CN106372519A - Information encryption method and device - Google Patents

Information encryption method and device Download PDF

Info

Publication number
CN106372519A
CN106372519A CN201610795015.0A CN201610795015A CN106372519A CN 106372519 A CN106372519 A CN 106372519A CN 201610795015 A CN201610795015 A CN 201610795015A CN 106372519 A CN106372519 A CN 106372519A
Authority
CN
China
Prior art keywords
information
protected
encryption
different
class
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610795015.0A
Other languages
Chinese (zh)
Inventor
傅涛
冯凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd filed Critical JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Priority to CN201610795015.0A priority Critical patent/CN106372519A/en
Publication of CN106372519A publication Critical patent/CN106372519A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information encryption method and device, relates to the technical field of security, and aims to enhance the information security inside a security chip. The method comprises the following steps: classifying information to be protected according to a preset rule to obtain different types of information to be protected; encrypting the different types of information to be protected by different encryption strategies to obtain different types of encrypted files; transmitting the different types of encrypted files to the security chip in order to encrypt and store the different types of encrypted files as a whole by the security chip. The information encryption method and device are mainly applied to encryption of information.

Description

A kind of information ciphering method and device
Technical field
The present invention relates to security technology area, more particularly to a kind of information ciphering method and device.
Background technology
With the continuous development of Internet technology, in the application process of the Internet, information security issue is increasingly bigger Family is of interest.In order to protect in vivo with storage in transmitting procedure to information, the mode of people's commonly used information encryption To prevent information leakage.
Generally information Store to be protected is carried out in safety chip the safety of guarantee information at present, safety chip phase here When in one " safety cabinet ", treating protection information further and be encrypted, and deposit after key is encrypted by safety chip Storage is in safety chip.Due to the confidential information of the user that is typically stored with safety chip, therefore, safety chip is often disliked Meaning tissue and the target of assault, however, the information to be protected that existing information encryption is directed to all is added using identical Decryption method, so that partial information is not correctly encrypted, leads to information encryption precision relatively low, and then leads to inside safety chip Information Security relatively low.
Content of the invention
In view of this, the embodiment of the present invention provides a kind of information ciphering method and device, it is possible to increase inside safety chip Information Security.
For reaching above-mentioned purpose, present invention generally provides following technical scheme:
On the one hand, embodiments provide a kind of information ciphering method, the method includes:
Treat protection information according to presetting rule to be classified, obtain the information to be protected of different classifications;
Using different encryption policys, the information to be protected of described different classifications is encrypted, obtains adding of different classifications Ciphertext part;
The encryption file of described different classifications is sent to safety chip, in order to safety chip to described different classifications Encryption file carry out bulk encryption and store.
Further, described protection information treated according to presetting rule classified, obtain the letter to be protected of different classifications Breath includes:
According to the corresponding different safety class of described information to be protected, described information to be protected is classified, obtain difference The information to be protected of safe class.
Further, described using different encryption policys, the information to be protected of described different classifications is encrypted, obtain Encryption file to different classifications includes:
Encrypt plan according to the corresponding different safety class configuration of described information to be protected is corresponding with described information to be protected Slightly;
According to described encryption policy, the information to be protected of different safety class is encrypted, obtains different safety etc. The information to be protected corresponding encryption file of level.
Further, protection information is treated according to presetting rule classified described, obtain the to be protected of different classifications Before information, methods described also includes:
Obtain the secure ID of information to be protected;
Identify the safe class of described information to be protected according to preset identifications storehouse, prestore in described preset identifications storehouse There is the information corresponding secure ID respectively of different safety class.
Further, methods described also includes:
When receiving decoding request, respectively described encryption file is entered according to the identification information that described decoding request carries Row deciphering, includes the decryption policy of described encryption file in described identification information.
On the other hand, embodiments provide a kind of information encryption device, comprising:
Taxon, is classified for treating protection information according to presetting rule, obtains the letter to be protected of different classifications Breath;
Ciphering unit, for being encrypted to the information to be protected of described different classifications using different encryption policys, is obtained Encryption file to different classifications;
Transmitting element, for sending the encryption file of described different classifications to safety chip, in order to safety chip The encryption file of described different classifications is carried out by bulk encryption and stores.
Further, described taxon includes:
Sort module, for carrying out to described information to be protected according to the corresponding different safety class of described information to be protected Classification, obtains the information to be protected of different safety class.
Further, described ciphering unit includes:
Configuration module, for according to the described corresponding different safety class configuration of information to be protected and described information to be protected Corresponding encryption policy;
Encrypting module, for being encrypted to the information to be protected of different safety class according to described encryption policy, Obtain the information to be protected corresponding encryption file of different safety class.
Further, described device also includes:
Acquiring unit, for obtaining the secure ID of information to be protected;
Recognition unit, for identifying the safe class of described information to be protected, described preset mark according to preset identifications storehouse Know the information corresponding secure ID respectively being previously stored with different safety class in storehouse.
Further, described device also includes:
Decryption unit is for when receiving decoding request, right respectively according to the identification information that described decoding request carries Described encryption file is decrypted, and includes the decryption policy of described encryption file in described identification information.
A kind of information ciphering method provided in an embodiment of the present invention and device, treat protection information according to presetting rule first Classified, obtained the information to be protected of different classifications, then using different encryption policys to described different classifications wait protect Shield information is encrypted, and obtains the encryption file of different classifications, further the more targeted letter to be protected to different classifications Breath takes different encipherment protection strategies, prevents information to be stolen, finally sends the encryption file of described different classifications to peace In full chip, in order to safety chip, the encryption file of described different classifications is carried out by bulk encryption and stores, with prior art Encryption method compare, the present invention is by adopting different encryption policys to the information to be protected of different classifications so that different points The to be protected of class newly can correctly be encrypted, and improves encryption precision, more effectively prevents information to be protected compromised, enters one Step improves the Information Security within safety chip.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the specific embodiment of the present invention.
Brief description
By reading the detailed description of hereafter preferred implementation, various other advantages and benefit are common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as to the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 shows a kind of information ciphering method flow chart provided in an embodiment of the present invention;
Fig. 2 shows another kind information ciphering method flow chart provided in an embodiment of the present invention;
Fig. 3 shows a kind of information encryption device structural representation provided in an embodiment of the present invention;
Fig. 4 shows another kind information encryption device structural representation provided in an embodiment of the present invention.
Specific embodiment
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here Limited.On the contrary, these embodiments are provided to be able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
The embodiment of the present invention provides a kind of information ciphering method, as shown in figure 1, methods described includes:
101st, treat protection information according to presetting rule to be classified, obtain the information to be protected of different classifications.
Because the big data epoch promote freedom of information flowing and shared, personal information security especially privacy and other The safety of a little sensitive informations is particularly important, and information to be protected here can have an information data of demand protection for user, and such as one It is related to identity information of the login password of individual privacy, the contact method of user or user etc. a bit, strength of the present invention treats guarantor Shield information type does not limit, and is configured with specific reference to actual demand.
For the embodiment of the present invention, when user is treating before protection information is encrypted, can be according to presetting rule pair Information to be protected is classified, and then obtains the information to be protected of different classifications, because user is to different information tools to be protected There are different demands for security, the presetting rule of the embodiment of the present invention can be safe class according to information to be protected to be protected Information is classified, in addition, also protection information can be treated according to the data type of information to be protected being classified, the present invention is implemented Example does not limit to described presetting rule.
102nd, using different encryption policys, the information to be protected of different classifications is encrypted, obtains adding of different classifications Ciphertext part.
Encryption policy in the embodiment of the present invention is mainly treated protection information by way of secret key cryptographic algorithm and is carried out adding Close, such as adopt the higher AES of cryptographic security for the higher information to be protected of safe class, for safe class relatively Low information to be protected adopts the relatively low AES of cryptographic security, obtains the pending information of different safety class further Corresponding encryption file.
Encryption is exactly to count by face to treat protection information and converted so that not had anyone of correct key all cannot The message understood, AES here includes public key encryption and private key encryption.The feature of personal key algorithm be destination and Originator uses identical key, and that is, encryption key and decruption key are identicals, and the feature of public key encryption algorithm is destination Differ with the key of originator, and hardly possible push over decruption key from encryption key, therefore, public key encryption calculate Method has more superiority with respect to personal key algorithm, can adopt public key encryption for the higher information to be protected of safe class Algorithm, preferably to be protected.
103rd, the encryption file of different classifications is sent to safety chip, in order to safety chip, different classifications are added Ciphertext part carries out bulk encryption and stores.
Safety chip in this step is a device that can independently carry out key generation, encrypting and decrypting, and inside has solely Vertical and processing unit and memory element, are capable for the treatment of protection information and are encrypted, due to the encryption of different classifications File is collectively stored in safety chip, in order to ensure the safety of All Files, according to the encryption function pair in safety chip The encryption file of different classifications carries out bulk encryption, further ensure that the safety of information to be protected.
A kind of data ciphering method provided in an embodiment of the present invention, treats protection information according to presetting rule first and carries out point Class, obtains the information to be protected of different classifications, then adopts the information to be protected to described different classifications for the different encryption policys It is encrypted, obtains the encryption file of different classifications, the more targeted information to be protected to different classifications is taken further Different encipherment protection strategies, prevents information to be stolen, and finally sends the encryption file of described different classifications to safety chip In, in order to safety chip, the encryption file of described different classifications is carried out by bulk encryption and stores, the encryption with prior art Method is compared, the present invention by the information to be protected of different classifications using different encryption policys so that the treating of different classifications Protection newly can correctly be encrypted, and improves encryption precision, more effectively prevents information to be protected compromised, improve further Information Security within safety chip.
Further, the embodiment of the present invention provides another kind of information ciphering method, as shown in Fig. 2 methods described includes:
201st, obtain the secure ID of information to be protected.
Wherein, the secure ID of information to be protected here is according to information to be protected corresponding information type division information The mark of safe class, is important mark such as secure ID such as user's bank card password, various payment ciphers, for user The secure ID such as ID (identity number) card No., contact method are medium mark.
202nd, identify the safe class of information to be protected according to preset identifications storehouse, be previously stored with this preset identifications storehouse The information of different safety class corresponding secure ID respectively.
Because different information to be protected is to there being different secure ID, identified further by searching preset identifications storehouse Go out the safe class of information to be protected, the information being previously stored with different safety class in preset identifications storehouse here corresponds to respectively Secure ID, for the higher information of security requirement, such as payment cipher, bank card password wait protection information to identify Safe class is higher.
203rd, treat protection information according to the corresponding different safety class of information to be protected to be classified, obtain different safety The information to be protected of grade.
The corresponding safe class of information to be protected being identified according to step 202, further to different information pair to be protected The safe class answered is classified, and obtains the information to be protected of different safety class.
204th, using different encryption policys, the information to be protected of different safety class is encrypted, obtains different safety The information to be protected corresponding encryption file of grade.
For the embodiment of the present invention, can be calculated using such as rsa encryption generally for the higher information to be protected of safe class The public key encryption algorithms such as method, rabin AES, can be using as des encryption for the relatively low information to be protected of safe class The personal key algorithms such as algorithm, aes encryption point counting, the embodiment of the present invention does not limit to the selection of encryption policy, specifically can root Chosen according to user's request, to guarantee that data to be protected is correctly encrypted, improved information encryption precision.
205th, corresponding for the information to be protected of different safety class encryption file is sent to safety chip, in order to pacify Full chip carries out bulk encryption and stores to the encryption file of different classifications.
Because information to be protected corresponding encryption file can be divided into the encryption file of different safety class, further will not Send to safety chip with the information to be protected of safe class corresponding encryption file, in order to safety chip to different classifications Encryption file carry out bulk encryption, and be stored in safety chip and be accomplished by cracking safety chip first if it is desired to crack, Then the encryption data in safety chip is being decrypted, to realize treating the duplicate protection of protection information.
206th, when receiving decoding request, respectively encryption file is entered according to the identification information that described decoding request carries Row deciphering.
In this step, wherein, include in described identification information described encryption file decryption policy, decryption policy with upper The encryption policy stated is corresponding, when receiving decoding request, according to decryption policy, the encryption file in safety chip is carried out Deciphering, with the initial data before being encrypted.
Another kind of information ciphering method of the embodiment of the present invention, before sending information to be protected to safety chip, right The corresponding information to be protected of different safety class takes the encryption policy of corresponding safe class, on the one hand ensure that information to be protected Security reliability, still further aspect limits to the information in safety chip, prevents the attack of malicious user, right further The information to be protected of different safety class adopts different encryption policys and decryption policy, while improving data encryption precision Ensure that safety in safety chip for the information to be protected.
Further, implementing as method shown in Fig. 1, the embodiment of the present invention provides a kind of information encryption device, As shown in figure 3, described device may include that taxon 31, ciphering unit 32, transmitting element 33.
Described taxon 31, is classified for treating protection information according to presetting rule, is obtained treating of different classifications Protection information;
Described ciphering unit 32, for carrying out to the information to be protected of described different classifications adding using different encryption policys Close, obtain the encryption file of different classifications;
Described transmitting element 33, for sending the encryption file of described different classifications to safety chip, in order to pacify Full chip carries out bulk encryption and stores to the encryption file of described different classifications.
It should be noted that other of each functional unit involved by a kind of information encryption device provided in an embodiment of the present invention Corresponding description, may be referred to the corresponding description in method shown in Fig. 1, will not be described here.
A kind of information encryption device provided in an embodiment of the present invention, treats protection information according to presetting rule first and carries out point Class, obtains the information to be protected of different classifications, then adopts the information to be protected to described different classifications for the different encryption policys It is encrypted, obtains the encryption file of different classifications, the more targeted information to be protected to different classifications is taken further Different encipherment protection strategies, prevents information to be stolen, and finally sends the encryption file of described different classifications to safety chip In, in order to safety chip, the encryption file of described different classifications is carried out by bulk encryption and stores, the encryption with prior art Method is compared, the present invention by the information to be protected of different classifications using different encryption policys so that the treating of different classifications Protection newly can correctly be encrypted, and improves encryption precision, more effectively prevents information to be protected compromised, improve further Information Security within safety chip.
Further, implementing as method shown in Fig. 2, the embodiment of the present invention provides another kind of data encryption dress Put, as shown in figure 4, described device may include that acquiring unit 41, recognition unit 42, taxon 43, ciphering unit 44, sends out Send unit 45, decryption unit 46;
Described acquiring unit 41, for obtaining the secure ID of information to be protected;
Described recognition unit 42, for identifying the safe class of described information to be protected according to preset identifications storehouse, described It is previously stored with the information corresponding secure ID respectively of different safety class in preset identifications storehouse.
Described taxon 43, is classified for treating protection information according to presetting rule, is obtained treating of different classifications Protection information;
Described ciphering unit 44, for carrying out to the information to be protected of described different classifications adding using different encryption policys Close, obtain the encryption file of different classifications;
Described transmitting element 45, for sending the encryption file of described different classifications to safety chip, in order to pacify Full chip carries out bulk encryption and stores to the encryption file of described different classifications.
Described decryption unit 46, for the identification information when receiving decoding request, being carried according to described decoding request Respectively described encryption file is decrypted, in described identification information, includes the decryption policy of described encryption file.
Further, described taxon 43 includes:
Sort module 4301, for according to the corresponding different safety class of described information to be protected to described information to be protected Classified, obtained the information to be protected of different safety class.
Further, described ciphering unit 44 includes:
Configuration module 4401, for be protected with described according to the corresponding different safety class configuration of described information to be protected The corresponding encryption policy of information;
Encrypting module 4402, for being encrypted place according to described encryption policy to the information to be protected of different safety class Reason, obtains the information to be protected corresponding encryption file of different safety class.
It should be noted that its of each functional unit involved by another kind data encryption device provided in an embodiment of the present invention He accordingly describes, and may be referred to the corresponding description in method shown in Fig. 2, will not be described here.
Another kind of information encryption device of the embodiment of the present invention, before sending information to be protected to safety chip, right The corresponding information to be protected of different safety class takes the encryption policy of corresponding safe class, on the one hand ensure that information to be protected Security reliability, still further aspect limits to the information in safety chip, prevents the attack of malicious user, right further The information to be protected of different safety class adopts different encryption policys and decryption policy, while improving data encryption precision Ensure that safety in safety chip for the information to be protected.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiment.
It is understood that the correlated characteristic in said method and device can mutually reference.In addition, in above-described embodiment " first ", " second " etc. be for distinguishing each embodiment, and do not represent the quality of each embodiment.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system Structure be obvious.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use various Programming language realizes the content of invention described herein, and the description above language-specific done is to disclose this Bright preferred forms.
In description mentioned herein, illustrate a large amount of details.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of not having these details.In some instances, known method, structure are not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly it will be appreciated that in order to simplify the disclosure and help understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect an intention that i.e. required guarantor The application claims of shield more features than the feature being expressly recited in each claim.More precisely, it is such as following Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore, The claims following specific embodiment are thus expressly incorporated in this specific embodiment, wherein each claim itself All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that and the module in the equipment in embodiment can be carried out adaptively Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list Unit or assembly be combined into a module or unit or assembly, and can be divided in addition multiple submodule or subelement or Sub-component.In addition to such feature and/or at least some of process or unit exclude each other, can adopt any Combination is to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power Profit requires, summary and accompanying drawing) disclosed in each feature can carry out generation by the alternative features providing identical, equivalent or similar purpose Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiment means to be in the present invention's Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection appoint One of meaning can in any combination mode using.
The all parts embodiment of the present invention can be realized with hardware, or to run on one or more processor Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (dsp) are realizing method and the dress of a kind of data storage according to embodiments of the present invention The some or all functions of some or all parts in putting.The present invention is also implemented as described here for executing Some or all equipment of method or program of device (for example, computer program and computer program).This The program realizing the present invention of sample can store on a computer-readable medium, or can have one or more signal Form.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or with any other Form provides.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can come real by means of the hardware including some different elements and by means of properly programmed computer Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.

Claims (10)

1. a kind of information ciphering method is it is characterised in that include:
Treat protection information according to presetting rule to be classified, obtain the information to be protected of different classifications;
Using different encryption policys, the information to be protected of described different classifications is encrypted, obtains the encryption literary composition of different classifications Part;
The encryption file of described different classifications is sent to safety chip, in order to safety chip, described different classifications is added Ciphertext part carries out bulk encryption and stores.
2. information ciphering method according to claim 1 is it is characterised in that described treat protection information according to presetting rule Classified, the information to be protected obtaining different classifications includes:
According to the corresponding different safety class of described information to be protected, described information to be protected is classified, obtain different safety The information to be protected of grade.
3. information ciphering method according to claim 2 it is characterised in that described using different encryption policys to described The information to be protected of different classifications is encrypted, and the encryption file obtaining different classifications includes:
According to described information to be protected corresponding different safety class configuration encryption policy corresponding with described information to be protected;
According to described encryption policy, the information to be protected of different safety class is encrypted, obtains different safety class The corresponding encryption file of information to be protected.
4. information ciphering method according to claim 1 it is characterised in that described according to presetting rule to letter to be protected Breath is classified, and before obtaining the information to be protected of different classifications, methods described also includes:
Obtain the secure ID of information to be protected;
Identify the safe class of described information to be protected according to preset identifications storehouse, be previously stored with not in described preset identifications storehouse Information corresponding secure ID respectively with safe class.
5. the information ciphering method according to any one of claim 1-4 is it is characterised in that methods described also includes:
When receiving decoding request, respectively described encryption file is solved according to the identification information that described decoding request carries Close, include the decryption policy of described encryption file in described identification information.
6. a kind of information encryption device is it is characterised in that include:
Taxon, is classified for treating protection information according to presetting rule, obtains the information to be protected of different classifications;
Ciphering unit, for being encrypted to the information to be protected of described different classifications using different encryption policys, is obtained not Encryption file with classification;
Transmitting element, for sending the encryption file of described different classifications to safety chip, in order to safety chip to institute The encryption file stating different classifications carries out bulk encryption and stores.
7. information encryption device according to claim 6 is it is characterised in that described taxon includes:
Sort module, for carrying out to described information to be protected point according to the corresponding different safety class of described information to be protected Class, obtains the information to be protected of different safety class.
8. information encryption device according to claim 7 is it is characterised in that described ciphering unit includes:
Configuration module, for corresponding to described information to be protected according to the corresponding different safety class configuration of described information to be protected Encryption policy;
Encrypting module, for being encrypted to the information to be protected of different safety class according to described encryption policy, obtains The information to be protected corresponding encryption file of different safety class.
9. information encryption device according to claim 6 is it is characterised in that described device also includes:
Acquiring unit, for obtaining the secure ID of information to be protected;
Recognition unit, for identifying the safe class of described information to be protected, described preset identifications storehouse according to preset identifications storehouse In be previously stored with the information respectively corresponding secure ID of different safety class.
10. the information encryption device according to any one of claim 6-9 is it is characterised in that described device also includes:
Decryption unit, for when receiving decoding request, the identification information being carried according to described decoding request is respectively to described Encryption file is decrypted, and includes the decryption policy of described encryption file in described identification information.
CN201610795015.0A 2016-08-30 2016-08-30 Information encryption method and device Pending CN106372519A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610795015.0A CN106372519A (en) 2016-08-30 2016-08-30 Information encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610795015.0A CN106372519A (en) 2016-08-30 2016-08-30 Information encryption method and device

Publications (1)

Publication Number Publication Date
CN106372519A true CN106372519A (en) 2017-02-01

Family

ID=57898802

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610795015.0A Pending CN106372519A (en) 2016-08-30 2016-08-30 Information encryption method and device

Country Status (1)

Country Link
CN (1) CN106372519A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107295488A (en) * 2017-06-15 2017-10-24 合肥工业大学 A kind of short message transmission system and its method based on text important attribute labeling method
CN107292183A (en) * 2017-06-29 2017-10-24 国信优易数据有限公司 A kind of data processing method and equipment
CN107315968A (en) * 2017-06-29 2017-11-03 国信优易数据有限公司 A kind of data processing method and equipment
CN107317806A (en) * 2017-06-20 2017-11-03 上海浩霖汇信息科技有限公司 A kind of electronics license application copy securely generates method and device
CN107609413A (en) * 2017-09-20 2018-01-19 深圳怡化电脑股份有限公司 A kind of processing method, device and the cash box of cash box data
CN107622208A (en) * 2017-08-31 2018-01-23 广东欧珀移动通信有限公司 Note encryption and decryption method and related product
CN109032848A (en) * 2018-08-30 2018-12-18 深圳互联先锋科技有限公司 A kind of processing method and processing system based on direct selling system data safety
CN109120585A (en) * 2017-06-26 2019-01-01 西门子股份公司 Send and receive the method and safety control of password-protected network packet
CN109670326A (en) * 2018-12-24 2019-04-23 北京天融信网络安全技术有限公司 A kind of data classification method and system
CN109815715A (en) * 2019-01-04 2019-05-28 平安科技(深圳)有限公司 A kind of data ciphering method and relevant apparatus
CN109933994A (en) * 2017-12-18 2019-06-25 北京三快在线科技有限公司 Data classification storage and device and calculating equipment
CN110008218A (en) * 2019-04-11 2019-07-12 广东省宝宸人力资源管理有限公司 Data storage collating sort system based on cloud computing
CN110807205A (en) * 2019-09-30 2020-02-18 奇安信科技集团股份有限公司 File security protection method and device
CN112911591A (en) * 2021-01-27 2021-06-04 东莞市皇育智能有限公司 Intelligent communication device based on 5G
CN112989413A (en) * 2021-03-19 2021-06-18 北京思特奇信息技术股份有限公司 Embedded data security protection method and system
CN113672947A (en) * 2021-07-16 2021-11-19 国网浙江省电力有限公司杭州供电公司 Electric power system graph model exchange data encryption method based on theme model
US11321471B2 (en) 2017-12-18 2022-05-03 Beijing Sankuai Online Technology Co., Ltd Encrypted storage of data
CN115242453A (en) * 2022-06-24 2022-10-25 中国电信股份有限公司 Data encryption method, data decryption method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030857A (en) * 2007-04-10 2007-09-05 华东师范大学 Method for encrypting, protecting and controlling fine mesh size file
CN101286837A (en) * 2008-05-13 2008-10-15 江苏大学 Message encryption device and method oriented to storage area network
CN101621376A (en) * 2008-06-30 2010-01-06 北京中星微电子有限公司 Method, device and system for multi-level encryption and decryption
CN102664928A (en) * 2012-04-01 2012-09-12 南京邮电大学 Data secure access method used for cloud storage and user terminal system
CN103716637A (en) * 2014-01-15 2014-04-09 北京工业大学 H.264 compressed domain layered video encryption method based on content analysis
CN103780622A (en) * 2014-01-24 2014-05-07 华中科技大学 Data classification and encryption method for cloud storage

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030857A (en) * 2007-04-10 2007-09-05 华东师范大学 Method for encrypting, protecting and controlling fine mesh size file
CN101286837A (en) * 2008-05-13 2008-10-15 江苏大学 Message encryption device and method oriented to storage area network
CN101621376A (en) * 2008-06-30 2010-01-06 北京中星微电子有限公司 Method, device and system for multi-level encryption and decryption
CN102664928A (en) * 2012-04-01 2012-09-12 南京邮电大学 Data secure access method used for cloud storage and user terminal system
CN103716637A (en) * 2014-01-15 2014-04-09 北京工业大学 H.264 compressed domain layered video encryption method based on content analysis
CN103780622A (en) * 2014-01-24 2014-05-07 华中科技大学 Data classification and encryption method for cloud storage

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107295488A (en) * 2017-06-15 2017-10-24 合肥工业大学 A kind of short message transmission system and its method based on text important attribute labeling method
CN107317806A (en) * 2017-06-20 2017-11-03 上海浩霖汇信息科技有限公司 A kind of electronics license application copy securely generates method and device
CN107317806B (en) * 2017-06-20 2020-07-14 上海浩霖汇信息科技有限公司 Safe generation method and device for electronic certificate application copy
CN109120585A (en) * 2017-06-26 2019-01-01 西门子股份公司 Send and receive the method and safety control of password-protected network packet
CN107292183B (en) * 2017-06-29 2019-08-23 国信优易数据有限公司 A kind of data processing method and equipment
CN107292183A (en) * 2017-06-29 2017-10-24 国信优易数据有限公司 A kind of data processing method and equipment
CN107315968A (en) * 2017-06-29 2017-11-03 国信优易数据有限公司 A kind of data processing method and equipment
CN107315968B (en) * 2017-06-29 2019-08-23 国信优易数据有限公司 A kind of data processing method and equipment
CN107622208A (en) * 2017-08-31 2018-01-23 广东欧珀移动通信有限公司 Note encryption and decryption method and related product
CN107609413A (en) * 2017-09-20 2018-01-19 深圳怡化电脑股份有限公司 A kind of processing method, device and the cash box of cash box data
US11321471B2 (en) 2017-12-18 2022-05-03 Beijing Sankuai Online Technology Co., Ltd Encrypted storage of data
CN109933994A (en) * 2017-12-18 2019-06-25 北京三快在线科技有限公司 Data classification storage and device and calculating equipment
CN109032848A (en) * 2018-08-30 2018-12-18 深圳互联先锋科技有限公司 A kind of processing method and processing system based on direct selling system data safety
CN109032848B (en) * 2018-08-30 2020-10-09 深圳互联先锋科技有限公司 Processing method and processing system based on direct marketing system data security
CN109670326A (en) * 2018-12-24 2019-04-23 北京天融信网络安全技术有限公司 A kind of data classification method and system
CN109815715A (en) * 2019-01-04 2019-05-28 平安科技(深圳)有限公司 A kind of data ciphering method and relevant apparatus
CN110008218A (en) * 2019-04-11 2019-07-12 广东省宝宸人力资源管理有限公司 Data storage collating sort system based on cloud computing
CN110807205A (en) * 2019-09-30 2020-02-18 奇安信科技集团股份有限公司 File security protection method and device
CN112911591A (en) * 2021-01-27 2021-06-04 东莞市皇育智能有限公司 Intelligent communication device based on 5G
CN112989413A (en) * 2021-03-19 2021-06-18 北京思特奇信息技术股份有限公司 Embedded data security protection method and system
CN112989413B (en) * 2021-03-19 2024-01-30 北京思特奇信息技术股份有限公司 Method and system for protecting embedded data security
CN113672947A (en) * 2021-07-16 2021-11-19 国网浙江省电力有限公司杭州供电公司 Electric power system graph model exchange data encryption method based on theme model
CN115242453A (en) * 2022-06-24 2022-10-25 中国电信股份有限公司 Data encryption method, data decryption method and device
CN115242453B (en) * 2022-06-24 2024-03-12 中国电信股份有限公司 Data encryption method, data decryption method and device

Similar Documents

Publication Publication Date Title
CN106372519A (en) Information encryption method and device
US9432346B2 (en) Protocol for controlling access to encryption keys
US20130318361A1 (en) Encrypting and storing biometric information on a storage device
TW201904231A (en) Progressive key encryption algorithm
US20140211944A1 (en) System and method of protecting, storing and decrypting keys over a computerized network
CN112632593B (en) Data storage method, data processing method, device and storage medium
CN104881595B (en) The self-help remote unlocking method managed based on PIN code
CN102135944A (en) Method for safe data storage in mobile communication equipment
CN108537048A (en) A kind of security association methods and system of encryption solid state disk and authorization computer
Chowdhury et al. A comprehensive survey for detection and prevention of SQL injection
EP3455763B1 (en) Digital rights management for anonymous digital content sharing
CN107332663A (en) Archive management method based on encryption technology
US10320785B2 (en) Method of protecting the identifying information of persons and computing devices, specifically those devices which are capable of sensing, capturing, receiving, transmitting, processing and storing digital information
Bhagyoday et al. Comprehensive study of E-Health security in cloud computing
CN108616516A (en) A kind of third party's plaintext password method of calibration based on multiple encryption algorithms
US11451522B2 (en) System and method for enabling the secure storage, transmission and access of genetic data
CN109547404B (en) Data acquisition method and server
CN105610770A (en) Access method, access device, terminal, encryption method, encryption device and terminal
CN106341227B (en) The method, apparatus and system of resetting protection password based on server decryption ciphertext
CN115442115A (en) Risk data pushing method, system, server and trusted unit
CN111914289B (en) Application program configuration information protection method and device
KR101708880B1 (en) Integrated lon-in apparatus and integrated log-in method
CN105049433B (en) Markization card number information transmits verification method and system
Sharfuddin et al. A novel cryptographic technique for cloud environment based on feedback dna
Gandhi Active cyber defense certainty: A digital self-defense in the modern age

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170201

WD01 Invention patent application deemed withdrawn after publication