CN104361279A - Data encryption method and device - Google Patents

Data encryption method and device Download PDF

Info

Publication number
CN104361279A
CN104361279A CN201410658053.2A CN201410658053A CN104361279A CN 104361279 A CN104361279 A CN 104361279A CN 201410658053 A CN201410658053 A CN 201410658053A CN 104361279 A CN104361279 A CN 104361279A
Authority
CN
China
Prior art keywords
encryption
data
file
decruption key
cryptographic algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410658053.2A
Other languages
Chinese (zh)
Inventor
李锋
付正全
安凌靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201410658053.2A priority Critical patent/CN104361279A/en
Publication of CN104361279A publication Critical patent/CN104361279A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention provides a data encryption method and device. The method comprises the following steps: generating an encryption algorithm file and a corresponding decryption key file; loading the encryption algorithm file to an encryption data inlet and loading the corresponding decryption key file to an externally connected USBKey encryption device; selecting the encryption algorithm file for encrypting the to-be-encrypted data by the encryption data inlet; if the data operation is to be performed on the encrypted data, calling for the corresponding decryption key file in the USBKey encryption device for decrypting the encrypted data by the encryption data inlet. According to the invention, on the basis of different high-strength encryption algorithms, a one-algorithm one-key mode is utilized to encrypt and decrypt user data, so that the safety of the encryption data is increased.

Description

Data ciphering method and device
Technical field
The present invention relates to technical field of data security, particularly relate to a kind of data ciphering method and device.
Background technology
Along with the fast development of computer networking technology, infotech, the digitizing industries such as such as ecommerce just worldwide emerge rapidly.That government, enterprise or individual rely on Computer Storage information gradually, and by network delivery, exchange capsule information and negotiating business.No matter these information are personal information or department information, no matter be military information or business information, will be stored in the form of electronic document on unit, server or network in any client computer before carrying out processing and transmit, therefore the safe storage of electronic document becomes the most important condition realizing information security.
Generally needs are all encrypted at the significant data file of transmission over networks, maintaining secrecy on the one hand in order to transfer files between Logistics networks, even if on the other hand also in order to ensure that transfer files does not leak important information wherein after stolen yet.
Along with people increase the dependence of Computer Storage, transmission of information, the level of security needed can be more and more higher, the all safe precaution measure of network design, but most of safety product only supports the weak encryption algorithm of less than 40, for some malicious persons, still likely understood how to break through these safe precaution measures by them, walk around last line of defense, steal confidential data, cause damage.
Summary of the invention
In order to solve the problems of the technologies described above, the invention provides a kind of data ciphering method and device, the security of data can be improved.
In order to reach the object of the invention, the invention provides a kind of data ciphering method, comprising: generate cryptographic algorithm file and corresponding decruption key file; By described cryptographic algorithm files loading to enciphered data entrance, by the decruption key files loading of described correspondence to USBKey encryption device; Described enciphered data entrance Choice encryption algorithm file is to needing being encrypted of the data of encryption; If need to carry out data manipulation to the data of encryption, the data of encrypting described in decruption key file decryption corresponding in described enciphered data entry call USBKey encryption device.
Further, described generation cryptographic algorithm file and corresponding decruption key file, comprising: generate cryptographic algorithm file and corresponding decruption key file by high strength encrypting algorithm; Wherein, the cryptographic algorithm file that described high strength encrypting algorithm generates at every turn is not identical with corresponding decruption key file, and described cryptographic algorithm file and corresponding decruption key file are man-to-man corresponding relations.
Further, described enciphered data entrance Choice encryption algorithm file, to needing being encrypted of the data of encryption, comprising: described enciphered data entrance selects the data of needs encryption, and data rank is file, file, disk partition or monoblock disk; Described enciphered data entrance comprises at least one cryptographic algorithm file, and Choice encryption algorithm file is encrypted needing the data of encryption.
Further, described Choice encryption algorithm file is encrypted needing the data of encryption, comprise: select a cryptographic algorithm file to encrypt separately the data that needs are encrypted, or select multiple cryptographic algorithm file to carry out complex encryption to needing the data of encryption; After the data of described Choice encryption algorithm file to needs encryption are encrypted, comprising: encrypted the rear data hiding described encryption.
Further, the data of encrypting described in decruption key file decryption corresponding in described enciphered data entry call USBKey encryption device, comprise: if the file of encryption separately, the data of encrypting described in a decruption key file decryption corresponding in described enciphered data entry call USBKey encryption device; If the file of complex encryption, multiple decruption key files corresponding in described enciphered data entry call USBKey encryption device, and the data of described encryption are deciphered according to composite strategy.
A kind of data encryption device, comprising: generation module, for generating cryptographic algorithm file and corresponding decruption key file; Registering modules, for by described cryptographic algorithm files loading to enciphered data entrance, by the decruption key files loading of described correspondence to USBKey encryption device; Encrypting module, for Choice encryption algorithm file to needing being encrypted of the data of encryption; Deciphering module, for connecting described USBKey encryption device, if need to carry out data manipulation to the data of encryption, calls the data of encrypting described in decruption key file decryption corresponding in USBKey encryption device.
Further, generation module, specifically for generating cryptographic algorithm file and corresponding decruption key file by high strength encrypting algorithm; Wherein, the cryptographic algorithm file that described high strength encrypting algorithm generates at every turn is not identical with corresponding decruption key file, and described cryptographic algorithm file and corresponding decruption key file are man-to-man corresponding relations.
Further, described encrypting module, specifically for: select the data needing encryption, data rank is file, file, disk partition or monoblock disk; Described encrypting module comprises at least one cryptographic algorithm file, and Choice encryption algorithm file is encrypted needing the data of encryption, has encrypted the rear data hiding described encryption.
Further, described encrypting module, specifically for: select a cryptographic algorithm file to encrypt separately needing the data of encryption, or select multiple cryptographic algorithm file to carry out complex encryption to needing the data of encryption.
Further, described deciphering module, specifically for if the file of encryption separately, calls the data of encrypting described in a decruption key file decryption corresponding in USBKey encryption device; If the file of complex encryption, call multiple decruption key files corresponding in USBKey encryption device, and decipher the data of described encryption according to composite strategy.
Compared with prior art, the present invention includes: generate cryptographic algorithm file and corresponding decruption key file; By described cryptographic algorithm files loading to enciphered data entrance, by the decruption key files loading of described correspondence to USBKey encryption device; Described enciphered data entrance Choice encryption algorithm file is to needing being encrypted of the data of encryption; If need to carry out data manipulation to the data of encryption, the data of encrypting described in decruption key file decryption corresponding in described enciphered data entry call USBKey encryption device.The present invention is based on USBKey technology, by different high strength encrypting algorithms, utilize the mode of algorithm one key to encrypt and decrypt user data, improve the security of enciphered data.When Missing data or hardware device are sold, lease, during transfer, does not have USBKey encryption device can ensure can not operating of data yet, further increases the security of data.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of data ciphering method of the present invention.
Fig. 2 is that cryptographic algorithm of the present invention generates and registration schematic diagram.
Fig. 3 is the schematic diagram that the present invention is encrypted data.
Fig. 4 is the schematic diagram of the present invention to decrypt data.
Fig. 5 is the structural representation of data encryption device of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail.By these exemplifying embodiments of enough detailed description, those skilled in the art are made to put into practice the present invention.Without departing from the spirit and scope in the present invention, can to implement to make logic, realize and other change.
Hardware digital certificate carrier USBKey is the hardware device of a kind of USB (universal serial bus) (USB, Universal SerialBus) interface.Its built-in single-chip microcomputer or intelligent card chip, has certain storage space, can store private key and the digital certificate of user, and the public key algorithm utilizing USBKey built-in realizes the certification to user identity.Because private key for user is kept in coded lock, make in theory all cannot read in any way, therefore ensure that the security of user authentication.
The present invention is based on USBKey technology and realize data encryption and decryption, Fig. 1 is the schematic flow sheet of data ciphering method of the present invention, as shown in Figure 1, comprising:
Step 11, generates cryptographic algorithm file and corresponding decruption key (key) file by cryptographic algorithm.
In this step, can referring to shown in Fig. 2, the high strength encrypting algorithm provided by cryptographic algorithm generator program generates cryptographic algorithm file and corresponding decruption key file, and this cryptographic algorithm file is used for being encrypted data, and decruption key file is used for decrypt data.
The cryptographic algorithm file that high strength encrypting algorithm generates at every turn is not identical with corresponding decruption key file, cryptographic algorithm file and decruption key file are man-to-man relations, namely the algorithm that cryptographic algorithm file provides is encrypted needing the data of encryption, and the key only having corresponding decruption key file to provide could to the decrypt data of this encryption.
Step 12, by cryptographic algorithm files loading to enciphered data entrance, by the decruption key files loading of correspondence to external USBKey encryption device.
In this step, cryptographic algorithm file and decruption key file are all sightless for user, after the decruption key file generated of cryptographic algorithm file and correspondence, can referring to shown in Fig. 2, in the catalogue of cryptographic algorithm files loading being specified to enciphered data entrance by cryptographic algorithm accreditation process, by decruption key files loading in the storage area of USBKey encryption device.
Step 13, enciphered data entrance Choice encryption algorithm file, to needing being encrypted of the data of encryption, has encrypted the rear data hiding this encryption.
In this step, can referring to shown in Fig. 3, select by enciphered data entrance the data needing encryption, data rank can be file, file, disk partition or monoblock disk.
Enciphered data entrance comprises at least one cryptographic algorithm file, Choice encryption algorithm file is encrypted needing the data of encryption, namely a cryptographic algorithm file can being selected to encrypt separately needing the data of encryption, multiple cryptographic algorithm file also can be selected to carry out complex encryption to needing the data of encryption.
Automatically hide after data encryption completes, user is invisible under an operating system, and the sole inlet of encrypt file is enciphered data entrance.
Step 14, if need to carry out data manipulation to the data of encryption, the data of this encryption of decruption key file decryption corresponding in enciphered data entry call USBKey encryption device.
In this step, can referring to shown in Fig. 4, if need to carry out data manipulation to the data of encryption, the data needing the encryption carrying out data manipulation are selected by enciphered data entrance, automatically decruption key file corresponding in USBKey encryption device is searched, data manipulation can be carried out to enciphered data after coupling, comprise check, move, copy, the operation such as deletion.
If the file of encryption separately, the data of this encryption of a decruption key file decryption corresponding in enciphered data entry call USBKey encryption device.If the file of complex encryption, multiple decruption key files corresponding in enciphered data entry call USBKey encryption device, and the data of this encryption are deciphered according to composite strategy.
The present invention is based on USBKey technology, by different high strength encrypting algorithms, utilize the mode of algorithm one key to encrypt and decrypt user data, improve the security of enciphered data.When Missing data or hardware device are sold, lease, during transfer, does not have USBKey encryption device can ensure can not operating of data yet, further increases the security of data.
Fig. 5 is the structural representation of data encryption device of the present invention, as shown in Figure 5, comprising:
Generation module, for generating cryptographic algorithm file and corresponding decruption key file by cryptographic algorithm;
Registering modules, for by cryptographic algorithm files loading to enciphered data entrance, by the decruption key files loading of correspondence to external USBKey encryption device;
Encrypting module, for Choice encryption algorithm file to needing being encrypted of the data of encryption, has encrypted the rear data hiding this encryption;
Deciphering module, for connecting USBKey encryption device, if need to carry out data manipulation to the data of encryption, calls the data of this encryption of decruption key file decryption corresponding in USBKey encryption device.
Device and the data ciphering method of data encryption and decryption of the present invention are corresponding, and therefore, the concrete details that realizes referring to data ciphering method, can be not repeated herein.
The present invention is based on USBKey technology, by different high strength encrypting algorithms, utilize the mode of algorithm one key to encrypt and decrypt user data, improve the security of enciphered data.When Missing data or hardware device are sold, lease, during transfer, does not have USBKey encryption device can ensure can not operating of data yet, further increases the security of data.
Be to be understood that, although this instructions is described according to embodiment, but not each embodiment only comprises an independently technical scheme, this narrating mode of instructions is only for clarity sake, those skilled in the art should by instructions integrally, technical scheme in each embodiment also through appropriately combined, can form other embodiments that it will be appreciated by those skilled in the art that.
A series of detailed description listed is above only illustrating for feasibility embodiment of the present invention; they are not for limiting the scope of the invention, all do not depart from equivalent implementations that skill of the present invention spirit does or change all should be included within protection scope of the present invention.

Claims (10)

1. a data ciphering method, is characterized in that, comprising:
Generate cryptographic algorithm file and corresponding decruption key file;
By described cryptographic algorithm files loading to enciphered data entrance, by the decruption key files loading of described correspondence to external USBKey encryption device;
Described enciphered data entrance Choice encryption algorithm file is to needing being encrypted of the data of encryption;
If need to carry out data manipulation to the data of encryption, the data of encrypting described in decruption key file decryption corresponding in described enciphered data entry call USBKey encryption device.
2. method according to claim 1, is characterized in that, described generation cryptographic algorithm file and corresponding decruption key file, comprising:
Cryptographic algorithm file and corresponding decruption key file is generated by high strength encrypting algorithm;
Wherein, the cryptographic algorithm file that described high strength encrypting algorithm generates at every turn is not identical with corresponding decruption key file, and described cryptographic algorithm file and corresponding decruption key file are man-to-man corresponding relations.
3. method according to claim 1 and 2, is characterized in that, described enciphered data entrance Choice encryption algorithm file, to needing being encrypted of the data of encryption, comprising:
Described enciphered data entrance selects the data needing encryption, and data rank is file, file, disk partition or monoblock disk;
Described enciphered data entrance comprises at least one cryptographic algorithm file, and Choice encryption algorithm file is encrypted needing the data of encryption.
4. method according to claim 3, is characterized in that, described Choice encryption algorithm file is encrypted needing the data of encryption, comprising:
Select a cryptographic algorithm file to encrypt separately needing the data of encryption, or select multiple cryptographic algorithm file to carry out complex encryption to needing the data of encryption;
After the data of described Choice encryption algorithm file to needs encryption are encrypted, comprising: encrypted the rear data hiding described encryption.
5. method according to claim 4, is characterized in that, the data of encrypting described in decruption key file decryption corresponding in described enciphered data entry call USBKey encryption device, comprising:
If the file of encryption separately, the data of encrypting described in a decruption key file decryption corresponding in described enciphered data entry call USBKey encryption device;
If the file of complex encryption, multiple decruption key files corresponding in described enciphered data entry call USBKey encryption device, and the data of described encryption are deciphered according to composite strategy.
6. a data encryption device, is characterized in that, comprising:
Generation module, for generating cryptographic algorithm file and corresponding decruption key file;
Registering modules, for by described cryptographic algorithm files loading to enciphered data entrance, by the decruption key files loading of described correspondence to external USBKey encryption device;
Encrypting module, for Choice encryption algorithm file to needing being encrypted of the data of encryption;
Deciphering module, for connecting described USBKey encryption device, if need to carry out data manipulation to the data of encryption, calls the data of encrypting described in decruption key file decryption corresponding in USBKey encryption device.
7. device according to claim 6, is characterized in that, described generation module, specifically for generating cryptographic algorithm file and corresponding decruption key file by high strength encrypting algorithm; Wherein, the cryptographic algorithm file that described high strength encrypting algorithm generates at every turn is not identical with corresponding decruption key file, and described cryptographic algorithm file and corresponding decruption key file are man-to-man corresponding relations.
8. the device according to claim 6 or 7, is characterized in that, described encrypting module, specifically for: select the data needing encryption, data rank is file, file, disk partition or monoblock disk; Described encrypting module comprises at least one cryptographic algorithm file, and Choice encryption algorithm file is encrypted needing the data of encryption, has encrypted the rear data hiding described encryption.
9. device according to claim 8, it is characterized in that, described encrypting module, specifically for: select a cryptographic algorithm file to encrypt separately needing the data of encryption, or select multiple cryptographic algorithm file to carry out complex encryption to needing the data of encryption.
10. device according to claim 9, is characterized in that, described deciphering module, specifically for if the file of encryption separately, calls the data of encrypting described in a decruption key file decryption corresponding in USBKey encryption device; If the file of complex encryption, call multiple decruption key files corresponding in USBKey encryption device, and decipher the data of described encryption according to composite strategy.
CN201410658053.2A 2014-11-18 2014-11-18 Data encryption method and device Pending CN104361279A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410658053.2A CN104361279A (en) 2014-11-18 2014-11-18 Data encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410658053.2A CN104361279A (en) 2014-11-18 2014-11-18 Data encryption method and device

Publications (1)

Publication Number Publication Date
CN104361279A true CN104361279A (en) 2015-02-18

Family

ID=52528538

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410658053.2A Pending CN104361279A (en) 2014-11-18 2014-11-18 Data encryption method and device

Country Status (1)

Country Link
CN (1) CN104361279A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411500A (en) * 2016-10-18 2017-02-15 林少忠 Data encryption method in communication process
CN106446697A (en) * 2016-07-26 2017-02-22 邬超 Method and device for saving private data
CN112434324A (en) * 2020-12-17 2021-03-02 合肥大唐存储科技有限公司 Data processing equipment
CN114598466A (en) * 2022-03-08 2022-06-07 山东云海国创云计算装备产业创新中心有限公司 Production data processing method and device, computer equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446697A (en) * 2016-07-26 2017-02-22 邬超 Method and device for saving private data
CN106411500A (en) * 2016-10-18 2017-02-15 林少忠 Data encryption method in communication process
CN112434324A (en) * 2020-12-17 2021-03-02 合肥大唐存储科技有限公司 Data processing equipment
CN112434324B (en) * 2020-12-17 2024-03-19 合肥大唐存储科技有限公司 Data processing equipment
CN114598466A (en) * 2022-03-08 2022-06-07 山东云海国创云计算装备产业创新中心有限公司 Production data processing method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US10305688B2 (en) Method, apparatus, and system for cloud-based encryption machine key injection
US10187200B1 (en) System and method for generating a multi-stage key for use in cryptographic operations
US11063754B2 (en) Systems, devices, and methods for hybrid secret sharing
CN100490372C (en) A method for backup and recovery of encryption key
US9166793B2 (en) Efficient authentication for mobile and pervasive computing
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN103138939B (en) Based on the key access times management method of credible platform module under cloud memory module
CN102710414B (en) Randomized document block encryption method
Rezaeighaleh et al. New secure approach to backup cryptocurrency wallets
CN110059458B (en) User password encryption authentication method, device and system
CN103580855B (en) Usbkey management method based on sharing technology
CN105100076A (en) Cloud data security system based on USB Key
CN104868996A (en) Data encryption and decryption method, device thereof, and terminal
JP7160605B2 (en) Method and system for secure data transfer
CN107453880B (en) Cloud data secure storage method and system
US11424919B2 (en) Protecting usage of key store content
CN102236756A (en) File encryption method based on TCM (trusted cryptography module) and USBkey
CN105072107A (en) System and method for enhancing data transmission and storage security
CN102025744A (en) Import and export system of virtual machine image in cloud computing
CN111970114B (en) File encryption method, system, server and storage medium
CN103378971A (en) Data encryption system and method
CN103544453A (en) USB (universal serial bus) KEY based virtual desktop file protection method and device
CN102726028A (en) Encryption method, decryption method, and corresponding device and system
CN104866784A (en) BIOS encryption-based safety hard disk, and data encryption and decryption method
CN104361279A (en) Data encryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150218

WD01 Invention patent application deemed withdrawn after publication