CN108989307A - For project management multilayer encrypting and deciphering system - Google Patents

For project management multilayer encrypting and deciphering system Download PDF

Info

Publication number
CN108989307A
CN108989307A CN201810776425.XA CN201810776425A CN108989307A CN 108989307 A CN108989307 A CN 108989307A CN 201810776425 A CN201810776425 A CN 201810776425A CN 108989307 A CN108989307 A CN 108989307A
Authority
CN
China
Prior art keywords
data
server
layer module
encryption
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810776425.XA
Other languages
Chinese (zh)
Inventor
刘芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810776425.XA priority Critical patent/CN108989307A/en
Publication of CN108989307A publication Critical patent/CN108989307A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses one kind for project management multilayer encrypting and deciphering system, which includes server, acquisition port, process manipulation logic module, temporal cache space, storing data interface, identification data acquisition port, hidden layer module, defends layer module, attack layer module;Server is connect with storing data interface, temporal cache space, defence layer module, identification data acquisition port and process manipulation logic module, and server receives the reading and writing order of process manipulation logic module.The technical program can greatly improve the safety of data by the cryptographic operation of multilayer.

Description

For project management multilayer encrypting and deciphering system
Technical field
It is especially a kind of that project is used for by multi-layer security raising Information Security the present invention relates to encryption technology field Manage multilayer encrypting and deciphering system.
Background technique
Project refers to that a series of unique, complicated and activities that are mutually related, these activities have a specific mesh Mark or purpose, it is necessary in specific time, budget, resource limit, be completed according to specification.Item argument include scope of project, Quality, cost, time, resource.Project management just refers to the manager of project under limited resource constraint, with the sight of system Point, method and theory effectively manage whole work that project is related to;Project management at present is substantially using calculating Machine system is substantially using independent Password Management the encryption of project management and completes or using login authentication to complete Method complete, the above-mentioned cipher mode risk that is cracked is big.
Summary of the invention
The technical solution adopted by the present invention to solve the technical problems is: system of the invention includes server, for comprehensive It closes the work of control modules and exchanges data;Port is acquired, connected for system data bank interface and exchanges data; Process manipulates logic module, for receiving the reading and writing order of user and being transmitted to server;Temporal cache space, for depositing The project data to be encrypted such as put;Storing data interface connects for ciphertext data cloud space and exchanges data;Identification Data collection terminal mouth, for acquiring the certificate data of user;Hidden layer module, for the hidden or display operation of data, To realize first layer encryption and decryption;Layer module is defendd, for the general encryption or decryption of data, to realize second layer encryption and decryption; Layer module is attacked, for the attacker setting and releasing of data, to realize third layer encryption and decryption;Process manipulate logic module with Port, server, storing data interface and the connection of temporal cache space are acquired, is received by the system data of acquisition port input And operational order;Server and storing data interface, temporal cache space, defence layer module, identification data acquire port And process manipulation logic module connection, server receive the reading and writing order of process manipulation logic module;Server control defence layer Module carries out encryption or decryption oprerations;Defence layer module is connect with temporal cache space and server, in the control of server Under general encryption or decryption are carried out to the data that are stored in the space of temporal cache;It is hidden that server controls the progress of hidden layer module It covers or display operation;Hidden layer module is connect with temporal cache space and server, to being stored under the control of server Data in the space of temporal cache carry out hidden or display operation;Server control attack layer module carry out attacker setting with It releases;Attack layer module is connect with temporal cache space and server, to being stored in temporal cache under the control of server Data in space carry out attacker setting and release.
Further, identification data acquisition port is connect with server, and server passes through the identification data Acquire the identification data that port receives user.
Further, identification data acquisition port is serial communication interface.
Further, the fingerprint capturer outside the connection of identification data acquisition port carrys out captured identity identification letter Breath.
Further, the defence layer module carries out general encryption and decryption to data using AES encryption method process.
Further, the hidden layer module be reached by the utilization to disk partition gap and reserve sector hide with it is aobvious The purpose of registration evidence.
Further, the attack layer module is used to generate self recursive copying program and random file with trigger condition Program is deleted to realize the setting and releasing of attacker, described trigger condition is solution of the encryption data by non-default program Close order, self described recursive copying program is not Virus.
The invention has the advantages that in the whole encryption of data, the technical program devise hidden layer, defence layer and Layer encryption is attacked, hidden layer encryption can hide project data, and defence layer encryption can use AES encryption method to project data It is generally encrypted, the encryption of attack layer can be to the attacker for presetting similar virus in project data;Intention is cracked and is added For the operator of ciphertext part, hidden layer encryption and defence layer encryption will receive attack journey it cracks system after being cracked The destruction of sequence is intended to crack in this case the operator of encryption file obviously without time reply attacker to terminate It cracks, the technical program can greatly improve the safety of data by the cryptographic operation of multilayer.
Detailed description of the invention
Fig. 1 is the circuit theory schematic diagram of system in the present invention.
Specific embodiment
In the embodiment shown in fig. 1, system of the invention includes server, and the work for comprehensively control modules is simultaneously And exchange data;Port is acquired, connected for system data bank interface and exchanges data;Process manipulates logic module, is used for It receives the reading and writing order of user and is transmitted to server;Temporal cache space, for the project data to be encrypted such as storing; Storing data interface connects for ciphertext data cloud space and exchanges data;Identification data acquires port, for acquiring The certificate data of user;Hidden layer module, for the hidden or display operation of data, to realize first layer encryption and decryption;It is anti- Imperial layer module, for the general encryption or decryption of data, to realize second layer encryption and decryption;Layer module is attacked, for data Attacker setting and releasing, to realize third layer encryption and decryption;Process manipulates logic module and acquisition port, server, storage Data-interface and the connection of temporal cache space, receive by the system data and operational order of the input of acquisition port;Server with Storing data interface, temporal cache space, defence layer module, identification data acquisition port and process manipulation logic module connect It connects, server receives the reading and writing order of process manipulation logic module;Server control defence layer module is encrypted or is decrypted behaviour Make;Defence layer module is connect with temporal cache space and server, empty to temporal cache is stored under the control of server Between in data carry out general encryption or decryption;Server controls hidden layer module and carries out hidden or display operation;Hidden layer Module is connect with temporal cache space and server, to the data being stored in the space of temporal cache under the control of server Carry out hidden or display operation;Server control attack layer module carries out attacker setting and releases;It attacks layer module and faces When spatial cache and server connection, the data being stored in the space of temporal cache are attacked under the control of server Program setting and releasing.
Identification data acquisition port is connect with server, and server acquires port by the identification data Receive the identification data of user;The identification data acquisition port is serial communication interface;The identity is known Fingerprint capturer outside other data collection terminal mouth connection carrys out captured identity identification information.
The defence layer module carries out general encryption and decryption to data using AES encryption method process;The hidden layer Module is to achieve the purpose that hide and display data by the utilization to disk partition gap and reserve sector;The attack layer mould Block is used to generate self recursive copying program and random file with trigger condition and deletes program to realize setting for attacker Fixed and releasing, described trigger condition is decryption command of the encryption data by non-default program, self described recursive copying Program is not Virus.
The method comprise the steps that first step hidden layer encrypts, it is first to realize that first layer encrypts to data hidden operation Project data to be encrypted is first stored in temporal cache space, hidden layer module is interim to being stored under the control of server Data in spatial cache carry out hidden operation;Second step defends layer encryption, encrypts to data generality, to realize that the second layer adds It is close, defend layer module to carry out general encryption to the data being stored in the space of temporal cache under the control of server;Third Data are carried out attacker setting by step attack layer encryption, to realize that third layer encrypts, control of the attack layer module in server Under attacker setting is carried out to the data that are stored in the space of temporal cache;4th step attacks layer decryption, the attack to data Program releases, and to release third layer encryption, project data to be decrypted is stored in temporal cache space, attack layer module is taking It is engaged in carrying out attacker release operation to the data being stored in the space of temporal cache under the control of device;5th step defends layer solution Close, to the encryption of data generality decryption defends layer module under the control of server to being stored in release second layer encryption Data in the space of temporal cache carry out the decryption oprerations of general encryption;The decryption of 6th step hidden layer, to data display operation, To release first layer encryption, hidden layer module shows the data being stored in the space of temporal cache under the control of server Show operation.
As known by the technical knowledge, the present invention can pass through the embodiment party of other essence without departing from its spirit or essential feature Case is realized.Embodiment disclosed above, in all respects are merely illustrative, not the only.It is all this It is included in the invention in invention scope or in the change being equal in the scope of the present invention.

Claims (7)

1. one kind is used for project management multilayer encrypting and deciphering system, which is characterized in that including
Server, for comprehensively control modules work and exchange data;
Port is acquired, connected for system data bank interface and exchanges data;
Process manipulates logic module, for receiving the reading and writing order of user and being transmitted to server;
Temporal cache space, for the project data to be encrypted such as storing;
Storing data interface connects for ciphertext data cloud space and exchanges data;
Identification data acquires port, for acquiring the certificate data of user;
Hidden layer module, for the hidden or display operation of data, to realize first layer encryption and decryption;
Layer module is defendd, for the general encryption or decryption of data, to realize second layer encryption and decryption;
Layer module is attacked, for the attacker setting and releasing of data, to realize third layer encryption and decryption;
Process manipulation logic module is connect with acquisition port, server, storing data interface and temporal cache space, reception by Acquire the system data and operational order of port input;
Server and storing data interface, temporal cache space, defence layer module, identification data acquisition port and process are grasped Logic module connection is controlled, server receives the reading and writing order of process manipulation logic module;
Server control defence layer module carries out encryption or decryption oprerations;Layer module and temporal cache space and server is defendd to connect It connects, general encryption or decryption is carried out to the data being stored in the space of temporal cache under the control of server;Server It controls hidden layer module and carries out hidden or display operation;Hidden layer module is connect with temporal cache space and server, is being taken It is engaged in carrying out hidden or display operation to the data being stored in the space of temporal cache under the control of device;Server control attack layer mould Block carries out attacker setting and releases;Attack layer module is connect with temporal cache space and server, in the control of server Attacker setting is carried out to the data being stored in the space of temporal cache under system and is released.
2. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the identity is known Other data collection terminal mouth is connect with server, and server acquires the identification that port receives user by the identification data Data.
3. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the identity Identification data collection terminal mouth is serial communication interface.
4. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the identity Fingerprint capturer outside identification data collection terminal mouth connection carrys out captured identity identification information.
5. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the defence layer Module carries out general encryption and decryption to data using AES encryption method process.
6. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the hidden layer Module is to achieve the purpose that hide and display data by the utilization to disk partition gap and reserve sector.
7. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the attack layer Module is used to generate self recursive copying program and random file with trigger condition and deletes program to realize attacker Setting and releasing, described trigger condition is decryption command of the encryption data by non-default program, self described circulation is multiple Processing procedure sequence is not Virus.
CN201810776425.XA 2018-07-10 2018-07-10 For project management multilayer encrypting and deciphering system Pending CN108989307A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810776425.XA CN108989307A (en) 2018-07-10 2018-07-10 For project management multilayer encrypting and deciphering system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810776425.XA CN108989307A (en) 2018-07-10 2018-07-10 For project management multilayer encrypting and deciphering system

Publications (1)

Publication Number Publication Date
CN108989307A true CN108989307A (en) 2018-12-11

Family

ID=64549260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810776425.XA Pending CN108989307A (en) 2018-07-10 2018-07-10 For project management multilayer encrypting and deciphering system

Country Status (1)

Country Link
CN (1) CN108989307A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101082883A (en) * 2006-05-31 2007-12-05 朴显泽 Storage apparatus having multiple layer encrypting protection
US20090319801A1 (en) * 2008-06-04 2009-12-24 Samsung Electronics Co., Ltd. Security-Enhanced Storage Devices Using Media Location Factor in Encryption of Hidden and Non-Hidden Partitions
CN104573441A (en) * 2014-08-12 2015-04-29 杭州华澜微科技有限公司 Computer with data privacy function and data encryption and hiding method thereof
US20150319147A1 (en) * 2014-05-01 2015-11-05 Sunix Co., Ltd System and method for file encrypting and decrypting
CN106576050A (en) * 2014-05-14 2017-04-19 英弗斯佩克特有限责任公司 Three-tiered security and computational architecture

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101082883A (en) * 2006-05-31 2007-12-05 朴显泽 Storage apparatus having multiple layer encrypting protection
US20090319801A1 (en) * 2008-06-04 2009-12-24 Samsung Electronics Co., Ltd. Security-Enhanced Storage Devices Using Media Location Factor in Encryption of Hidden and Non-Hidden Partitions
US20150319147A1 (en) * 2014-05-01 2015-11-05 Sunix Co., Ltd System and method for file encrypting and decrypting
CN106576050A (en) * 2014-05-14 2017-04-19 英弗斯佩克特有限责任公司 Three-tiered security and computational architecture
CN104573441A (en) * 2014-08-12 2015-04-29 杭州华澜微科技有限公司 Computer with data privacy function and data encryption and hiding method thereof

Similar Documents

Publication Publication Date Title
US10380361B2 (en) Secure transaction method from a non-secure terminal
KR101892203B1 (en) Method of using one device to unlock another device
CN107771383A (en) At least two authenticating devices are mapped to the method for user account using certificate server
CN111738238A (en) Face recognition method and device
CN106464488A (en) Information transmission method and mobile device
CN104335548B (en) A kind of secure data processing unit and method
CN106161032A (en) A kind of identity authentication method and device
CN108989033A (en) A kind of cloud storage method of controlling security and system based on public keys pond
CN104219044B (en) A kind of key secret method for being used to encrypt storage device
CN106789024B (en) A kind of remote de-locking method, device and system
CN105528306B (en) A kind of data read-write method and dual system termi-nal of dual system termi-nal
EP3759868A1 (en) Providing low risk exceptional access with verification of device possession
JP2009103774A (en) Secret sharing system
CN106452770A (en) Data encryption method and apparatus, data decryption method and apparatus, and system
CN106487659A (en) Information ciphering method and device, information decryption method and device and terminal
CN105208045A (en) Identity authentication method, equipment and system
CN109831300A (en) A kind of cipher key destruction method and device
CN108616516A (en) A kind of third party's plaintext password method of calibration based on multiple encryption algorithms
WO2016052959A1 (en) Online secret data management system and method therefor
CN112530053B (en) Control method and system of intelligent lock, lock equipment, server and storage medium
CN104820807B (en) A kind of intelligent card data processing method
CN108989307A (en) For project management multilayer encrypting and deciphering system
CN105897730A (en) User name and password information encryption and verification method
CN116361774A (en) Password cracking method and device
CN108933654A (en) For project management multilayer encipher-decipher method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination