth aspect, provide a kind of equipment obtaining sensitive data, described equipment comprises:
Sending module, for user ID is sent to data management server, makes described data management server obtain corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext;
Forwarding module, for receiving the sensitive data ciphertext that described data management server sends, and is transmitted to decryption device by described sensitive data ciphertext, described decryption device is decrypted described sensitive data ciphertext;
Receiver module, for receiving the sensitive data that described decryption device sends.
In embodiments of the present invention, the corresponding relation of user ID and sensitive data ciphertext is stored in data management server, when data management staff obtains the sensitive data of certain user, data management client corresponding to this data management staff gets corresponding sensitive data ciphertext according to the user ID of this user from data management server, this sensitive data ciphertext is sent to decryption device by this data management client, decryption device is decrypted this sensitive data ciphertext, obtain sensitive data, and this sensitive data is sent to data management client.Owing to there is no to store the key be decrypted sensitive data ciphertext, so when the sensitive data ciphertext stored in data management server is stolen, thief cannot get sensitive data in data management server.Key and decipherment algorithm that sensitive data ciphertext is decrypted is stored, because decryption device is kept an eye on by decryption device keeper, so the possibility that decryption device is lost is less in decryption device; And because the key stored in decryption device cannot read out, even if so sensitive data ciphertext and decruption key also cannot copy away by internal staff simultaneously, and then can not sensitive data be got, prevent sensitive data from being stolen by internal staff.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of method flow diagram obtaining sensitive data that the embodiment of the present invention one provides;
Fig. 2 is a kind of system architecture diagram obtaining sensitive data that the embodiment of the present invention two provides;
Fig. 3 is a kind of method flow diagram obtaining sensitive data that the embodiment of the present invention two provides;
Fig. 4 is a kind of method flow diagram obtaining sensitive data that the embodiment of the present invention three provides;
Fig. 5 is a kind of system configuration schematic diagram obtaining sensitive data that the embodiment of the present invention four provides;
Fig. 6 is a kind of device structure schematic diagram obtaining sensitive data that the embodiment of the present invention five provides.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
Embodiment one
Embodiments provide a kind of method obtaining sensitive data, see Fig. 1, the method comprises:
Step 101: user ID is sent to data management server by data management client;
Step 102: data management server, according to this user ID, obtains corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext, the sensitive data ciphertext of acquisition is sent to data management client;
Step 103: data management client receives this sensitive data ciphertext, and this sensitive data ciphertext is issued decryption device;
Step 104: decryption device is decrypted this sensitive data ciphertext, obtains sensitive data, and this sensitive data is sent to data management client.
Wherein, data management client also comprises before user ID is sent to data management server:
Data management server receives user ID and sensitive data, is encrypted, obtains sensitive data ciphertext to the sensitive data received;
This user ID and sensitive data ciphertext are stored in the corresponding relation of user ID and sensitive data ciphertext by data management server.
Further, decryption device also comprises before being decrypted sensitive data ciphertext:
Decryption device stores the key and decipherment algorithm that are decrypted sensitive data ciphertext.
Further, the method also comprises:
On line, service server receives user ID and sensitive data, carries out Hash operation, obtain sensitive data cryptographic Hash to sensitive data;
On line, this user ID and sensitive data cryptographic Hash are stored in the corresponding relation of user ID and sensitive data cryptographic Hash by service server.
Further, the method also comprises:
The checking request that on line, service server receiving terminal sends, user ID and sensitive data are carried in this checking request;
On line, service server carries out Hash operation to this sensitive data, obtains sensitive data cryptographic Hash;
On line, service server is according to this user ID, obtains corresponding sensitive data cryptographic Hash from the user ID stored with the corresponding relation of sensitive data cryptographic Hash;
If the sensitive data cryptographic Hash that computing obtains is identical with the sensitive data cryptographic Hash of acquisition, then on line, the authentication of service server to user is passed through, otherwise on line, the authentication of service server to this user is not passed through.
In embodiments of the present invention, the corresponding relation of user ID and sensitive data ciphertext is stored in data management server, when data management staff obtains the sensitive data of certain user, data management client corresponding to this data management staff gets corresponding sensitive data ciphertext according to the user ID of this user from data management server, this sensitive data ciphertext is sent to decryption device by this data management client, decryption device is decrypted this sensitive data ciphertext, obtain sensitive data, and this sensitive data is sent to data management client.Owing to there is no to store the key be decrypted sensitive data ciphertext, so when the sensitive data ciphertext stored in data management server is stolen, thief cannot get sensitive data in data management server.Key and decipherment algorithm that sensitive data ciphertext is decrypted is stored, because decryption device is kept an eye on by decryption device keeper, so the possibility that decryption device is lost is less in decryption device; And because the key stored in decryption device cannot read out, even if so sensitive data ciphertext and decruption key also cannot copy away by internal staff simultaneously, and then can not sensitive data be got, prevent sensitive data from being stolen by internal staff.
Embodiment two
Embodiments provide a kind of method obtaining sensitive data.Wherein, see Fig. 2, on line, service server comprises sensitive data logic module and sensitive data hash database, and data management server comprises data reception module, data processing module, sensitive data ciphertext database and sensitive data and checks module.
See Fig. 3, the method comprises:
Step 201: on line, service server receives user ID and sensitive data, carries out Hash operation to the sensitive data received, obtains sensitive data cryptographic Hash;
Particularly, the sensitive data logic module that on line, service server comprises receives user ID and sensitive data, carries out Hash operation, obtain sensitive data cryptographic Hash to the sensitive data received.
Further, user ID and sensitive data cryptographic Hash are sent to sensitive data hash database by the sensitive data logic module that on line, service server comprises.
Wherein, the user ID that on line, service server receives and sensitive data can be that data management staff inputs in service server on line, also can be that terminal corresponding to user sends to service server on line.Such as, when this sensitive data is the name of the ID card No. of user and user, data management staff can get ID card No. and the name of user from relevant department, and the ID card No. of user and name to be input on line in service server; When sensitive data is the password of user account, in user's registration or login user account process, this user can input the password of this user account to the terminal of its correspondence, and the password of the user account of input is submitted to this terminal; The password of this user account is sent to service server on line by this terminal.
Further, if need to modify to the sensitive data of certain user stored in service server on line, then the user ID of this user and amended sensitive data can be sent to service server on line, on line, service server carries out Hash operation to amended sensitive data, and the sensitive data cryptographic Hash of this user in the corresponding relation of the user ID stored and sensitive data cryptographic Hash is replaced with amended sensitive data cryptographic Hash.On line, amended sensitive data is synchronized in data management server by service server simultaneously.
Certainly, also without service server on line, amended sensitive data can be sent to data management server, can the user ID of this user and amended sensitive data sent on line while service server, the user ID of this user and amended sensitive data are being sent to data management server; Data management server is encrypted amended sensitive data, and the sensitive data ciphertext of this user in the corresponding relation of the user ID stored and sensitive data ciphertext is replaced with amended sensitive data ciphertext.
If need the sensitive data deleting certain user, then on line service server according to the user ID of this user, obtain corresponding user ID and sensitive data cryptographic Hash from the user ID stored with the corresponding relation of sensitive data cryptographic Hash, delete the user ID and sensitive data cryptographic Hash that obtain.On isochrone, this user ID is sent to data management server by service server, make data management server according to this user ID, obtain corresponding user ID and sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext, delete the user ID and sensitive data ciphertext that obtain.
Certainly, also without service server on line, the user ID of this user can be sent to data management server, can this user ID sent on line while service server, this user ID is sent to data management server; This data management server, according to this user ID, obtains corresponding user ID and sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext, deletes the user ID and sensitive data ciphertext that obtain.
Wherein, user ID and sensitive data cryptographic Hash is stored on line in service server, because Hash operation is One-way encryption algorithm, Hash operation is irreversible, namely sensitive data can not be got according to sensitive data cryptographic Hash, even if so on line in service server sensitive data cryptographic Hash stolen, sensitive data also can not be caused to reveal, ensure that the confidentiality of sensitive data.
Step 202: on line, the user ID of reception and sensitive data cryptographic Hash are stored in the corresponding relation of user ID and sensitive data cryptographic Hash by service server;
Particularly, the sensitive data hash database that on line, service server comprises receives user ID and the sensitive data cryptographic Hash of the transmission of sensitive data logic module, the user ID of reception and sensitive data cryptographic Hash is stored in the corresponding relation of user ID and sensitive data cryptographic Hash.
Step 203: on line, the user ID of reception and sensitive data are sent to data management server by service server;
Particularly, the data reception module that the user ID of reception and sensitive data send to data management server to comprise by the sensitive data logic module that on line, service server comprises.
Alternatively, user ID and sensitive data to be sent on line while service server, this user ID and sensitive data are sent to data management server, does not now just need service server on line that this user ID and sensitive data are sent to data management server.
Step 204: data management server receives user ID and sensitive data, is encrypted the sensitive data received, obtains sensitive data ciphertext;
Particularly, the data reception module that data management server comprises receives user ID and the sensitive data of the sensitive data logic module transmission that service server on line comprises, and the user ID of reception and sensitive data are sent to data processing module; Data processing module receives user ID and sensitive data, is encrypted, obtains sensitive data ciphertext to the sensitive data received.
Wherein, the RSA(Rivest Shamir Adlemen that data management server can store according to self, the encryption of a kind of internet and authentication system) PKI of cipher key pair is encrypted the sensitive data received, certainly, the PKI of other the cipher key pair that data management server can also store according to self is encrypted the sensitive data received, and the type of the embodiment of the present invention to the PKI that sensitive data is encrypted is not specifically limited.
Wherein, in data management server, only store the PKI that sensitive data is encrypted, do not store to sensitive data be decrypted private key.
Further, user ID and sensitive data ciphertext are sent to sensitive data ciphertext database by the data processing module that data management server comprises.
Step 205: this user ID and sensitive data ciphertext are stored in the corresponding relation of user ID and sensitive data ciphertext by data management server;
Particularly, the sensitive data ciphertext database that data management server comprises receives user ID and the sensitive data ciphertext of data processing module transmission, the user ID of reception and sensitive data ciphertext is stored in the corresponding relation of user ID and sensitive data ciphertext.
Wherein, the corresponding relation of user ID and sensitive data ciphertext is stored in data management server, owing to not storing the private key be decrypted sensitive data in data management server, even if so when the PKI of sensitive data ciphertext in data management server and encryption key centering is stolen, also cannot get sensitive data, ensure that the confidentiality of sensitive data.
Step 206: when data management staff obtains sensitive data, user ID is sent to data management server by data management client;
Particularly, when data management staff obtains the sensitive data of certain user, data management client receives the user ID of this user of data management staff's input, and the sensitive data that this user ID sends to data management server to comprise is checked module.
Wherein, when data management staff obtains sensitive data, this data management staff inputs user ID in data management client.
Step 207: data management server, according to this user ID, obtains corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext, the sensitive data ciphertext of acquisition is sent to data management client;
Particularly, the sensitive data that data management server comprises checks that module receives the user ID of data management client transmission, and this user ID is sent to sensitive data ciphertext database.Sensitive data ciphertext database receives this user ID, according to this user ID, obtains corresponding sensitive data ciphertext, send to sensitive data to check module the sensitive data ciphertext of acquisition from the user ID stored with the corresponding relation of sensitive data ciphertext.Sensitive data checks that module receives this sensitive data ciphertext, and this sensitive data ciphertext is transmitted to data management client.
Preferably, when data management staff inputs multiple user ID in data management client, now data management server can receive multiple user ID, when data management server is according to the plurality of user ID, from the user ID stored with obtain corresponding sensitive data ciphertext the corresponding relation of sensitive data ciphertext after, the plurality of user ID and sensitive data ciphertext corresponding to the plurality of user ID are sent to data management client by this data management server simultaneously, when avoiding only sensitive data ciphertext being sent to data management client there is mistake in the corresponding relation of user ID and sensitive data ciphertext.
Step 208: data management client receives sensitive data ciphertext, and the sensitive data ciphertext of reception is transmitted to decryption device;
Wherein, before data management staff obtains sensitive data, this data management staff needs decryption device administrative office to register application decryption device, when decryption device keeper determine this data management staff have authority check sensitive data time, this decryption device is handed down to this data management staff by this decryption device keeper.
Step 209: decryption device is decrypted this sensitive data ciphertext, obtains sensitive data, and sensitive data is sent to data management client.
Particularly, decryption device receives the sensitive data ciphertext that data management client sends, and the decruption key stored according to self and decipherment algorithm are decrypted this sensitive data ciphertext, obtain sensitive data, and sensitive data is sent to data management client.
Wherein, decryption device stores the key and decipherment algorithm that are decrypted sensitive data ciphertext.
Wherein, in advance decruption key and decipherment algorithm are stored in this decryption device, to realize the initialization to this decryption device.
Wherein, this decryption device can be USBKey(Universal Serial Bus Key, USB key), because the decruption key that stores in USBKey and decipherment algorithm cannot read, by any method so decruption key and decipherment algorithm are stored in USBKey.USBKey is kept an eye on by keeper, can ensure that lack of competence checks that the personnel of sensitive data cannot get USBKey, so the possibility that USBKey loses is less, ensure that the confidentiality of sensitive data.When have permission check that the personnel of sensitive data get USBKey time, keeper also can know that USBKey is in whose hand, ensure that sensitive data can only be viewed by the data management staff had permission exactly.
Wherein, due to the hardware device that USBKey is a kind of USB interface, so before being decrypted sensitive data ciphertext by USBKey, data management staff needs the USBKey of acquisition to insert in the terminal at this data management client place, and ensures that this USBKey can normally work.
Further, when verifying the identity of user, can be realized by the step of following (1)-(4), comprising:
(1), service server receiving terminal sends on line checking request, user ID and sensitive data are carried in this checking request;
Particularly, the checking request that the sensitive data logic module receiving terminal that on line, service server comprises sends, user ID and sensitive data are carried in this checking request.
(2), on line service server carries out Hash operation to this sensitive data, obtains sensitive data cryptographic Hash;
Particularly, the sensitive data logic module that on line, service server comprises carries out Hash operation to the sensitive data that this checking request is carried, and obtains sensitive data cryptographic Hash.
(3), service server, according to this user ID, obtains corresponding sensitive data cryptographic Hash from the user ID stored with the corresponding relation of sensitive data cryptographic Hash on line;
Particularly, this user ID is sent to sensitive data hash database by the sensitive data logic module that on line, service server comprises; This sensitive data hash database, according to this user ID, obtains corresponding sensitive data cryptographic Hash from the user ID stored with the corresponding relation of sensitive data cryptographic Hash, and the sensitive data cryptographic Hash of acquisition is sent to sensitive data logic module.
(4) if the sensitive data cryptographic Hash that obtains of computing is identical with the sensitive data cryptographic Hash of acquisition, then the authentication of user is passed through, otherwise, the authentication of this user is not passed through.
Particularly, sensitive data logic module receives the sensitive data cryptographic Hash that sensitive data hash database sends, the sensitive data cryptographic Hash that sensitive data cryptographic Hash and the computing of reception obtain is compared, if the sensitive data cryptographic Hash that computing obtains is identical with the sensitive data cryptographic Hash of acquisition, then the authentication of user is passed through, otherwise, the authentication of this user is not passed through.
In embodiments of the present invention, user ID and sensitive data cryptographic Hash is stored on line in service server, because Hash operation is irreversible, namely computing sensitive data can not be obtained according to sensitive data cryptographic Hash, even if so the data on line in service server are stolen, thief can not get sensitive data.The corresponding relation of user ID and sensitive data ciphertext is stored in data management server, if sensitive data ciphertext is stolen, owing to there is no to store the key be decrypted sensitive data ciphertext, so thief cannot get sensitive data in data management server.Key and decipherment algorithm that sensitive data ciphertext is decrypted is stored, because decryption device is kept an eye on by decryption device keeper, so the possibility that decryption device is lost is less in decryption device; And because the key stored in decryption device cannot read out, even if so sensitive data ciphertext and decruption key also cannot copy away by internal staff simultaneously, and then can not sensitive data be got, prevent sensitive data from being stolen by internal staff.
Embodiment three
See Fig. 4, embodiments provide a kind of method obtaining sensitive data, the method comprises:
Step 301: user ID is sent to data management server, makes data management server obtain corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext;
Step 302: receive the sensitive data ciphertext that data management server sends, and sensitive data ciphertext is transmitted to decryption device, decryption device is decrypted sensitive data ciphertext;
Step 303: the sensitive data that receiving and deciphering equipment sends.
In embodiments of the present invention, the corresponding relation of user ID and sensitive data ciphertext is stored in data management server, when data management staff obtains the sensitive data of certain user, data management client corresponding to this data management staff gets corresponding sensitive data ciphertext according to the user ID of this user from data management server, this sensitive data ciphertext is sent to decryption device by this data management client, decryption device is decrypted this sensitive data ciphertext, obtain sensitive data, and this sensitive data is sent to data management client.Owing to there is no to store the key be decrypted sensitive data ciphertext, so when the sensitive data ciphertext stored in data management server is stolen, thief cannot get sensitive data in data management server.Key and decipherment algorithm that sensitive data ciphertext is decrypted is stored, because decryption device is kept an eye on by decryption device keeper, so the possibility that decryption device is lost is less in decryption device; And because the key stored in decryption device cannot read out, even if so sensitive data ciphertext and decruption key also cannot copy away by internal staff simultaneously, and then can not sensitive data be got, prevent sensitive data from being stolen by internal staff.
Embodiment four
Embodiments provide a kind of system obtaining sensitive data, see Fig. 5, this system comprises:
Data management client 401, for sending to data management server by user ID;
Data management server 402, for according to this user ID, obtains corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext, the sensitive data ciphertext of acquisition is sent to data management client 401;
Data management client 401, for receiving this sensitive data ciphertext, and issues decryption device 403 by the sensitive data ciphertext of reception;
Decryption device 403, for being decrypted the sensitive data ciphertext received, obtaining sensitive data, and sensitive data is sent to data management client 401.
Further, this system also comprises:
Data management server 402, also for receiving user ID and sensitive data, being encrypted the sensitive data received, obtaining sensitive data ciphertext;
Data management server 402, also for this user ID and sensitive data ciphertext being stored in the corresponding relation of user ID and sensitive data ciphertext.
Further, this system also comprises:
Decryption device 403, also for storing the key and decipherment algorithm that are decrypted sensitive data ciphertext.
Further, this system also comprises:
Service server on line, for receiving user ID and sensitive data, carrying out Hash operation to the sensitive data received, obtaining sensitive data cryptographic Hash;
Service server on line, also for this user ID and sensitive data cryptographic Hash being stored in the corresponding relation of user ID and sensitive data cryptographic Hash.
Further, this system also comprises:
Service server on line, also for the checking request that receiving terminal sends, user ID and sensitive data are carried in this checking request;
Service server on line, also for carrying out Hash operation to sensitive data, obtains sensitive data cryptographic Hash;
Service server on line, also for according to this user ID, obtains corresponding sensitive data cryptographic Hash from the user ID stored with the corresponding relation of sensitive data cryptographic Hash;
If the sensitive data cryptographic Hash that computing obtains is identical with the sensitive data cryptographic Hash of acquisition, then on line, the authentication of service server to user is passed through, otherwise on line, the authentication of service server to this user is not passed through.
In embodiments of the present invention, the corresponding relation of user ID and sensitive data ciphertext is stored in data management server, when data management staff obtains the sensitive data of certain user, data management client corresponding to this data management staff gets corresponding sensitive data ciphertext according to the user ID of this user from data management server, this sensitive data ciphertext is sent to decryption device by this data management client, decryption device is decrypted this sensitive data ciphertext, obtain sensitive data, and this sensitive data is sent to data management client.Owing to there is no to store the key be decrypted sensitive data ciphertext, so when the sensitive data ciphertext stored in data management server is stolen, thief cannot get sensitive data in data management server.Key and decipherment algorithm that sensitive data ciphertext is decrypted is stored, because decryption device is kept an eye on by decryption device keeper, so the possibility that decryption device is lost is less in decryption device; And because the key stored in decryption device cannot read out, even if so sensitive data ciphertext and decruption key also cannot copy away by internal staff simultaneously, and then can not sensitive data be got, prevent sensitive data from being stolen by internal staff.
Embodiment five
Embodiments provide a kind of equipment obtaining sensitive data, see Fig. 6, this equipment comprises:
Sending module 501, for user ID is sent to data management server, makes data management server obtain corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext;
Forwarding module 502, for receiving the sensitive data ciphertext that data management server sends, and is transmitted to decryption device by this sensitive data ciphertext, decryption device is decrypted this sensitive data ciphertext;
Receiver module 503, for the sensitive data that receiving and deciphering equipment sends.
In embodiments of the present invention, the corresponding relation of user ID and sensitive data ciphertext is stored in data management server, when data management staff obtains the sensitive data of certain user, data management client corresponding to this data management staff gets corresponding sensitive data ciphertext according to the user ID of this user from data management server, this sensitive data ciphertext is sent to decryption device by this data management client, decryption device is decrypted this sensitive data ciphertext, obtain sensitive data, and this sensitive data is sent to data management client.Owing to there is no to store the key be decrypted sensitive data ciphertext, so when the sensitive data ciphertext stored in data management server is stolen, thief cannot get sensitive data in data management server.Key and decipherment algorithm that sensitive data ciphertext is decrypted is stored, because decryption device is kept an eye on by decryption device keeper, so the possibility that decryption device is lost is less in decryption device; And because the key stored in decryption device cannot read out, even if so sensitive data ciphertext and decruption key also cannot copy away by internal staff simultaneously, and then can not sensitive data be got, prevent sensitive data from being stolen by internal staff.
It should be noted that: the equipment of the acquisition sensitive data that above-described embodiment provides is when obtaining sensitive data, only be illustrated with the division of above-mentioned each functional module, in practical application, can distribute as required and by above-mentioned functions and be completed by different functional modules, internal structure by equipment is divided into different functional modules, to complete all or part of function described above.In addition, the equipment of the acquisition sensitive data that above-described embodiment provides belongs to same design with the embodiment of the method obtaining sensitive data, and its specific implementation process refers to embodiment of the method, repeats no more here.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (12)

1. obtain a method for sensitive data, it is characterized in that, described method comprises:
User ID is sent to data management server by data management client;
Described data management server, according to described user ID, obtains corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext, the sensitive data ciphertext of acquisition is sent to described data management client;
Described data management client receives described sensitive data ciphertext, and described sensitive data ciphertext is issued decryption device;
Described decryption device is decrypted described sensitive data ciphertext, obtains sensitive data, and described sensitive data is sent to described data management client.
2. the method for claim 1, is characterized in that, described data management client also comprises before user ID is sent to data management server:
Data management server receives user ID and sensitive data, is encrypted, obtains sensitive data ciphertext to the sensitive data received;
Described user ID and described sensitive data ciphertext are stored in the corresponding relation of user ID and sensitive data ciphertext by described data management server.
3. method as claimed in claim 1 or 2, it is characterized in that, described decryption device also comprises before being decrypted described sensitive data ciphertext:
Described decryption device stores the key and decipherment algorithm that are decrypted described sensitive data ciphertext.
4. the method for claim 1, is characterized in that, described method also comprises:
On line, service server receives user ID and sensitive data, carries out Hash operation, obtain sensitive data cryptographic Hash to described sensitive data;
On described line, described user ID and described sensitive data cryptographic Hash are stored in the corresponding relation of user ID and sensitive data cryptographic Hash by service server.
5. method as claimed in claim 4, it is characterized in that, described method also comprises:
The checking request that on described line, service server receiving terminal sends, user ID and sensitive data are carried in described checking request;
On described line, service server carries out Hash operation to described sensitive data, obtains sensitive data cryptographic Hash;
On described line, service server is according to described user ID, obtains corresponding sensitive data cryptographic Hash from the user ID stored with the corresponding relation of sensitive data cryptographic Hash;
If the sensitive data cryptographic Hash that computing obtains is identical with the sensitive data cryptographic Hash of acquisition, then on described line, the authentication of service server to user is passed through, otherwise on described line, the authentication of service server to described user is not passed through.
6. obtain a method for sensitive data, it is characterized in that, described method comprises:
User ID is sent to data management server, makes described data management server obtain corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext;
Receive the sensitive data ciphertext that described data management server sends, and described sensitive data ciphertext is transmitted to decryption device, described decryption device is decrypted described sensitive data ciphertext;
Receive the sensitive data that described decryption device sends.
7. obtain a system for sensitive data, it is characterized in that, described system comprises:
Data management client, for sending to data management server by user ID;
Described data management server, for according to described user ID, obtains corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext, the sensitive data ciphertext of acquisition is sent to described data management client;
Described data management client, for receiving described sensitive data ciphertext, and issues decryption device by described sensitive data ciphertext;
Described decryption device, for being decrypted described sensitive data ciphertext, obtains sensitive data, and described sensitive data is sent to described data management client.
8. system as claimed in claim 7, it is characterized in that, described system also comprises:
Described data management server, also for receiving user ID and sensitive data, being encrypted the sensitive data received, obtaining sensitive data ciphertext;
Described data management server, also for described user ID and described sensitive data ciphertext being stored in the corresponding relation of user ID and sensitive data ciphertext.
9. system as claimed in claim 7 or 8, it is characterized in that, described system also comprises:
Described decryption device, also for storing the key and decipherment algorithm that are decrypted described sensitive data ciphertext.
10. system as claimed in claim 7, it is characterized in that, described system also comprises:
Service server on line, for receiving user ID and sensitive data, carrying out Hash operation to described sensitive data, obtaining sensitive data cryptographic Hash;
Service server on described line, also for described user ID and described sensitive data cryptographic Hash being stored in the corresponding relation of user ID and sensitive data cryptographic Hash.
11. systems as claimed in claim 10, it is characterized in that, described system also comprises:
Service server on described line, also for the checking request that receiving terminal sends, user ID and sensitive data are carried in described checking request;
Service server on described line, also for carrying out Hash operation to described sensitive data, obtains sensitive data cryptographic Hash;
Service server on described line, also for according to described user ID, obtains corresponding sensitive data cryptographic Hash from the user ID stored with the corresponding relation of sensitive data cryptographic Hash;
If the sensitive data cryptographic Hash that computing obtains is identical with the sensitive data cryptographic Hash of acquisition, then on described line, the authentication of service server to user is passed through, otherwise on described line, the authentication of service server to described user is not passed through.
12. 1 kinds of equipment obtaining sensitive data, it is characterized in that, described equipment comprises:
Sending module, for user ID is sent to data management server, makes described data management server obtain corresponding sensitive data ciphertext from the user ID stored with the corresponding relation of sensitive data ciphertext;
Forwarding module, for receiving the sensitive data ciphertext that described data management server sends, and is transmitted to decryption device by described sensitive data ciphertext, described decryption device is decrypted described sensitive data ciphertext;
Receiver module, for receiving the sensitive data that described decryption device sends.
CN201310697945.9A 2013-12-18 2013-12-18 Method, device and system for acquiring sensitive data Pending CN104735020A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310697945.9A CN104735020A (en) 2013-12-18 2013-12-18 Method, device and system for acquiring sensitive data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310697945.9A CN104735020A (en) 2013-12-18 2013-12-18 Method, device and system for acquiring sensitive data

Publications (1)

Publication Number Publication Date
CN104735020A true CN104735020A (en) 2015-06-24

Family

ID=53458460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310697945.9A Pending CN104735020A (en) 2013-12-18 2013-12-18 Method, device and system for acquiring sensitive data

Country Status (1)

Country Link
CN (1) CN104735020A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105468999A (en) * 2015-11-17 2016-04-06 北京奇虎科技有限公司 Data security method and mobile hard disk
CN106210318A (en) * 2016-07-12 2016-12-07 广东欧珀移动通信有限公司 The method of voice broadcast information, device and mobile terminal
CN109450633A (en) * 2018-09-25 2019-03-08 平安科技(深圳)有限公司 Information encrypts sending method and device, electronic equipment, storage medium
CN109495515A (en) * 2019-01-02 2019-03-19 腾讯科技(深圳)有限公司 Sensitive information processing method and computer readable storage medium
CN110119632A (en) * 2018-02-05 2019-08-13 中国移动通信有限公司研究院 Sensitive data requesting method, device, system and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350712A (en) * 2008-08-25 2009-01-21 深圳华为通信技术有限公司 Data management method and terminal
CN102655508A (en) * 2012-04-19 2012-09-05 华中科技大学 Method for protecting privacy data of users in cloud environment
CN103327002A (en) * 2013-03-06 2013-09-25 西安电子科技大学 Cloud storage access control system based on attribute
CN103348357A (en) * 2010-12-03 2013-10-09 挪佛麦迪哥股份公司 Device for and method of handling sensitive data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350712A (en) * 2008-08-25 2009-01-21 深圳华为通信技术有限公司 Data management method and terminal
CN103348357A (en) * 2010-12-03 2013-10-09 挪佛麦迪哥股份公司 Device for and method of handling sensitive data
CN102655508A (en) * 2012-04-19 2012-09-05 华中科技大学 Method for protecting privacy data of users in cloud environment
CN103327002A (en) * 2013-03-06 2013-09-25 西安电子科技大学 Cloud storage access control system based on attribute

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105468999A (en) * 2015-11-17 2016-04-06 北京奇虎科技有限公司 Data security method and mobile hard disk
CN105468999B (en) * 2015-11-17 2018-04-24 北京奇虎科技有限公司 data encryption method and mobile hard disk
CN106210318A (en) * 2016-07-12 2016-12-07 广东欧珀移动通信有限公司 The method of voice broadcast information, device and mobile terminal
CN110119632A (en) * 2018-02-05 2019-08-13 中国移动通信有限公司研究院 Sensitive data requesting method, device, system and computer readable storage medium
CN109450633A (en) * 2018-09-25 2019-03-08 平安科技(深圳)有限公司 Information encrypts sending method and device, electronic equipment, storage medium
CN109450633B (en) * 2018-09-25 2022-10-21 平安科技(深圳)有限公司 Information encryption transmission method and device, electronic equipment and storage medium
CN109495515A (en) * 2019-01-02 2019-03-19 腾讯科技(深圳)有限公司 Sensitive information processing method and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN109033855B (en) Data transmission method and device based on block chain and storage medium
US8856530B2 (en) Data storage incorporating cryptographically enhanced data protection
CN101605137B (en) Safe distribution file system
US9219722B2 (en) Unclonable ID based chip-to-chip communication
EP2823619B1 (en) Policy for secure packet transmission using required node paths and cryptographic signatures
CN105100076A (en) Cloud data security system based on USB Key
CN112182609A (en) Block chain-based data uplink storage method and tracing method, device and equipment
US11831753B2 (en) Secure distributed key management system
CN108270739B (en) Method and device for managing encryption information
CN107172056A (en) A kind of channel safety determines method, device, system, client and server
CN111970114B (en) File encryption method, system, server and storage medium
CN102984273B (en) Encryption method, decryption method, encryption device and decryption device of virtual disk and cloud server
CN110932850B (en) Communication encryption method and system
CN108769029B (en) Authentication device, method and system for application system
JP2020530726A (en) NFC tag authentication to remote servers with applications that protect supply chain asset management
CN103780609A (en) Cloud data processing method and device and cloud data security gateway
CN109274644A (en) A kind of data processing method, terminal and watermark server
CN104735020A (en) Method, device and system for acquiring sensitive data
CN103973698B (en) User access right revoking method in cloud storage environment
CN106789963B (en) Asymmetric white-box password encryption method, device and equipment
CN114826702A (en) Database access password encryption method and device and computer equipment
CN111008400A (en) Data processing method, device and system
CN105516210A (en) System and method for terminal security access authentication
US10764260B2 (en) Distributed processing of a product on the basis of centrally encrypted stored data
KR101680536B1 (en) Method for Service Security of Mobile Business Data for Enterprise and System thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150624