CN1932810A - Method for storing and sharing data utilizing encrypted technology - Google Patents

Method for storing and sharing data utilizing encrypted technology Download PDF

Info

Publication number
CN1932810A
CN1932810A CN 200510102664 CN200510102664A CN1932810A CN 1932810 A CN1932810 A CN 1932810A CN 200510102664 CN200510102664 CN 200510102664 CN 200510102664 A CN200510102664 A CN 200510102664A CN 1932810 A CN1932810 A CN 1932810A
Authority
CN
China
Prior art keywords
data
file
encryption
carried out
utilizing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510102664
Other languages
Chinese (zh)
Inventor
李晓耕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200510102664 priority Critical patent/CN1932810A/en
Publication of CN1932810A publication Critical patent/CN1932810A/en
Pending legal-status Critical Current

Links

Images

Abstract

One method for data storage and share uses encryption technology. a. Application carries structured management with user input data by special software and keeps them in encryption manner. b. Application carries the same management with data of data document. c. The application of client ending downloads the data document to read and decrypt the data of encryption document through correspond module. It adopts high exploitation mechanism to get most quick administer efficiency and uses mark data to mark the data and to greatly predigest the searches and demand of data. Transfer module reads the data with mark without caring about the specific encrypt, decrypt process and storage format of the data to improve the stability with abroad application, high efficiency and easy operation.

Description

A kind of method of utilizing encryption technology to carry out data storage and share
Technical field
The present invention relates to a kind of structured storage and shared universal method of utilizing encryption technology to carry out data, further be meant a kind of method of serving the data storage between multiple programming language and a plurality of software module and sharing exchange.
Background technology
In the current software programming, programming software is of a great variety, from higher level lanquage Visual Basic, Delphi is to the C/C++ of middle rank, and rudimentary assembly language, and various language all have its field of being good at, the software development efficiency height that has, the construction cycle is short, and development difficulty is low; The efficient height carried out in the language that has, and the construction cycle is long, and development difficulty is big.In a large-scale project, often involve and both needed high development efficiency, need high execution efficient again, usually use the situation of the mixed exploitation of multiple programming language like this in a project, development language rudimentary in using on the emphasis difficult point is developed, and shows at program, relatively-stationary and simple relatively module such as database access and printing is used the higher level lanquage exploitation, can improve development efficiency like this, shorten the construction cycle, can guarantee the execution efficient of software again.But do the data sharing that is certain to increase in the module that develops software of using the different language exploitation and the difficulty and the complexity of data transfer like this.And the efficient difference of every kind of language, the Memory Allocation that arrives that relates to is also different with use, and type of definition of data or the like all exists than big difference.
Web programming in recent years because of the fast development of Internet with and distinctive advantage popularize rapidly, the inlet of operation of lot of data storehouse or even software program all is transplanted to Web and is gone up, and a lot of programs are utilized the friendly interface of Web with the characteristic that is easy to safeguard Web all to be transferred in the major part operation of software and gone up.Do the real-time update at Control Software part interface at any time like this, function restriction etc.We can say that Web programmes and brought revolutionary variation to whole software programming.But Web programming also has its limitation, such as can not maximized use local resource, the term of execution need network to connect and safety issue.The Web program need be used local resource under specific demand like this, thereby needs to carry out exchanges data with local application program.
Under some specific occasions, software need be kept at some private informations of user on the local computer, obtains these information when perhaps needing start next time automatically, or gives other programs with these information and use.Because these information are the contents that are related to the individual privacy aspect, so software need will be saved in after these information encryptions on the disk in case seen by other people again.Though there is the algorithm of a lot of encryptions, deciphering available at present, the cryptographic algorithm that has realizes that difficulty is big, and the cryptographic algorithm that has is carried out inefficiency, and there are all use restrictions in the encryption technology that also has.And under several disparate modules of a software, to use one group of needs ciphered data simultaneously, then need a plurality of modules to realize coordinating the mode and the method for encrypting and decrypting, otherwise encrypting and decrypting data that can not be correct.
Summary of the invention
In view of the characteristics of the highly-efficient implementation of intermediary language and the demand that between dissimilar programs, the exploitation of different programming language, can freely use, the invention provides a kind of structured storage and shared universal method of utilizing encryption technology to carry out data, it can be used as a kind of method of serving the data storage between multiple programming language and a plurality of software module and sharing exchange.
Another object of the present invention is to the dynamic link library form as main encrypting and decrypting module, user's needs in design, have been taken into full account, shielded and specific programming language, the content that specific file system is relevant, used for reference the advantage of several data cipher mode, and making of internal memory has been used as significantly optimization.
In order to achieve the above object, the invention provides following technical scheme:
A kind of method of utilizing encryption technology to carry out data storage and share, it comprises following steps:
A, application program are carried out the structuring processing by special software with the data of user's input, and preserve in the mode of encrypting;
Wherein, this special software carries out the step that structuring handles and more specifically is:
A1, create required data file encryption, perhaps open already present data file encryption according to demand;
A2, according to the data type of each data in the design needs specific data file, data length, and Data Identification;
The initialization values of a3, the every data of input, file description information is preserved file.
B, the application program data in data file are correspondingly processed;
Wherein, application of the Web in this step or application program to the step that data handle accordingly more specifically are:
B1, open data file encryption, read file description information, judge the data file encryption purposes;
B2, read the data after the deciphering or upgrade the data that existed according to Data Identification;
B3, the file after will upgrading are given other application.
And step b3 further is meant: data can be used from Web and directly forward the application program use to.
C, client application are downloaded this data file, and by corresponding module read and the enabling decryption of encrypted file in data.
In addition, described structured data file form is: file header sign, file basis message block, key district, file description district, attribute information district, data field.
Described ciphered data file adopts the mode of dynamic random secret key encryption, deposits key with the dynamic discrete distribution pattern in the form of its data file, and with the technical protection data file of multiple secret key encryption.
The length of described encryption key is 512.
The present invention is owing to adopted efficient development mechanism, use the different software module of this mode can reach the fastest execution efficient, adopt the mode of Data Identification with identification data, can be with the retrieval of data, inquiry waits operation to simplify greatly, calling module only need read needs the sign data designated, and without the concrete encryption of relation data, decrypting process and storage format, thereby make each module on upper strata, assembly only is absorbed in the problem that solves its field itself, the realization that this has improved the stability and the robustness of system to a certain extent and has simplified system.The present invention have be widely used, high-level efficiency, advantage such as simple and easy to do; Its function that can realize is as follows:
1, single module can be stored self-defining data with encrypted form, thereby has avoided losing or being distorted for private information is possible on local computer;
2, single module can be stored in mass data on the Local or Remote computing machine according to self-defining sign, in needs, only need read and get final product from designated identification, software module provided by the invention can and be searched data under the designated identification with the deciphering of the fastest speed, and the seek rate of data is subjected to the data quantitative limitation hardly and slows down;
3, disparate modules can use same data file to exchange and shared data, and intermodule needn't be concerned about storage and encrypting and decrypting details and directly use data;
4, provide visual data additions and deletions to change the software of function, service data easily;
5, taked complicated encryption mechanism, can prevent that data are subjected to distorting of malice.
Describe the present invention in detail below in conjunction with the drawings and specific embodiments.
Description of drawings
Fig. 1 is a software work structural representation of the present invention;
Fig. 2 is data flow figure of the present invention;
Fig. 3 is a data storage synoptic diagram of the present invention;
Fig. 4 the present invention is based on relevant schematic diagram data of the present invention in the video conference of web administration;
Fig. 5 is a software module operation enciphered data synoptic diagram of the present invention;
Fig. 6 is the method flow diagram of the embodiment of the invention.
Embodiment
Below, with reference to the accompanying drawings embodiments of the invention are elaborated.
At first just structured data file form, data manipulation mode and the encryption policy of the present invention's generation describe respectively.
One, structured data file form
The ciphered data file as shown in Figure 3, its by six the part form, be respectively:
1, file header sign:
Be used to identify the data file encryption of this file for software creation of the present invention;
2, file basis message block:
Be used to deposit the Back ground Information of file, comprise fileversion number, information such as this document store data inside quantity;
3, key district:
Be used to deposit the later unique key information that is used for this file of encrypting and decrypting of strong encryption;
4, file description district:
Be used to indicate the purposes information of this document;
5, attribute information district:
Be used to deposit the Data Identification information of this document stored;
6, data field
Be used to deposit the concrete data that are used to store or share exchange after the encryption.
Two, data manipulation mode
Enciphered data can be used for the storage and the exchange of various data and share, so encrypting and decrypting module of the present invention can be operated a plurality of data files simultaneously, in order to reach the fastest execution efficient, the operation of data is carried out in internal memory fully, unless the upper layer software (applications) explicitly is forced encrypting-decrypting module storage file at once, encrypting-decrypting module will flush to disk with specific data file (perhaps entire data files) at once like that.
Each upper application software or module can be managed a plurality of encrypt files simultaneously, and each encrypt file can be managed many set of encrypted data simultaneously, and every set of encrypted data comprises a plurality of encrypted data item again.The data volume that such application involves may be very large, and the present invention has adopted the data retrieval strategy of optimizing for this reason, to ensure under lot of data extremely and extremely can retrieve data under the designated identification in the complex data structures rapidly.
The data retrieval strategy comprises:
Specially for the data-switching of data retrieval, data are done the conversion that is convenient to retrieve earlier in the prerequisite that does not change its content when 1, data generate;
2, use the mode of hash table, improve retrieval rate as data retrieval.
As shown in Figure 5, it is a plurality of data file encryptions under the same software administration.
The step of a upper layer application operation data file encryption is specific as follows:
1, calls the Push order of encrypting-decrypting module, a data file encryption is loaded in the module, operate a plurality of data file encryptions if desired simultaneously, can successively they be loaded, and need not consider loading sequence;
2, call the Active order of encrypting-decrypting module, the data file encryption that will work as pre-treatment is directed to specified file;
3, read or write data according to Data Identification;
4,, can call Save and will change Refresh Data to disk as the need perdurable data;
5, operate data in other data file encryptions if desired, repeat 2 operation.
Three, encryption policy
Reliable for the data security that makes storage, the present invention has taked multiple encryption measures to be used for protected file can not be maliciously tampered.Like this, even preserve the such critical data of user cipher, can be convenient as the operation general data, simple.
Encryption measures of the present invention mainly comprises following five:
1, the secret key encryption of 512 bit lengths
Stolen easily for the password that prevents the ciphered data file, the present invention adopts the encryption key of 512 bit lengths, and the key of this length can ensure under present computer hardware condition, and the key software method that cracks that uses force that is difficult to be cracked cracks.
2, dynamic key is preserved
The ciphered data file layout adopts the dynamic discrete distribution pattern to deposit key, the position difference of not only different document storage keys, with regard to single file, every preservation or generate the ciphered data file one time, key position hereof all is different fully with the deposit position of last time.Dynamic key is preserved and can be prevented effectively that the cracker from enumerating mode of comparing by sampling repeatedly and cracking file.
3, dynamic key generates
The mode different with the fixed key encryption measures of common encryption, deciphering, that the ciphered data file that the present invention generates adopts dynamic key to encrypt, that is: every preservation or generate the ciphered data file one time, corresponding key all can change.Newly-generated key is different fully with original cipher key, and does not have any priority relevance.Even if the dynamic key generation technique has ensured the password of certain file by Brute Force, the cracker can not crack alternative document according to the algorithm that cracks this file so.
4, multiple key
Because encrypt file finally can be by system reducing to internal memory; so ciphering process is reversible; multiple Key Encryption Technology protected data file is adopted in the easy tracked reduction of single cipher key encryption mechanism, the present invention, has ensured that the cracker is difficult to utilize the anti-password that solves of regular input and output.Multiple key mainly shows as: key generates successively according to a plurality of conditions, each condition all can be encrypted key once more according to the characteristics of this condition, final like this key shows differently fully with initial key after repeatedly encrypting again, thereby makes the cracker can not find its contact intuitively.
5, dynamic disturbance mechanism
Generally speaking, the cracker can use identical and relevant data repeatedly to read or preserve same group of data, because the data of its use all are identical, so can be by calculating encryption mechanism after these identical data contrast ciphered data, in order to prevent such cracking, the present invention adopts dynamic disturbance mechanism, that is: packet is preserved, the encryption of each group all is different, comprise identical data in instant a plurality of groups, owing to encrypt difference, data encrypted is different naturally, can effectively prevent to use identical and relevant data to come anti-decryption key cracker like this.The present invention is for the processing of redundant data employing random variation, that is: redundant data is a random variation.So also can effectively disturb cracker's thinking.
Secondly, cooperate Fig. 6, Fig. 1 and Fig. 2, further specify as follows embodiment of the invention method:
(A) use the special software (Editor) among the present invention that the data that need to store, share and transmit are carried out the structuring processing, be specially:
A1, create required data file encryption, perhaps open already present data file encryption according to demand;
A2, according to the data type of each data in the design needs specific data file, data length, and Data Identification;
The initialization values of a3, the every data of input, file description information is preserved file;
(B) application program is inquired about in data file by software module provided by the invention, revises, and preserves data;
Wherein, Web application or application program are done following processing to data:
(b1) Web application or application program are opened data file encryption, read file description information, judge the data file encryption purposes;
(b2) Web uses or application program reads the data after the deciphering or upgrades the data that existed according to Data Identification;
(b3) file after Web application or application program will be upgraded is given other application, further is that data can directly forward the application program use to from the Web application.
(C) other softwares utilize corresponding module read and the enabling decryption of encrypted file in data; The processing procedure of other software data processings is identical with the disposal route that aforementioned Web uses.
At last, Fig. 4 has provided middle the use about schematic diagram data of the present invention of video conference (WebVision) based on web administration.It has indicated individual module and has used independent structures enciphered data and a plurality of module to share the use flow process of same enciphered data.Web application based on Asp.net converts the input of user under the Web pattern to structural data, and after preserving in the mode of encrypting, client application is downloaded this data file by Internet, and by deciphering module data decryption of the present invention, thereby obtain the information that the user is provided with or imports on Web, thereby be connected to the WebVision server and sign in to the Web conference chamber of appointment automatically according to these information.
Even for the WebVision client software, the present invention also can solve its independently interface module to data storages with the data security problem in reading.Because the WebVision client software can be changed self interface model and interface color dynamically, therefore client software need be stored different types of interface element respectively, because the commerciality of WebVision has determined that these interface elements can not be by arbitrarily change of user, therefore the WebVision client software adopts technology storage of the present invention with interface data and reads, and client software can utilize the Data Identification of oneself to store and reading of data under not with the situation of considering any encryption, deciphering like this.
In sum, the present invention adopts efficient development mechanism, makes the different software module can reach the fastest execution efficient; Adopt the mode of Data Identification with identification data, operations such as the retrieval of data, inquiry can be simplified greatly, calling module only need read needs the sign data designated, and without concrete encryption, decrypting process and the storage format of relation data, thereby each module, the assembly that make the upper strata only are absorbed in the problem that solves its field itself, the realization that this has improved the stability and the robustness of system to a certain extent and has simplified system.
What may be obvious that for the person of ordinary skill of the art draws other advantages and modification.Therefore, the present invention with wider aspect is not limited to shown and described specifying and exemplary embodiment here.Therefore, under the situation of the spirit and scope that do not break away from claim and the defined general inventive concept of equivalents thereof, can make corresponding modification to it.

Claims (7)

1, a kind of encryption technology of utilizing is carried out data storage and shared method, and it comprises following steps:
A, application program are carried out the structuring processing by special software with the data of user's input, and preserve in the mode of encrypting;
B, the application program data in data file are correspondingly processed;
C, client application are downloaded this data file, and by corresponding module read and the enabling decryption of encrypted file in data.
2, the encryption technology of utilizing as claimed in claim 1 is carried out data storage and shared method, and wherein this special software carries out the step that structuring handles and more specifically is:
A1, create required data file encryption, perhaps open already present data file encryption according to demand;
A2, according to the data type of each data in the design needs specific data file, data length, and Data Identification;
The initialization values of a3, the every data of input, file description information is preserved file.
3, the encryption technology of utilizing as claimed in claim 1 is carried out data storage and shared method, and wherein application of the Web among the step b or application program to the step that data handle accordingly more specifically are:
B1, open data file encryption, read file description information, judge the data file encryption purposes;
B2, read the data after the deciphering or upgrade the data that existed according to Data Identification;
B3, the file after will upgrading are given other application.
4, the encryption technology of utilizing as claimed in claim 3 is carried out data storage and shared method, and wherein step b3 further is meant: data can be used from Web and directly forward the application program use to.
5, the encryption technology of utilizing as claimed in claim 1 is carried out data storage and shared method, and wherein this structured data file form is: file header sign, file basis message block, key district, file description district, attribute information district, data field.
6, the encryption technology of utilizing as claimed in claim 1 is carried out data storage and shared method; wherein said ciphered data file adopts the mode of dynamic random secret key encryption; deposit key with the dynamic discrete distribution pattern in the form of its data file, and with the technical protection data file of multiple secret key encryption.
7, the encryption technology of utilizing as claimed in claim 6 is carried out data storage and shared method, and the length of wherein said encryption key is 512.
CN 200510102664 2005-09-13 2005-09-13 Method for storing and sharing data utilizing encrypted technology Pending CN1932810A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510102664 CN1932810A (en) 2005-09-13 2005-09-13 Method for storing and sharing data utilizing encrypted technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510102664 CN1932810A (en) 2005-09-13 2005-09-13 Method for storing and sharing data utilizing encrypted technology

Publications (1)

Publication Number Publication Date
CN1932810A true CN1932810A (en) 2007-03-21

Family

ID=37878645

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510102664 Pending CN1932810A (en) 2005-09-13 2005-09-13 Method for storing and sharing data utilizing encrypted technology

Country Status (1)

Country Link
CN (1) CN1932810A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490878A (en) * 2013-10-15 2014-01-01 上海杉德金卡信息系统科技有限公司 Methods for dynamic secret key storing and stored secret key reading and deleting
CN104156451A (en) * 2014-08-18 2014-11-19 深圳市一五一十网络科技有限公司 Data storage managing method and system
CN105554038A (en) * 2016-02-25 2016-05-04 浪潮通用软件有限公司 Control method for data security during on-line system and off-line system data interaction
CN110874231A (en) * 2018-09-04 2020-03-10 中兴通讯股份有限公司 Method, device and storage medium for updating terminal version
WO2022144015A1 (en) * 2021-01-03 2022-07-07 潘晓虹 Electronic file container, and code generation method and apparatus

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490878A (en) * 2013-10-15 2014-01-01 上海杉德金卡信息系统科技有限公司 Methods for dynamic secret key storing and stored secret key reading and deleting
CN103490878B (en) * 2013-10-15 2016-09-21 上海杉德金卡信息系统科技有限公司 Reading after a kind of key dynamic storage method and storage, delet method
CN104156451A (en) * 2014-08-18 2014-11-19 深圳市一五一十网络科技有限公司 Data storage managing method and system
CN105554038A (en) * 2016-02-25 2016-05-04 浪潮通用软件有限公司 Control method for data security during on-line system and off-line system data interaction
CN110874231A (en) * 2018-09-04 2020-03-10 中兴通讯股份有限公司 Method, device and storage medium for updating terminal version
WO2022144015A1 (en) * 2021-01-03 2022-07-07 潘晓虹 Electronic file container, and code generation method and apparatus

Similar Documents

Publication Publication Date Title
CN106127075B (en) Encryption method can search for based on secret protection under a kind of cloud storage environment
Williams et al. Single round access privacy on outsourced storage
CN101436208B (en) Ciphertext database privacy protection enquiring method
CN1122213C (en) Method and apparatus for signing and sealing objects
CN101040275A (en) Contents encryption method, system and method for providing contents through network using the encryption method
CN103107889A (en) System and method for cloud computing environment data encryption storage and capable of searching
Wang et al. Fast query over encrypted character data in database
CN102609769A (en) Data acquisition tool and data acquisition method
CN1889426A (en) Method and system for realizing network safety storaging and accessing
CN114153374B (en) Distributed storage system for jointly storing metadata and data
CN108573176B (en) Method and system for safely deleting data of mobile terminal encrypted by key derivation
CN1932810A (en) Method for storing and sharing data utilizing encrypted technology
CN101043326A (en) Dynamic information encrypting system and method
WO2016168027A1 (en) Customized trusted computer for secure data processing and storage
CN105718808A (en) File encryption storage system and method based on multiple network disks
CN101345624B (en) Document access system and method
CN103425933A (en) Data homomorphic encrypting and unloading method of multi-data source
CN111414635A (en) File encryption and decryption method, device, equipment and storage medium
CN103414555B (en) The key management method that array is encrypted based on I/O block
CN1291328C (en) Method and system for storing divided files and restoring treatment
CN1788245A (en) Digital rights management
CN101060398A (en) A new safety group safety certificate generating method, communication method, and network system
CN106919348A (en) Distributed memory system and storage method that anti-violence is cracked
CN1992714A (en) Authority principal method based on trusted computing platform
CN111552988B (en) Forward safe k neighbor retrieval method and system based on Monte Carlo sampling

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication