CN108989307A - For project management multilayer encrypting and deciphering system - Google Patents
For project management multilayer encrypting and deciphering system Download PDFInfo
- Publication number
- CN108989307A CN108989307A CN201810776425.XA CN201810776425A CN108989307A CN 108989307 A CN108989307 A CN 108989307A CN 201810776425 A CN201810776425 A CN 201810776425A CN 108989307 A CN108989307 A CN 108989307A
- Authority
- CN
- China
- Prior art keywords
- data
- server
- layer module
- encryption
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The present invention discloses one kind for project management multilayer encrypting and deciphering system, which includes server, acquisition port, process manipulation logic module, temporal cache space, storing data interface, identification data acquisition port, hidden layer module, defends layer module, attack layer module;Server is connect with storing data interface, temporal cache space, defence layer module, identification data acquisition port and process manipulation logic module, and server receives the reading and writing order of process manipulation logic module.The technical program can greatly improve the safety of data by the cryptographic operation of multilayer.
Description
Technical field
It is especially a kind of that project is used for by multi-layer security raising Information Security the present invention relates to encryption technology field
Manage multilayer encrypting and deciphering system.
Background technique
Project refers to that a series of unique, complicated and activities that are mutually related, these activities have a specific mesh
Mark or purpose, it is necessary in specific time, budget, resource limit, be completed according to specification.Item argument include scope of project,
Quality, cost, time, resource.Project management just refers to the manager of project under limited resource constraint, with the sight of system
Point, method and theory effectively manage whole work that project is related to;Project management at present is substantially using calculating
Machine system is substantially using independent Password Management the encryption of project management and completes or using login authentication to complete
Method complete, the above-mentioned cipher mode risk that is cracked is big.
Summary of the invention
The technical solution adopted by the present invention to solve the technical problems is: system of the invention includes server, for comprehensive
It closes the work of control modules and exchanges data;Port is acquired, connected for system data bank interface and exchanges data;
Process manipulates logic module, for receiving the reading and writing order of user and being transmitted to server;Temporal cache space, for depositing
The project data to be encrypted such as put;Storing data interface connects for ciphertext data cloud space and exchanges data;Identification
Data collection terminal mouth, for acquiring the certificate data of user;Hidden layer module, for the hidden or display operation of data,
To realize first layer encryption and decryption;Layer module is defendd, for the general encryption or decryption of data, to realize second layer encryption and decryption;
Layer module is attacked, for the attacker setting and releasing of data, to realize third layer encryption and decryption;Process manipulate logic module with
Port, server, storing data interface and the connection of temporal cache space are acquired, is received by the system data of acquisition port input
And operational order;Server and storing data interface, temporal cache space, defence layer module, identification data acquire port
And process manipulation logic module connection, server receive the reading and writing order of process manipulation logic module;Server control defence layer
Module carries out encryption or decryption oprerations;Defence layer module is connect with temporal cache space and server, in the control of server
Under general encryption or decryption are carried out to the data that are stored in the space of temporal cache;It is hidden that server controls the progress of hidden layer module
It covers or display operation;Hidden layer module is connect with temporal cache space and server, to being stored under the control of server
Data in the space of temporal cache carry out hidden or display operation;Server control attack layer module carry out attacker setting with
It releases;Attack layer module is connect with temporal cache space and server, to being stored in temporal cache under the control of server
Data in space carry out attacker setting and release.
Further, identification data acquisition port is connect with server, and server passes through the identification data
Acquire the identification data that port receives user.
Further, identification data acquisition port is serial communication interface.
Further, the fingerprint capturer outside the connection of identification data acquisition port carrys out captured identity identification letter
Breath.
Further, the defence layer module carries out general encryption and decryption to data using AES encryption method process.
Further, the hidden layer module be reached by the utilization to disk partition gap and reserve sector hide with it is aobvious
The purpose of registration evidence.
Further, the attack layer module is used to generate self recursive copying program and random file with trigger condition
Program is deleted to realize the setting and releasing of attacker, described trigger condition is solution of the encryption data by non-default program
Close order, self described recursive copying program is not Virus.
The invention has the advantages that in the whole encryption of data, the technical program devise hidden layer, defence layer and
Layer encryption is attacked, hidden layer encryption can hide project data, and defence layer encryption can use AES encryption method to project data
It is generally encrypted, the encryption of attack layer can be to the attacker for presetting similar virus in project data;Intention is cracked and is added
For the operator of ciphertext part, hidden layer encryption and defence layer encryption will receive attack journey it cracks system after being cracked
The destruction of sequence is intended to crack in this case the operator of encryption file obviously without time reply attacker to terminate
It cracks, the technical program can greatly improve the safety of data by the cryptographic operation of multilayer.
Detailed description of the invention
Fig. 1 is the circuit theory schematic diagram of system in the present invention.
Specific embodiment
In the embodiment shown in fig. 1, system of the invention includes server, and the work for comprehensively control modules is simultaneously
And exchange data;Port is acquired, connected for system data bank interface and exchanges data;Process manipulates logic module, is used for
It receives the reading and writing order of user and is transmitted to server;Temporal cache space, for the project data to be encrypted such as storing;
Storing data interface connects for ciphertext data cloud space and exchanges data;Identification data acquires port, for acquiring
The certificate data of user;Hidden layer module, for the hidden or display operation of data, to realize first layer encryption and decryption;It is anti-
Imperial layer module, for the general encryption or decryption of data, to realize second layer encryption and decryption;Layer module is attacked, for data
Attacker setting and releasing, to realize third layer encryption and decryption;Process manipulates logic module and acquisition port, server, storage
Data-interface and the connection of temporal cache space, receive by the system data and operational order of the input of acquisition port;Server with
Storing data interface, temporal cache space, defence layer module, identification data acquisition port and process manipulation logic module connect
It connects, server receives the reading and writing order of process manipulation logic module;Server control defence layer module is encrypted or is decrypted behaviour
Make;Defence layer module is connect with temporal cache space and server, empty to temporal cache is stored under the control of server
Between in data carry out general encryption or decryption;Server controls hidden layer module and carries out hidden or display operation;Hidden layer
Module is connect with temporal cache space and server, to the data being stored in the space of temporal cache under the control of server
Carry out hidden or display operation;Server control attack layer module carries out attacker setting and releases;It attacks layer module and faces
When spatial cache and server connection, the data being stored in the space of temporal cache are attacked under the control of server
Program setting and releasing.
Identification data acquisition port is connect with server, and server acquires port by the identification data
Receive the identification data of user;The identification data acquisition port is serial communication interface;The identity is known
Fingerprint capturer outside other data collection terminal mouth connection carrys out captured identity identification information.
The defence layer module carries out general encryption and decryption to data using AES encryption method process;The hidden layer
Module is to achieve the purpose that hide and display data by the utilization to disk partition gap and reserve sector;The attack layer mould
Block is used to generate self recursive copying program and random file with trigger condition and deletes program to realize setting for attacker
Fixed and releasing, described trigger condition is decryption command of the encryption data by non-default program, self described recursive copying
Program is not Virus.
The method comprise the steps that first step hidden layer encrypts, it is first to realize that first layer encrypts to data hidden operation
Project data to be encrypted is first stored in temporal cache space, hidden layer module is interim to being stored under the control of server
Data in spatial cache carry out hidden operation;Second step defends layer encryption, encrypts to data generality, to realize that the second layer adds
It is close, defend layer module to carry out general encryption to the data being stored in the space of temporal cache under the control of server;Third
Data are carried out attacker setting by step attack layer encryption, to realize that third layer encrypts, control of the attack layer module in server
Under attacker setting is carried out to the data that are stored in the space of temporal cache;4th step attacks layer decryption, the attack to data
Program releases, and to release third layer encryption, project data to be decrypted is stored in temporal cache space, attack layer module is taking
It is engaged in carrying out attacker release operation to the data being stored in the space of temporal cache under the control of device;5th step defends layer solution
Close, to the encryption of data generality decryption defends layer module under the control of server to being stored in release second layer encryption
Data in the space of temporal cache carry out the decryption oprerations of general encryption;The decryption of 6th step hidden layer, to data display operation,
To release first layer encryption, hidden layer module shows the data being stored in the space of temporal cache under the control of server
Show operation.
As known by the technical knowledge, the present invention can pass through the embodiment party of other essence without departing from its spirit or essential feature
Case is realized.Embodiment disclosed above, in all respects are merely illustrative, not the only.It is all this
It is included in the invention in invention scope or in the change being equal in the scope of the present invention.
Claims (7)
1. one kind is used for project management multilayer encrypting and deciphering system, which is characterized in that including
Server, for comprehensively control modules work and exchange data;
Port is acquired, connected for system data bank interface and exchanges data;
Process manipulates logic module, for receiving the reading and writing order of user and being transmitted to server;
Temporal cache space, for the project data to be encrypted such as storing;
Storing data interface connects for ciphertext data cloud space and exchanges data;
Identification data acquires port, for acquiring the certificate data of user;
Hidden layer module, for the hidden or display operation of data, to realize first layer encryption and decryption;
Layer module is defendd, for the general encryption or decryption of data, to realize second layer encryption and decryption;
Layer module is attacked, for the attacker setting and releasing of data, to realize third layer encryption and decryption;
Process manipulation logic module is connect with acquisition port, server, storing data interface and temporal cache space, reception by
Acquire the system data and operational order of port input;
Server and storing data interface, temporal cache space, defence layer module, identification data acquisition port and process are grasped
Logic module connection is controlled, server receives the reading and writing order of process manipulation logic module;
Server control defence layer module carries out encryption or decryption oprerations;Layer module and temporal cache space and server is defendd to connect
It connects, general encryption or decryption is carried out to the data being stored in the space of temporal cache under the control of server;Server
It controls hidden layer module and carries out hidden or display operation;Hidden layer module is connect with temporal cache space and server, is being taken
It is engaged in carrying out hidden or display operation to the data being stored in the space of temporal cache under the control of device;Server control attack layer mould
Block carries out attacker setting and releases;Attack layer module is connect with temporal cache space and server, in the control of server
Attacker setting is carried out to the data being stored in the space of temporal cache under system and is released.
2. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the identity is known
Other data collection terminal mouth is connect with server, and server acquires the identification that port receives user by the identification data
Data.
3. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the identity
Identification data collection terminal mouth is serial communication interface.
4. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the identity
Fingerprint capturer outside identification data collection terminal mouth connection carrys out captured identity identification information.
5. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the defence layer
Module carries out general encryption and decryption to data using AES encryption method process.
6. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the hidden layer
Module is to achieve the purpose that hide and display data by the utilization to disk partition gap and reserve sector.
7. according to claim 1 a kind of for project management multilayer encrypting and deciphering system, which is characterized in that the attack layer
Module is used to generate self recursive copying program and random file with trigger condition and deletes program to realize attacker
Setting and releasing, described trigger condition is decryption command of the encryption data by non-default program, self described circulation is multiple
Processing procedure sequence is not Virus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810776425.XA CN108989307A (en) | 2018-07-10 | 2018-07-10 | For project management multilayer encrypting and deciphering system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810776425.XA CN108989307A (en) | 2018-07-10 | 2018-07-10 | For project management multilayer encrypting and deciphering system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108989307A true CN108989307A (en) | 2018-12-11 |
Family
ID=64549260
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810776425.XA Pending CN108989307A (en) | 2018-07-10 | 2018-07-10 | For project management multilayer encrypting and deciphering system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108989307A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101082883A (en) * | 2006-05-31 | 2007-12-05 | 朴显泽 | Storage apparatus having multiple layer encrypting protection |
US20090319801A1 (en) * | 2008-06-04 | 2009-12-24 | Samsung Electronics Co., Ltd. | Security-Enhanced Storage Devices Using Media Location Factor in Encryption of Hidden and Non-Hidden Partitions |
CN104573441A (en) * | 2014-08-12 | 2015-04-29 | 杭州华澜微科技有限公司 | Computer with data privacy function and data encryption and hiding method thereof |
US20150319147A1 (en) * | 2014-05-01 | 2015-11-05 | Sunix Co., Ltd | System and method for file encrypting and decrypting |
CN106576050A (en) * | 2014-05-14 | 2017-04-19 | 英弗斯佩克特有限责任公司 | Three-tiered security and computational architecture |
-
2018
- 2018-07-10 CN CN201810776425.XA patent/CN108989307A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101082883A (en) * | 2006-05-31 | 2007-12-05 | 朴显泽 | Storage apparatus having multiple layer encrypting protection |
US20090319801A1 (en) * | 2008-06-04 | 2009-12-24 | Samsung Electronics Co., Ltd. | Security-Enhanced Storage Devices Using Media Location Factor in Encryption of Hidden and Non-Hidden Partitions |
US20150319147A1 (en) * | 2014-05-01 | 2015-11-05 | Sunix Co., Ltd | System and method for file encrypting and decrypting |
CN106576050A (en) * | 2014-05-14 | 2017-04-19 | 英弗斯佩克特有限责任公司 | Three-tiered security and computational architecture |
CN104573441A (en) * | 2014-08-12 | 2015-04-29 | 杭州华澜微科技有限公司 | Computer with data privacy function and data encryption and hiding method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10380361B2 (en) | Secure transaction method from a non-secure terminal | |
KR101892203B1 (en) | Method of using one device to unlock another device | |
CN107771383A (en) | At least two authenticating devices are mapped to the method for user account using certificate server | |
CN111738238A (en) | Face recognition method and device | |
CN106464488A (en) | Information transmission method and mobile device | |
CN104335548B (en) | A kind of secure data processing unit and method | |
CN106161032A (en) | A kind of identity authentication method and device | |
CN108989033A (en) | A kind of cloud storage method of controlling security and system based on public keys pond | |
CN104219044B (en) | A kind of key secret method for being used to encrypt storage device | |
CN106789024B (en) | A kind of remote de-locking method, device and system | |
CN105528306B (en) | A kind of data read-write method and dual system termi-nal of dual system termi-nal | |
EP3759868A1 (en) | Providing low risk exceptional access with verification of device possession | |
JP2009103774A (en) | Secret sharing system | |
CN106452770A (en) | Data encryption method and apparatus, data decryption method and apparatus, and system | |
CN106487659A (en) | Information ciphering method and device, information decryption method and device and terminal | |
CN105208045A (en) | Identity authentication method, equipment and system | |
CN109831300A (en) | A kind of cipher key destruction method and device | |
CN108616516A (en) | A kind of third party's plaintext password method of calibration based on multiple encryption algorithms | |
WO2016052959A1 (en) | Online secret data management system and method therefor | |
CN112530053B (en) | Control method and system of intelligent lock, lock equipment, server and storage medium | |
CN104820807B (en) | A kind of intelligent card data processing method | |
CN108989307A (en) | For project management multilayer encrypting and deciphering system | |
CN105897730A (en) | User name and password information encryption and verification method | |
CN116361774A (en) | Password cracking method and device | |
CN108933654A (en) | For project management multilayer encipher-decipher method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |