CN102624516B - The method of encryption and decryption, system and gateway device are carried out to information - Google Patents

The method of encryption and decryption, system and gateway device are carried out to information Download PDF

Info

Publication number
CN102624516B
CN102624516B CN201110406949.8A CN201110406949A CN102624516B CN 102624516 B CN102624516 B CN 102624516B CN 201110406949 A CN201110406949 A CN 201110406949A CN 102624516 B CN102624516 B CN 102624516B
Authority
CN
China
Prior art keywords
information
equipment
user
encryption
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110406949.8A
Other languages
Chinese (zh)
Other versions
CN102624516A (en
Inventor
耿振民
安锡文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU CINSEC INFORMATION TECHNOLOGY CO., LTD.
Original Assignee
SHANGHAI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI CINSEC INFORMATION TECHNOLOGY Co Ltd filed Critical SHANGHAI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority to CN201110406949.8A priority Critical patent/CN102624516B/en
Publication of CN102624516A publication Critical patent/CN102624516A/en
Application granted granted Critical
Publication of CN102624516B publication Critical patent/CN102624516B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides and a kind of the method for encryption and decryption, system and equipment are carried out to information.According to method of the present invention, after the decrypts information of described second devices encrypt, send the second equipment used from this first user to first equipment based on the upload request information of first user; In addition, also by from the first equipment and the information relevant to the download request information of the second user sends back the second equipment corresponding to this second user after being encrypted, the information that can realize thus exists in different forms in varying environment, and especially at subscriber equipment end, information exists with ciphertext form; In network server end, information then exists with plaintext version, can effectively avoid thus existing with single ciphertext form problem, the problem includes: the information problem that cannot correctly show because encryption system wrecks.

Description

The method of encryption and decryption, system and gateway device are carried out to information
Technical field
The present invention relates to encryption and decryption field, particularly relate to a kind of method, system and the gateway device that information are carried out to the encryption and decryption of encryption and decryption.
Background technology
Along with the development popularized with the Internet and movable storage device of computer application, former paper document changes e-file into gradually.Due to e-file have volume little, check many advantages such as convenient, make e-file be able to tremendous development.But e-file also has the characteristic of easy change, easily propagation simultaneously, those characteristics have a strong impact on e-file and store and the fail safe exchanged, therefore, how effective e-file important to enterprises and institutions inside carries out unified security and deposits, manages concentratedly and use and just become those skilled in the art's problem in urgent need to solve.
At present, the protected mode of e-file is mainly encrypted e-file, thus reaches the protection to e-file.But, this kind of mode result in a problem, that is: be no matter to be encrypted by application program or to the e-file be totally encrypted, as long as through encryption, no matter e-file is at server end or at subscriber equipment end, all exist with the form of ciphertext, thus, once encryption system suffers that destruction cannot be decrypted ciphertext, and before this encryption system does not recover, those e-files existed with encrypted test mode just all cannot be checked, this can make to need to use the work of the personnel of those e-files existed with encrypted test mode normally to carry out, bring unnecessary loss may to thus this personnel unit one belongs to.
Therefore, in the urgent need to improving existing file encryption and decryption mode.
Summary of the invention
The shortcoming of prior art in view of the above, the object of the present invention is to provide and a kind ofly carry out the method for encryption and decryption, system and equipment to information, exist in different forms in different environments to realize information.
For achieving the above object and other relevant objects, the invention provides a kind of method of information being carried out to encryption and decryption, for comprising the network system of the first equipment and the second equipment, it at least comprises step:
A) after the decrypts information of described second devices encrypt, the second equipment used from this first user is sent to first equipment based on the upload request information of first user;
Described also step is comprised to the method that information carries out encryption and decryption:
A) by from the first equipment and the information relevant to the download request information of the second user sends back the second equipment corresponding to this second user after being encrypted.
The present invention also provides a kind of encrypting and deciphering system information being carried out to encryption and decryption, and for comprising the network system of the first equipment and the second equipment, it at least comprises:
Deciphering module, sends the second equipment used from this first user to first equipment for the upload request information based on first user after the decrypts information of described second devices encrypt; And
Encrypting module, for by from the first equipment and the information relevant to the download request information of the second user sends back the second equipment corresponding to this second user after being encrypted.
The present invention also provides a kind of gateway device, and for comprising the network system of the first equipment and the second equipment, it comprises aforesaid encrypting and deciphering system information being carried out to encryption and decryption.
As mentioned above, of the present inventionly carry out the method for encryption and decryption, system and equipment to information, have following beneficial effect: the information that can realize exists in different forms in varying environment, especially at subscriber equipment end, information exists with ciphertext form; In network server end, information then exists with plaintext version, can effectively avoid thus existing with single ciphertext form problem, the problem includes: the information problem that cannot correctly show because encryption system wrecks.
Accompanying drawing explanation
Fig. 1 is shown as of the present invention carrying out information and will sends the flow chart of the first equipment to from the second equipment after the decrypts information of described second devices encrypt in the method for encryption and decryption.
Fig. 2 be shown as of the present invention information is carried out to the information from the first equipment being encrypted in the method for encryption and decryption after send the flow chart of the second equipment to.
Fig. 3 is shown as encrypting and deciphering system schematic diagram information being carried out to encryption and decryption of the present invention.
Element numbers explanation
11,12 second equipment
2 gateway devices
3 first equipment
21 deciphering modules
22 encrypting modules
S11-S15, S21-S27 step
Embodiment
Below by way of specific instantiation, embodiments of the present invention are described, those skilled in the art the content disclosed by this specification can understand other advantages of the present invention and effect easily.The present invention can also be implemented or be applied by embodiments different in addition, and the every details in this specification also can based on different viewpoints and application, carries out various modification or change not deviating under spirit of the present invention.
Refer to Fig. 1 to Fig. 3.It should be noted that, the diagram provided in the present embodiment only illustrates basic conception of the present invention in a schematic way, then only the assembly relevant with the present invention is shown in graphic but not component count, shape and size when implementing according to reality is drawn, it is actual when implementing, and the kenel of each assembly, quantity and ratio can be a kind of change arbitrarily, and its assembly layout kenel also may be more complicated.
As shown in the figure, the invention provides a kind of method of information being carried out to encryption and decryption.Wherein, method of the present invention is for comprising the network system of the first equipment 3 and the second equipment.Described first equipment 3 be a kind of can according to the program stored in advance, automatically, carry out the modernization intelligent electronic device of massive values computation and various information processing at high speed, its hardware includes but not limited to microprocessor, FPGA, DSP, embedded device etc.Preferably, described first equipment 3 comprises server, such as, 1) single or multiple webserver collection; 2) distributed network equipment; 3) based on the set of computers etc. of the cloud be made up of a large amount of computer or the webserver of cloud computing (CloudComputing).Wherein, cloud computing is the one of Distributed Calculation, the super virtual machine be made up of a group loosely-coupled computer collection.Described second equipment is that any one can carry out with described first equipment 3 equipment that communicates, and preferably, described second equipment comprises subscriber equipment, such as, and personal computer, mobile phone, PDA etc.
Wherein, method of the present invention performs primarily of encrypting and deciphering system, and described encrypting and deciphering system is be arranged on the application module etc. in gateway device 2.This gateway device 2 is as the communication medium between the second equipment and the first equipment 3, for by message transport to the first equipment 3 from the second equipment or by the message transport from the first equipment 3 to corresponding second equipment, its be also a kind of can according to the program stored in advance, automatically, carry out the modernization intelligent electronic device of massive values computation and various information processing at high speed, its hardware includes but not limited to microprocessor, FPGA, DSP, embedded device etc.
As shown in Figure 1, it sends the second equipment 11 used from this first user the flow chart of the first equipment 3 to based on the upload request information of first user in method of encryption and decryption for of the present invention carrying out information after the decrypts information that described second equipment 11 is encrypted.
In step s 11, the information that first user inputs is encrypted to form the first cipher-text information by described second equipment 11.
Wherein, the cipher mode that described second equipment 11 pairs of information are encrypted comprises the mode that any one can be encrypted information, preferably, include but not limited to: based on des encryption algorithm, RC2 cryptographic algorithm, RSA cryptographic algorithms or BLOWFISH cryptographic algorithm etc., information is encrypted.
Such as, the word file a1.doc that first user makes by described second equipment 11 is encrypted to obtain the first cipher-text information based on des encryption method.
Then, in step s 12, described first cipher-text information is uploaded to gateway device 2 based on the upload request information of first user by described second equipment 11.
Wherein, described upload request information is the solicited message that described first cipher-text information is sent to the first equipment 3 by request.
Then, in step s 13, described first cipher-text information received is deciphered to obtain cleartext information by described encrypting and deciphering system.
It should be noted that, it should be appreciated by those skilled in the art that described encrypting and deciphering system is determined the cipher mode that the manner of decryption that described first cipher-text information is decrypted is encrypted based on described second equipment 11 pairs of information.
Such as, if the cipher mode that described second equipment 11 pairs of information are encrypted is encrypted information for adopting des encryption algorithm, then described encrypting and deciphering system also adopts des encryption algorithm to be decrypted described first cipher-text information.
Then, in step S14, described cleartext information is sent to the first equipment 3 by described encrypting and deciphering system.
Then, in step S15, described first equipment 3 receives described cleartext information and is stored.
As shown in Figure 2, it is of the present invention carrying out from the first equipment 3 and the information relevant to the download request information of the second user sends back the flow chart of the second equipment 12 corresponding to this second user after being encrypted information in the method for encryption and decryption.
In the step s 21, the download request information of the second user is sent to gateway device 2 by the second equipment 12.
Wherein, the solicited message of described download request information for asking the first equipment 3 to provide user's information needed.
Then, in step S22, described download request information is sent to the first equipment 3 by described gateway device 2.
Then, in step S23, described first equipment 3 obtains relevant information based on described download request information.
Such as, the download request information x1 that described download request information provides name to be called the file of " a2.doc " for asking the first equipment 3, then described first equipment 3 is searched in the memory cell self can accessed based on this download request information x1, is called the file of " a2.doc " to obtain name.
Then, in step s 24 which, described relevant information is sent back gateway device 2 by described first equipment 3.
Then, in step s 25, the described relevant information received is encrypted to form the second cipher-text information by described encrypting and deciphering system.
Wherein, described encrypting and deciphering system comprises to the cipher mode that described relevant information is encrypted the mode that any one can be encrypted information, preferably, include but not limited to: based on des encryption algorithm, RC2 cryptographic algorithm, RSA cryptographic algorithms or BLOWFISH cryptographic algorithm etc., information is encrypted.More preferably, described encrypting and deciphering system adopts the cryptographic algorithm in abovementioned steps S13 to be encrypted described relevant information.
It should be noted that, described relevant information can be through the information of encryption, also can be the information without encryption.
Then, in step S26, described second cipher-text information is sent to the second equipment 12 by described encrypting and deciphering system.
Then, in step s 27, described second equipment 12 receives described second cipher-text information, and is supplied to the second user after being deciphered.
It should be noted that, those skilled in the art should understand that, when the information that aforementioned relevant information is without encryption, then described second equipment 12 is determined the cipher mode that aforementioned relevant information is encrypted based on described encrypting and deciphering system the manner of decryption that described second cipher-text information is decrypted, such as, described encrypting and deciphering system adopts des encryption algorithm to be encrypted aforementioned relevant information, then described second equipment 12 also adopts des encryption algorithm to be decrypted described second cipher-text information, when the information that aforementioned relevant information is through encryption, then the cipher mode that is encrypted aforementioned relevant information based on described encrypting and deciphering system of the manner of decryption that is decrypted described second cipher-text information of described second equipment 12 and the cipher mode that adopts when forming described relevant information are determined, such as, aforementioned relevant information adopts RSA cryptographic algorithms to be encrypted rear formation to information a3, described encrypting and deciphering system adopts des encryption algorithm to be encrypted aforementioned relevant information, then described second equipment 12 is first decrypted to obtain the 3rd cipher-text information to the second cipher-text information received based on des encryption algorithm, reoffer to the second user after described 3rd cipher-text information being deciphered again based on RSA cryptographic algorithms more subsequently.
As shown in Figure 3, it is encrypting and deciphering system schematic diagram information being carried out to encryption and decryption of the present invention.Wherein, described encrypting and deciphering system comprises encrypting module 21 and deciphering module 22.
Embodiment one:
The information that first user inputs is encrypted to form the first cipher-text information by described second equipment 11, and based on the upload request information of first user, described first cipher-text information is uploaded to gateway device 2.
Wherein, the cipher mode that described second equipment 11 pairs of information are encrypted comprises the mode that any one can be encrypted information, preferably, include but not limited to: based on des encryption algorithm, RC2 cryptographic algorithm, RSA cryptographic algorithms or BLOWFISH cryptographic algorithm etc., information is encrypted.
Such as, the word file a1.doc that first user makes by described second equipment 11 is encrypted to obtain the first cipher-text information based on des encryption method.
Wherein, described upload request information is the solicited message that described first cipher-text information is sent to the first equipment 3 by request.
Then, described first cipher-text information received is deciphered to obtain cleartext information by described deciphering module 21.
It should be noted that, it should be appreciated by those skilled in the art that described deciphering module 21 is determined the cipher mode that the manner of decryption that described first cipher-text information is decrypted is encrypted based on described second equipment 11 pairs of information.
Such as, if the cipher mode that described second equipment 11 pairs of information are encrypted is encrypted information for adopting des encryption algorithm, then described deciphering module 21 also adopts des encryption algorithm to be decrypted described first cipher-text information.
Subsequently, described cleartext information is sent to the first equipment 3 by described deciphering module 21.
Then, described first equipment 3 receives described cleartext information and is stored.
Embodiment two:
The download request information of the second user is sent to gateway device 2 by the second equipment 12.
Wherein, the solicited message of described download request information for asking the first equipment 3 to provide second user's information needed.
Then, described download request information is sent to the first equipment 3 by described gateway device 2.
Then, described first equipment 3 obtains relevant information based on described download request information.
Such as, the download request information x1 that described download request information provides name to be called the file of " a2.doc " for asking the first equipment 3, then described first equipment 3 is searched in the memory cell self can accessed based on this download request information x1, is called the file of " a2.doc " to obtain name.
Then, described relevant information is sent back gateway device 2 by described first equipment 3.
Then, the described relevant information received is encrypted to form the second cipher-text information by described encrypting module 22.
Wherein, described encrypting module 22 comprises to the cipher mode that described relevant information is encrypted the mode that any one can be encrypted information, preferably, include but not limited to: based on des encryption algorithm, RC2 cryptographic algorithm, RSA cryptographic algorithms or BLOWFISH cryptographic algorithm etc., information is encrypted.More preferably, the cryptographic algorithm that described encrypting module 22 adopts aforementioned deciphering module 21 to adopt is encrypted described relevant information.
It should be noted that, described relevant information can be through the information of encryption, also can be the information without encryption.
Then, described second cipher-text information is sent to the second equipment 12 by described encrypting module 22.
Then, described second equipment 12 receives described second cipher-text information, and is supplied to the second user after being deciphered.
It should be noted that, those skilled in the art should understand that, when the information that aforementioned relevant information is without encryption, then described second equipment 12 is determined the cipher mode that aforementioned relevant information is encrypted based on described encrypting module 22 manner of decryption that described second cipher-text information is decrypted, such as, described encrypting and deciphering system adopts des encryption algorithm to be encrypted aforementioned relevant information, then described second equipment 12 also adopts des encryption algorithm to be decrypted described second cipher-text information, when the information that aforementioned relevant information is through encryption, then the cipher mode that is encrypted aforementioned relevant information based on described encrypting module 22 of the manner of decryption that is decrypted described second cipher-text information of described second equipment 12 and the cipher mode that adopts when forming described relevant information are determined, such as, aforementioned relevant information adopts RSA cryptographic algorithms to be encrypted rear formation to information a3, described encrypting module 22 adopts des encryption algorithm to be encrypted aforementioned relevant information, then described second equipment 12 is first decrypted to obtain the 3rd cipher-text information to the second cipher-text information received based on des encryption algorithm, reoffer to the second user after described 3rd cipher-text information being deciphered again based on RSA cryptographic algorithms more subsequently.
In sum, the present invention is resent to the first equipment by from after the deciphering of the cipher-text information through encryption of the second equipment, and the information that the first equipment is stored is cleartext information; In addition, the present invention sends the information from the first equipment to second equipment again after encryption, and what the second equipment was obtained is cipher-text information, and the information that can realize thus exists in different forms at different environment, especially at subscriber equipment end, information exists with ciphertext form; In network server end, information then exists with plaintext version, can effectively avoid thus existing with single ciphertext form problem, the problem includes: the information problem that cannot correctly show because encryption system wrecks; In addition, at subscriber equipment end, information exists with ciphertext form, also can guarantee the use safety of information.So the present invention effectively overcomes various shortcoming of the prior art and tool high industrial utilization.
Above-described embodiment is illustrative principle of the present invention and effect thereof only, but not for limiting the present invention.Any person skilled in the art scholar all without prejudice under spirit of the present invention and category, can modify above-described embodiment or changes.Therefore, such as have in art usually know the knowledgeable do not depart from complete under disclosed spirit and technological thought all equivalence modify or change, must be contained by claim of the present invention.

Claims (3)

1. information is carried out to a method for encryption and decryption, for comprising the network system of the first equipment and at least one the second equipment, wherein, described first equipment is server, second equipment is subscriber equipment, it is characterized in that, describedly at least comprises step to the method that information carries out encryption and decryption:
A) gateway device based on the upload request information of first user by the subscriber equipment used from this first user and after the decrypts information that described subscriber equipment is encrypted, the cleartext information of acquisition sends server to and stored;
Described also step is comprised to the method that information carries out encryption and decryption:
A) gateway device is by from described server and the information relevant to the download request information of the second user sends back subscriber equipment corresponding to this second user after being encrypted, and the described information relevant to the download request information of the second user is the information without encrypting.
2. information is carried out to an encrypting and deciphering system for encryption and decryption, for comprising the network system of the first equipment and the second equipment, wherein, described first equipment is server, second equipment is subscriber equipment, it is characterized in that, describedly at least comprises the encrypting and deciphering system that information carries out encryption and decryption:
Deciphering module, for the upload request information based on first user by the subscriber equipment used from this first user and after the decrypts information that described subscriber equipment is encrypted, the cleartext information of acquisition sends server to and stored;
Encrypting module, for by from server and the information relevant to the download request information of the second user sends back subscriber equipment corresponding to this second user after being encrypted, the information from server comprises the information of not encrypted.
3. a gateway device, for comprising the network system of the first equipment and the second equipment, is characterized in that, described gateway device comprises encrypting and deciphering system information being carried out to encryption and decryption according to claim 2.
CN201110406949.8A 2011-12-08 2011-12-08 The method of encryption and decryption, system and gateway device are carried out to information Expired - Fee Related CN102624516B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110406949.8A CN102624516B (en) 2011-12-08 2011-12-08 The method of encryption and decryption, system and gateway device are carried out to information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110406949.8A CN102624516B (en) 2011-12-08 2011-12-08 The method of encryption and decryption, system and gateway device are carried out to information

Publications (2)

Publication Number Publication Date
CN102624516A CN102624516A (en) 2012-08-01
CN102624516B true CN102624516B (en) 2015-12-09

Family

ID=46564209

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110406949.8A Expired - Fee Related CN102624516B (en) 2011-12-08 2011-12-08 The method of encryption and decryption, system and gateway device are carried out to information

Country Status (1)

Country Link
CN (1) CN102624516B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9167050B2 (en) * 2012-08-16 2015-10-20 Futurewei Technologies, Inc. Control pool based enterprise policy enabler for controlled cloud access

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1486014A (en) * 2002-09-24 2004-03-31 黎明网络有限公司 Method for safe data transmission based on public cipher key architecture and apparatus thereof
CN1859081A (en) * 2006-02-17 2006-11-08 华为技术有限公司 Immediate news enciphering transmission method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1486014A (en) * 2002-09-24 2004-03-31 黎明网络有限公司 Method for safe data transmission based on public cipher key architecture and apparatus thereof
CN1859081A (en) * 2006-02-17 2006-11-08 华为技术有限公司 Immediate news enciphering transmission method and system

Also Published As

Publication number Publication date
CN102624516A (en) 2012-08-01

Similar Documents

Publication Publication Date Title
CN103107995B (en) A kind of cloud computing environment date safety storing system and method
CN113343305B (en) Intersection calculating method, device, equipment and storage medium of privacy data
CN104113528A (en) Pre-posed gateway-based method and system for preventing sensitive information leakage
CN102664928A (en) Data secure access method used for cloud storage and user terminal system
US9847981B1 (en) Encrypted augmentation storage
CN103414682A (en) Method for cloud storage of data and system
CN103368975B (en) A kind of method and system of batch data safe transmission
CN110933026B (en) Lightweight privacy protection equivalent query method
CN107204997A (en) The method and apparatus for managing cloud storage data
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
CN110061957A (en) Data encryption, decryption method, user terminal, server and data management system
CN111555880B (en) Data collision method and device, storage medium and electronic equipment
CN105991563A (en) Method and apparatus of protecting safety of sensitive data, and third party service system
CN104967591A (en) Cloud storage data read-write method and device, and read-write control method and device
CN103024035B (en) Safe and energy-saving encryption searching method based on mobile cloud platform
CN104463012A (en) Virtual machine image file exporting and importing method and device
CN102945356A (en) Access control method and system for search engine under cloud environment
CN110378128A (en) Data ciphering method, device and terminal device
Taha et al. An improved security schema for mobile cloud computing using hybrid cryptographic algorithms
CN102624516B (en) The method of encryption and decryption, system and gateway device are carried out to information
CN100458816C (en) Cipher processor for avoiding reciphering and method for accessing data using same
CN104462994B (en) A kind of data encryption and decryption oprerations method
CN102930222B (en) Antibonding disc recording method and system
CN115442164A (en) Multi-user log encryption and decryption method, device, equipment and storage medium
CN105681027A (en) HSM encrypted information synchronization method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20170908

Address after: 214125. -20-403, 58 embroidered Road, Binhu District, Binhu District, Jiangsu, Wuxi

Patentee after: JIANGSU CINSEC INFORMATION TECHNOLOGY CO., LTD.

Address before: 200433, room 1, building 335, No. 6006, National Road, Shanghai, Yangpu District

Patentee before: Shanghai Cinsec Information Technology Co., Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151209

Termination date: 20171208

CF01 Termination of patent right due to non-payment of annual fee