CN105224853A - Based on the file encryption-decryption technology of hardware encipher equipment - Google Patents
Based on the file encryption-decryption technology of hardware encipher equipment Download PDFInfo
- Publication number
- CN105224853A CN105224853A CN201410254668.9A CN201410254668A CN105224853A CN 105224853 A CN105224853 A CN 105224853A CN 201410254668 A CN201410254668 A CN 201410254668A CN 105224853 A CN105224853 A CN 105224853A
- Authority
- CN
- China
- Prior art keywords
- encryption
- encrypted card
- key
- decryption technology
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of file encryption-decryption technology based on hardware encipher equipment.This encryption and decryption technology generates encryption key by an encrypted card, backup intelligence cipher key is used to be imported to by encryption key in other encrypted cards, user is managed encrypted card by respective intelligent code key, start or stop encrypted card service, and use at least one encrypted card to make encryption or the deciphering of the complete paired data of its load balancing.The present invention improves encryption performance, it is various, applied widely, easy to operate to improve file security, cipher mode.
Description
Technical field
The present invention relates to a kind of file encryption-decryption technology based on hardware encipher equipment.
Background technology
In the last few years, along with the development of network, the rises of appearing vividly such as social networks, ecommerce, digital city and Online Video.These emerging technology need the support of large storage and high-performance server, but need a large amount of manpowers and expensive material resources to the maintenance of this server.Future addresses this problem, and the computer network giants such as Google, Amazon in 2006, put forward the conception of cloud computing.Cloud computing, as a great innovation of information industry, has more and more received approval and the extensive concern of society and academic all circles.But the problem of thing followed information security hidden danger and the requirement of the high operating load ability of server also be can not be ignored.
Summary of the invention
The present invention a kind ofly improves encryption performance to overcome the above problems to provide, improves various, applied widely, the easy to operate file encryption-decryption technology based on hardware encipher equipment of file security, cipher mode.
Technical scheme of the present invention is: this encryption and decryption technology generates encryption key by an encrypted card, backup intelligence cipher key is used to be imported to by encryption key in other encrypted cards, user is managed encrypted card by respective intelligent code key, start or stop encrypted card service, and use at least one encrypted card to make encryption or the deciphering of the complete paired data of its load balancing.
The present invention improves encryption performance, it is various, applied widely, easy to operate to improve file security, cipher mode.
Embodiment
Based on the file encryption-decryption technology of hardware encipher equipment, this encryption and decryption technology generates encryption key by an encrypted card, backup intelligence cipher key is used to be imported to by encryption key in other encrypted cards, user is managed encrypted card by respective intelligent code key, start or stop encrypted card service, and use at least one encrypted card to make encryption or the deciphering of the complete paired data of its load balancing.
Claims (1)
1. based on the file encryption-decryption technology of hardware encipher equipment, it is characterized in that: this encryption and decryption technology generates encryption key by an encrypted card, backup intelligence cipher key is used to be imported to by encryption key in other encrypted cards, user is managed encrypted card by respective intelligent code key, start or stop encrypted card service, and use at least one encrypted card to make encryption or the deciphering of the complete paired data of its load balancing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410254668.9A CN105224853A (en) | 2014-06-10 | 2014-06-10 | Based on the file encryption-decryption technology of hardware encipher equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410254668.9A CN105224853A (en) | 2014-06-10 | 2014-06-10 | Based on the file encryption-decryption technology of hardware encipher equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105224853A true CN105224853A (en) | 2016-01-06 |
Family
ID=54993817
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410254668.9A Pending CN105224853A (en) | 2014-06-10 | 2014-06-10 | Based on the file encryption-decryption technology of hardware encipher equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105224853A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116582267A (en) * | 2023-05-15 | 2023-08-11 | 合芯科技(苏州)有限公司 | Data encryption system, method and device, storage medium and electronic equipment |
-
2014
- 2014-06-10 CN CN201410254668.9A patent/CN105224853A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116582267A (en) * | 2023-05-15 | 2023-08-11 | 合芯科技(苏州)有限公司 | Data encryption system, method and device, storage medium and electronic equipment |
CN116582267B (en) * | 2023-05-15 | 2023-10-31 | 合芯科技(苏州)有限公司 | Data encryption system, method and device, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20180343114A1 (en) | A system and method for blockchain smart contract data privacy | |
AU2018256568A1 (en) | Systems and methods for software based encryption | |
MX2018003879A (en) | System and method for using a symbol as instruction to initiate transfer of authenticated mobile identity information. | |
JP2016512675A5 (en) | ||
MX2017005801A (en) | Roaming content wipe actions across devices. | |
MX2016011988A (en) | Confidential data management method and device, and security authentication mehod and system. | |
EP3627843A3 (en) | Systems and methods for performing transport i/o | |
BR112019000805A2 (en) | end-to-end key management system and method | |
CN102811212A (en) | Data encryption method with repetitive data deleting function and system thereof | |
MY193643A (en) | Processing method for preventing copy attack, and server and client | |
CN104917723A (en) | Method, apparatus and system for realizing secure sharing of encryption file | |
GB2550081A (en) | Secure file transfer | |
PH12017550127A1 (en) | Privacy enhanced personal search index | |
CN103400063A (en) | Method and device for executing script file | |
SG11201805503TA (en) | Method of inputting document information, device, server, and storage medium | |
CN105681027A (en) | HSM encrypted information synchronization method, device and system | |
SG10201805187WA (en) | Entity authentication in network | |
CN105224853A (en) | Based on the file encryption-decryption technology of hardware encipher equipment | |
IN2013CH00917A (en) | ||
CN105323212A (en) | Attribute-based encryption technology of safety outsource | |
CN108985109A (en) | A kind of date storage method and device | |
Anitha et al. | Metadata driven Efficient CRE based cipher key generation and distribution in cloud security | |
US10009948B2 (en) | Method and system for implementing backup and binding between terminals by sending identifier to a cloud end server | |
Schneier | Other block ciphers | |
CN106599705A (en) | Encryption method for encrypting input character and corresponding pairing in corresponding library |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160106 |