CN107332660A - A kind of Novel movable data encryption security system - Google Patents
A kind of Novel movable data encryption security system Download PDFInfo
- Publication number
- CN107332660A CN107332660A CN201710509739.9A CN201710509739A CN107332660A CN 107332660 A CN107332660 A CN 107332660A CN 201710509739 A CN201710509739 A CN 201710509739A CN 107332660 A CN107332660 A CN 107332660A
- Authority
- CN
- China
- Prior art keywords
- module
- key
- data
- submodule
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of Novel movable data encryption security system, including processing module, Key Acquisition Module, encrypting module, memory module and deciphering module and the display module for display.The present invention is obtained from intelligent terminal unique mark by Key Acquisition Module and is generated as encryption key, encrypting module is pre-processed to clear data to be encrypted according to the encryption key and is encrypted to form ciphertext data by default cryptographic algorithm, it is stored in encryption key in memory module, when needing to be checked, recovery clear data is decrypted by cryptographic algorithm to ciphertext data using encryption key by deciphering module, and then display can be carried out by display module and is checked.And then ensure that being perfectly safe in intelligent terminal data, it is to avoid important information leakage causes heavy losses.
Description
Technical field
The present invention relates to data encryption technology field, more particularly to a kind of Novel movable data encryption security system.
Background technology
With the progress of science and technology, intelligent terminal(Such as smart mobile phone, tablet personal computer, intelligent glasses, Intelligent bracelet, intelligence
Energy wearable device etc.)Using more and more extensively, function is also stronger and stronger, and being developed from a kind of simple means of communication turns into one
The intelligent terminal of kind of integrated multifunction, such as can by Alipay, wechat the finance data that is paid of the means of payment, with
And contact person, communication information etc., therefore, the data safety sex chromosome mosaicism in intelligent terminal also increasingly cause the concern of people, it is necessary to
Safety is ensured by encrypting, to avoid the data for storing, transmitting from being illegally accessed reading.
The encryption and decryption of data, refer to the conversion Jing Guo cryptographic means by clear data, become insignificant ciphertext number
According to, and this ciphertext data is then reverted to clear data by recipient by decryption means.Encryption technology is network security technology
Foundation stone, the today developed rapidly in information technology, data ciphering and deciphering technology is increasingly taken seriously.
《People's Republic of China's network security method》Formal on 06 01st, 2017 to implement, data information security is put on
One unusual high height, data encryption is still a kind of most reliable method that computer system is protected to information at present.
Information is encrypted using cryptographic technique for it, realizes information hiding, so as to play the safe effect of protection information.
The content of the invention
The technical problem to be solved in the present invention is, for the drawbacks described above of prior art, there is provided a kind of Novel movable number
According to encryption safe system.
The technical solution adopted for the present invention to solve the technical problems is:There is provided a kind of new according to an aspect of the present invention
Type mobile data encryption safe system, including:Processing module, be connected with processing module obtains for generating the key of encryption key
Module, for being pre-processed and being encrypted by cryptographic algorithm to clear data to be encrypted to form the encryptions of ciphertext data
Module, the memory module for storing encryption key and ciphertext data, for being carried out to ciphertext data by the cryptographic algorithm
The deciphering module of decryption restoration clear data, the display module for showing encryption key and clear data.
Preferably, the Key Acquisition Module includes being used to obtain the acquisition of information submodule of the unique mark of intelligent terminal
Block, being connected with acquisition of information submodule generates the key of encryption key for unique mark to be changed and generates submodule.
Preferably, the unique mark is the MAC Address of intelligent terminal and the terminal key or intelligent terminal of system distribution
IMEI code and the terminal key of system distribution.
Preferably, the Key Acquisition Module also includes being connected close for encryption key to be generated with key generation submodule
Key Quick Response Code and the Quick Response Code generation submodule for being stored in memory module.
Preferably, the deciphering module includes the verification submodule and verification submodule for being used to verify the unique mark
The decryption submodule being connected for decryption.
Preferably, the deciphering module includes also including being connected for the two dimension for recognizing key Quick Response Code with verification submodule
Code identification module.
Preferably, the encrypting module includes the pretreatment submodule for being pre-processed to clear data and pre- place
Reason submodule is connected for the encryption submodule that pretreated clear data is encrypted.
Preferably, the pretreatment is that the clear data is divided into multiple data blocks.
Preferably, the cryptographic algorithm is SM9 algorithms.
Preferably, the cryptographic algorithm is MD5 algorithms, RSA Algorithm or DES algorithms.
Implement a technical scheme in the above-mentioned technical proposal of Novel movable data encryption security system of the present invention, have
Following advantage or beneficial effect:The present invention obtains unique mark from intelligent terminal by Key Acquisition Module and is generated as encrypting
Key, encrypting module is pre-processed to clear data to be encrypted according to the encryption key and entered by default cryptographic algorithm
Row encryption forms ciphertext data, and encryption key is stored in memory module, when needing to be checked, passes through deciphering module profit
Recovery clear data is decrypted by cryptographic algorithm to ciphertext data with encryption key, and then can be shown by display module
Show and check.And then ensure that being perfectly safe for data in intelligent terminal, it is to avoid important information leakage causes heavy losses.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, being used required in being described below to embodiment
Accompanying drawing be briefly described, it is therefore apparent that drawings in the following description are only some embodiments of the present invention, for ability
For the those of ordinary skill of domain, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached
In figure, accompanying drawing:
Fig. 1 is the principle schematic of Novel movable data encryption security system first embodiment of the present invention;
Fig. 2 is the principle schematic of Novel movable data encryption security system second embodiment of the present invention;
Fig. 3 is the principle schematic of Novel movable data encryption security system second embodiment of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, the various implementations that will be described below
Example will refer to corresponding accompanying drawing, and these accompanying drawings constitute a part for embodiment, which describe and realize that the present invention may be adopted
Various embodiments.It should be appreciated that it is also possible to use other embodiments, or structure and work(are carried out to embodiment enumerated herein
Modification on energy, without departing from the scope of the present invention and essence.
As shown in figure 1, the present invention provides a kind of Novel movable data encryption security system embodiment, specifically include:Processing
Module 10, it is connected for generating the Key Acquisition Module 11 of encryption key, for plaintext number to be encrypted with processing module 10
According to pre-processed and be encrypted by cryptographic algorithm to be formed ciphertext data encrypting module 12, for store encryption key and
The memory module 13 of ciphertext data, the deciphering module for ciphertext data to be decrypted with recovery clear data by cryptographic algorithm
14th, for showing the display module 15 of encryption key and clear data.It should be strongly noted that the above-mentioned module of the present embodiment
Completion can be realized by hardware such as processors.
In the present embodiment, the information of unique mark of the Key Acquisition Module 11 including being used to obtain intelligent terminal is obtained
Take submodule 111, being connected with acquisition of information submodule 111 generates key generation of encryption key for unique mark to be changed
Module 112.Wherein, the unique mark can distribute for the MAC Address and system of intelligent terminal terminal key or intelligent terminal
IMEI code and system distribution terminal key.It is of course also possible to be the password of user's input etc., with uniqueness.Meanwhile, solution
Close module 14 includes being used for the verification submodule 141 for verifying unique mark, the decryption being connected for decryption with verification submodule 141
Submodule 142.
In the present embodiment, Key Acquisition Module 11 obtains unique mark from intelligent terminal and is generated as encryption key,
Encrypting module 12 is pre-processed to clear data to be encrypted according to the encryption key and carried out by default cryptographic algorithm
Encryption forms ciphertext data, and encryption key is stored in memory module 13, when needing to be checked, passes through deciphering module 14
Recovery clear data is decrypted by cryptographic algorithm to ciphertext data using encryption key, and then can be entered by display module 15
Row display.
More specifically, acquisition of information submodule 111 obtains the information of its unique mark, key generation from intelligent terminal
Encryption key is stored in memory module 13 by module 112 by unique mark conversion generation encryption key.Encrypting module 12
Clear data to be encrypted is pre-processed and encrypted to form ciphertext data using cryptographic algorithm according to the encryption key, this is close
Literary data can be stored in memory module 13, can also be sent or be copied in other intelligent terminals together with encryption key.
When needing to check the ciphertext data, by the accuracy of the test and judge encryption key of verification submodule 141 of deciphering module 14,
And then ensure the security of data, and after by inspection, the decryption to ciphertext data is completed by decrypting submodule 142, it is extensive
Answer into clear data.Further, the unique mark when unique mark of intelligent terminal during decryption must be encryption, if
It is inconsistent, i.e. decryption failure, that is to say, that intelligent terminal when can only be encryption could be decrypted, and otherwise can not be decrypted, this can be true
Even if protecting data to be stolen or lose, it will not also be decrypted by other people, cause great loss, security is high, especially level of confidentiality pole
High individual privacy data, secret and safe is fabulous.
Specifically, MAC(Media Access Control or Medium Access Control)Address, free translation is
Media access control, or be physical address, hardware address, for defining the network equipment(Intelligent terminal)Position.In OSI moulds
In type, third layer Internet is responsible for IP address, and second layer data link layer is then responsible for MAC Address.Therefore, an intelligent terminal
(The network equipment)A MAC Address is had, MAC Address is that network interface card is determined, is changeless.IMEI(International
Mobile Equipment Identity)Be International Mobile Equipment Identity code abbreviation, international mobile equipment identification code, be by
" the electronics string number " of 15 bit digitals composition, it and every intelligent terminal(Smart mobile phone)Correspond, and the code is the whole world
Uniquely.Each intelligent terminal(Smart mobile phone)A globally unique sets of numbers will be all endowed after finishing assembly,
This number will all be recorded from producing to being delivered for use by the manufacturer of manufacture production.
In the present embodiment, the cryptographic algorithm used can be SM9 algorithms or MD5 algorithms, RSA Algorithm or DES
The international cryptographic algorithm such as algorithm.Wherein, SM9 cryptographic algorithms, national Password Management office was formally sent out on March 28th, 2016
Cloth《GM/T 0044-2016 Sm9 id password algorithms》, mainly solving the PKI in specific safety applications needs a large amount of hand over
The problem of changing digital certificate, makes safety applications more easily dispose and use.IBC cryptographic techniques use asymmetric cryptography body
System, encryption is from decryption using two sets of different keys, and everyone public key is exactly his identity, such as email addresses, close
Key management is simple, then the Email for sending encryption to others is just very convenient.
As shown in Fig. 2 the present invention also provides a kind of Novel movable data encryption security system second embodiment, specific bag
Include:Processing module 10, it is connected for generating the Key Acquisition Module 11 of encryption key, for to be encrypted with processing module 10
Clear data is pre-processed and is encrypted by cryptographic algorithm to form the encrypting module 12 of ciphertext data, for storing encryption
The memory module 13 of key and ciphertext data, the solution for ciphertext data to be decrypted with recovery clear data by cryptographic algorithm
Close module 14, the display module 15 for showing encryption key and clear data.It should be strongly noted that the present embodiment is upper
Completion can be realized by hardware such as processors by stating module or follow-up each module.
In the present embodiment, the information of unique mark of the Key Acquisition Module 11 including being used to obtain intelligent terminal is obtained
Take submodule 111, being connected with acquisition of information submodule 111 generates key generation of encryption key for unique mark to be changed
Module 112, it is connected for encryption key to be generated into Quick Response Code and the two of memory module 13 is stored in key generation submodule 112
Tie up code generation submodule 113.Wherein, the terminal key that the unique mark can distribute for the MAC Address and system of intelligent terminal
Or the terminal key of IMEI code and the system distribution of intelligent terminal.It is of course also possible to be the password of user's input etc., with unique
Property.Meanwhile, deciphering module 14 is including the verification submodule 141 for verifying unique mark, being connected with verification submodule 141 is used for
The decryption submodule 142 of decryption, with verification submodule 141 be connected for the Quick Response Code identification module 143 for recognizing Quick Response Code.More
Specifically, the Quick Response Code identification module 143 can be the camera or software for calling intelligent terminal to have two-dimensional code scanning function
(Such as wechat)To scan key Quick Response Code, the acquisition to information in key Quick Response Code is realized.
Specifically, MAC(Media Access Control or Medium Access Control)Address, free translation is
Media access control, or be physical address, hardware address, for defining the network equipment(Intelligent terminal)Position.In OSI moulds
In type, third layer Internet is responsible for IP address, and second layer data link layer is then responsible for MAC Address.Therefore, an intelligent terminal
(The network equipment)A MAC Address is had, MAC Address is that network interface card is determined, is changeless.IMEI(International
Mobile Equipment Identity)Be International Mobile Equipment Identity code abbreviation, international mobile equipment identification code, be by
" the electronics string number " of 15 bit digitals composition, it and every intelligent terminal(Smart mobile phone)Correspond, and the code is the whole world
Uniquely.Each intelligent terminal(Smart mobile phone)A globally unique sets of numbers will be all endowed after finishing assembly,
This number will all be recorded from producing to being delivered for use by the manufacturer of manufacture production.
In the present embodiment, the cryptographic algorithm used can be SM9 algorithms or MD5 algorithms, RSA Algorithm or DES
Algorithm etc..Wherein, SM9 cryptographic algorithms, national Password Management office formally issued on March 28th, 2016《GM/T 0044-
2016 Sm9 id password algorithms》, mainly solving the PKI in specific safety applications needs asking for a large amount of exchange digital certificates
Topic, makes safety applications more easily dispose and use.IBC cryptographic techniques use asymmetric cryptography system, encryption and decryption
Using two sets of different keys, everyone public key is exactly his identity, such as email addresses, and key management is simple, that
The Email for sending encryption to others is just very convenient.
In the present embodiment, Key Acquisition Module 11 obtains unique mark from intelligent terminal and is generated as encryption key,
Encrypting module 12 is pre-processed to clear data to be encrypted according to the encryption key and carried out by default cryptographic algorithm
Encryption forms ciphertext data, and encryption key is stored in memory module 13, when needing to be checked, passes through deciphering module 14
Recovery clear data is decrypted by cryptographic algorithm to ciphertext data using encryption key, and then can be entered by display module 15
Row display.
More specifically, acquisition of information submodule 111 obtains unique identification information, key generation submodule from intelligent terminal
112 by unique mark conversion generation encryption key, meanwhile, submodule 113 is generated by Quick Response Code and gives birth to encryption key conversion
It is stored in into key Quick Response Code, and by encryption key and Quick Response Code in memory module 13.Encrypting module 12 is according to the encryption key
Clear data to be encrypted is pre-processed and encrypted to form ciphertext data by cryptographic algorithm, the ciphertext data can be stored
In memory module 13, it can also send or copy in other intelligent terminals together with key Quick Response Code.Needing to check that this is close
During literary data, corresponding encryption key is obtained by the scanning of Quick Response Code identification module 143 of deciphering module 14, and then pass through verification
Submodule 141 carrys out the accuracy of the test and judge encryption key, and then ensures the security of data, after by inspection, passes through
Decrypt submodule 142 to complete decryption, revert to clear data.Further, during decryption, Quick Response Code identification module 143 is obtained
Intelligent terminal unique mark must be encryption when unique mark, if it is inconsistent, decryption failure, that is to say, that
Intelligent terminal when must be encryption could be decrypted, and otherwise can not be decrypted, even if this can ensure that data are stolen or lose, also will not
Decrypted by other people, cause great loss, security is high, especially the high individual privacy data of level of confidentiality, secret and safe
It is fabulous.
As shown in figure 3, the present invention also provides a kind of Novel movable data encryption security system 3rd embodiment, specific bag
Include:Processing module 10, it is connected for generating the Key Acquisition Module 11 of encryption key, for to be encrypted with processing module 10
Clear data is pre-processed and is encrypted by cryptographic algorithm to form the encrypting module 12 of ciphertext data, for storing encryption
The memory module 13 of key and ciphertext data, the solution for ciphertext data to be decrypted with recovery clear data by cryptographic algorithm
Close module 14, the display module 15 for showing encryption key and clear data.It should be strongly noted that the present embodiment is upper
Completion can be realized by hardware such as processors by stating module or follow-up each module.
In the present embodiment, the information of unique mark of the Key Acquisition Module 11 including being used to obtain intelligent terminal is obtained
Take submodule 111, being connected with acquisition of information submodule 111 generates key generation of encryption key for unique mark to be changed
Module 112, it is connected for encryption key to be generated into Quick Response Code and the two of memory module 13 is stored in key generation submodule 112
Tie up code generation submodule 113.Wherein, the terminal key that the unique mark can distribute for the MAC Address and system of intelligent terminal
Or the terminal key of IMEI code and the system distribution of intelligent terminal.It is of course also possible to be the password of user's input etc., with unique
Property.Meanwhile, deciphering module 14 is including the verification submodule 141 for verifying unique mark, being connected with verification submodule 141 is used for
The decryption submodule 142 of decryption, with verification submodule 141 be connected for the Quick Response Code identification module 143 for recognizing Quick Response Code.More
Specifically, the Quick Response Code identification module 143 can be the camera or software for calling intelligent terminal to have two-dimensional code scanning function
(Such as wechat)To scan key Quick Response Code.
In the present embodiment, the encrypting module 12 includes pretreatment for being used to pre-process clear data
Module 121, with pretreatment submodule 121 be connected for the encryption submodule 122 that pretreated clear data is encrypted,
Wherein, it is that clear data is divided into multiple data blocks that pretreatment, which is specifically, and encryption submodule 122 enters to each data block respectively
Row encryption, is combined into a ciphertext data afterwards.
Specifically, MAC(Media Access Control or Medium Access Control)Address, free translation is
Media access control, or be physical address, hardware address, for defining the network equipment(Intelligent terminal)Position.In OSI moulds
In type, third layer Internet is responsible for IP address, and second layer data link layer is then responsible for MAC Address.Therefore, an intelligent terminal
(The network equipment)A MAC Address is had, MAC Address is that network interface card is determined, is changeless.IMEI(International
Mobile Equipment Identity)Be International Mobile Equipment Identity code abbreviation, international mobile equipment identification code, be by
" the electronics string number " of 15 bit digitals composition, it and every intelligent terminal(Smart mobile phone)Correspond, and the code is the whole world
Uniquely.Each intelligent terminal(Smart mobile phone)A globally unique sets of numbers will be all endowed after finishing assembly,
This number will all be recorded from producing to being delivered for use by the manufacturer of manufacture production.
In the present embodiment, the cryptographic algorithm used can be SM9 algorithms or MD5 algorithms, RSA Algorithm or DES
Algorithm etc..Wherein, SM9 cryptographic algorithms, national Password Management office formally issued on March 28th, 2016《GM/T 0044-
2016 Sm9 id password algorithms》, mainly solving the PKI in specific safety applications needs asking for a large amount of exchange digital certificates
Topic, makes safety applications more easily dispose and use.IBC cryptographic techniques use asymmetric cryptography system, encryption and decryption
Using two sets of different keys, everyone public key is exactly his identity, such as email addresses, and key management is simple, that
The Email for sending encryption to others is just very convenient.
In the present embodiment, Key Acquisition Module 11 obtains unique mark from intelligent terminal and is generated as encryption key,
Encrypting module 12 is pre-processed to clear data to be encrypted according to the encryption key and carried out by default cryptographic algorithm
Encryption forms ciphertext data, and encryption key is stored in memory module 13, when needing to be checked, passes through deciphering module 14
Recovery clear data is decrypted by cryptographic algorithm to ciphertext data using encryption key, and then can be entered by display module 15
Row display.
More specifically, the acquisition of information submodule 111 of Key Acquisition Module 11 obtains unique mark from intelligent terminal
Information, key generates submodule 112 by unique mark conversion generation encryption key, meanwhile, submodule is generated by Quick Response Code
113 by encryption key conversion generation key Quick Response Code, and encryption key and key Quick Response Code are stored in memory module 13.Plus
Clear data to be encrypted is divided into multiple data blocks by the pretreatment submodule 121 of close module 12 first, and submodule is encrypted afterwards
Block 122 is encrypted and is combined into a ciphertext data respectively according to the encryption key by cryptographic algorithm to multiple data blocks, and this is close
Literary data can be stored in memory module 13, can also be sent or be copied in other intelligent terminals together with key Quick Response Code.
When needing to check the ciphertext data, corresponding encryption is obtained by the scanning of Quick Response Code identification module 143 of deciphering module 14 close
Key, and then by verifying submodule 141 come the accuracy of the test and judge encryption key, and then ensure the security of data,
After inspection, decryption is completed by decrypting submodule 142, clear data is reverted to.Further, during decryption barcode scanning intelligence
The unique mark when unique mark of energy terminal must be encryption, if inconsistent, i.e. decryption failure, that is to say, that, it is necessary to
Intelligent terminal when being encryption could be decrypted, and other functional terminals can not be decrypted, even if this can ensure that data are stolen or lose,
Also it will not be decrypted by other people, cause great loss, security is high, especially the high individual privacy data of level of confidentiality, maintained secrecy
It is fabulous.
Each functional module in each embodiment of the invention can be integrated in a processing unit or each
Module is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated unit both may be used
To be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
After content which will be described is read, it should be apparent to a person skilled in the art that described herein each
Planting feature can be realized by method, data handling system or computer program.Therefore, these features can portion use hardware side
Formula, all showed by the way of the software or by the way of hardware and software combination.In addition, features described above can also be used
The form of the computer program product being stored on one or more computer-readable recording mediums is showed, and this is computer-readable
Comprising computer readable program code section or instruction in storage medium, it is stored in storage medium, including some instructions are used
To cause a computer equipment(Can be personal computer, server or network equipment etc.)Or processor(English:
Processor)Perform the part steps of elder brother's embodiment methods described of the present invention.Can use it is any use it is computer-readable
Storage medium, including USB flash disk, hard disk, mobile hard disk, read-only storage(English:Read-Only Memory, referred to as:ROM), with
Machine accesses memory(English:Random Access Memory, referred to as:RAM), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The foregoing is merely illustrative of the preferred embodiments of the present invention, and those skilled in the art know, is not departing from the present invention
Spirit and scope in the case of, various changes or equivalent substitution can be carried out to these features and embodiment.In addition, in this hair
Under bright teaching, these features and embodiment can be modified to adapt to particular situation and material without departing from this hair
Bright spirit and scope.Therefore, the present invention is not limited to the particular embodiment disclosed, and falls with the power of the application
Embodiment in sharp claimed range belongs to protection scope of the present invention.
Claims (10)
1. a kind of Novel movable data encryption security system, it is characterised in that including:Processing module(10)And the processing mould
Block(10)It is connected for the Key Acquisition Module for generating encryption key(11), for being pre-processed to clear data to be encrypted
And the encrypting module to form ciphertext data is encrypted by cryptographic algorithm(12), for storing the encryption key and ciphertext number
According to memory module(13), for the ciphertext data to be decrypted by the cryptographic algorithm recover the clear data
Deciphering module(14), display module for showing the encryption key and clear data(15).
2. Novel movable data encryption security system according to claim 1, it is characterised in that the Key Acquisition Module
(11)Include the acquisition of information submodule of the unique mark for obtaining intelligent terminal(111)And described information acquisition submodule
(111)It is connected and the key generation submodule of the encryption key is generated for the unique mark to be changed(112).
3. Novel movable data encryption security system according to claim 2, it is characterised in that the unique mark is intelligence
The terminal key of IMEI code and the system distribution of the MAC Address of energy terminal and the terminal key of system distribution or intelligent terminal.
4. Novel movable data encryption security system according to claim 2, it is characterised in that the Key Acquisition Module
(11)Also include generating submodule with the key(112)It is connected for the encryption key to be generated into key Quick Response Code and stored
In the memory module(13)Quick Response Code generation submodule(113).
5. the Novel movable data encryption security system according to claim 2 or 4, it is characterised in that the deciphering module
(14)Including the verification submodule for verifying the unique mark(141)And the verification submodule(141)It is connected for solving
Close decryption submodule(142).
6. Novel movable data encryption security system according to claim 5, it is characterised in that the deciphering module(14)
Including also including and the verification submodule(141)It is connected for the Quick Response Code identification module for recognizing the key Quick Response Code
(143).
7. Novel movable data encryption security system according to claim 1, it is characterised in that the encrypting module(12)
Including the pretreatment submodule for being pre-processed to the clear data(121)And the pretreatment submodule(121)Phase
It is used in conjunction in the encryption submodule that the pretreated clear data is encrypted(122).
8. Novel movable data encryption security system according to claim 7, it is characterised in that the pretreatment is by institute
State clear data and be divided into multiple data blocks.
9. the Novel movable data encryption security system according to claim any one of 1-8, it is characterised in that the password
Algorithm is SM9 algorithms.
10. the Novel movable data encryption security system according to claim any one of 1-8, it is characterised in that described close
Code algorithm is MD5 algorithms, RSA Algorithm or DES algorithms.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710509739.9A CN107332660A (en) | 2017-06-28 | 2017-06-28 | A kind of Novel movable data encryption security system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710509739.9A CN107332660A (en) | 2017-06-28 | 2017-06-28 | A kind of Novel movable data encryption security system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107332660A true CN107332660A (en) | 2017-11-07 |
Family
ID=60198653
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710509739.9A Pending CN107332660A (en) | 2017-06-28 | 2017-06-28 | A kind of Novel movable data encryption security system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107332660A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109120589A (en) * | 2018-06-30 | 2019-01-01 | 北京东方英卡数字信息技术有限公司 | A kind of end message guard method and device based on Crypted password |
CN111356133A (en) * | 2018-12-24 | 2020-06-30 | 深圳市广和通无线股份有限公司 | Security testing method and device for wireless communication module and computer equipment |
CN111597075A (en) * | 2020-05-11 | 2020-08-28 | 成都艾勃科技有限公司 | Method for recovering data from data storage device encrypted by hardware |
CN113011542A (en) * | 2019-12-21 | 2021-06-22 | 深圳市帕尔卡科技有限公司 | Encryption method, identification method and identification device of two-dimensional code |
CN115150134A (en) * | 2022-06-20 | 2022-10-04 | 国网山东省电力公司东平县供电公司 | Intelligent power grid data encryption transmission method and system |
CN115242415A (en) * | 2021-04-23 | 2022-10-25 | 伊姆西Ip控股有限责任公司 | Data encryption method implemented at edge switch, electronic device, and program product |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030133576A1 (en) * | 2000-10-18 | 2003-07-17 | Frederic Grumiaux | Generation of a common encryption key |
CN104079404A (en) * | 2014-07-07 | 2014-10-01 | 北京深思数盾科技有限公司 | Sensitive data secure exchange method and system |
CN105450620A (en) * | 2014-09-30 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Information processing method and device |
CN105681039A (en) * | 2016-04-15 | 2016-06-15 | 上海上讯信息技术股份有限公司 | Method and device for secret key generation and corresponding decryption |
US9374222B2 (en) * | 2014-09-02 | 2016-06-21 | Alcatel Lucent | Secure communication of data between devices |
CN106375990A (en) * | 2016-10-21 | 2017-02-01 | 上海统宁科技发展有限公司 | Encryption and decryption system and encryption and decryption method for private data of mobile phone |
-
2017
- 2017-06-28 CN CN201710509739.9A patent/CN107332660A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030133576A1 (en) * | 2000-10-18 | 2003-07-17 | Frederic Grumiaux | Generation of a common encryption key |
CN104079404A (en) * | 2014-07-07 | 2014-10-01 | 北京深思数盾科技有限公司 | Sensitive data secure exchange method and system |
US9374222B2 (en) * | 2014-09-02 | 2016-06-21 | Alcatel Lucent | Secure communication of data between devices |
CN105450620A (en) * | 2014-09-30 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Information processing method and device |
CN105681039A (en) * | 2016-04-15 | 2016-06-15 | 上海上讯信息技术股份有限公司 | Method and device for secret key generation and corresponding decryption |
CN106375990A (en) * | 2016-10-21 | 2017-02-01 | 上海统宁科技发展有限公司 | Encryption and decryption system and encryption and decryption method for private data of mobile phone |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109120589A (en) * | 2018-06-30 | 2019-01-01 | 北京东方英卡数字信息技术有限公司 | A kind of end message guard method and device based on Crypted password |
CN109120589B (en) * | 2018-06-30 | 2021-03-23 | 北京东方英卡数字信息技术有限公司 | Terminal information protection method and device based on encryption password |
CN111356133A (en) * | 2018-12-24 | 2020-06-30 | 深圳市广和通无线股份有限公司 | Security testing method and device for wireless communication module and computer equipment |
CN111356133B (en) * | 2018-12-24 | 2023-09-08 | 深圳市广和通无线股份有限公司 | Security test method and device for wireless communication module and computer equipment |
CN113011542A (en) * | 2019-12-21 | 2021-06-22 | 深圳市帕尔卡科技有限公司 | Encryption method, identification method and identification device of two-dimensional code |
CN111597075A (en) * | 2020-05-11 | 2020-08-28 | 成都艾勃科技有限公司 | Method for recovering data from data storage device encrypted by hardware |
CN111597075B (en) * | 2020-05-11 | 2023-04-07 | 成都艾勃科技有限公司 | Method for recovering data from data storage device encrypted by hardware |
CN115242415A (en) * | 2021-04-23 | 2022-10-25 | 伊姆西Ip控股有限责任公司 | Data encryption method implemented at edge switch, electronic device, and program product |
US11936635B2 (en) | 2021-04-23 | 2024-03-19 | EMC IP Holding Company LLC | Method, electronic device, and program product implemented at an edge switch for data encryption |
CN115150134A (en) * | 2022-06-20 | 2022-10-04 | 国网山东省电力公司东平县供电公司 | Intelligent power grid data encryption transmission method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107332660A (en) | A kind of Novel movable data encryption security system | |
WO2017097041A1 (en) | Data transmission method and device | |
CN1689297B (en) | Method of preventing unauthorized distribution and use of electronic keys using a key seed | |
CN103546289B (en) | USB (universal serial bus) Key based secure data transmission method and system | |
KR20140126787A (en) | Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof | |
TW201428529A (en) | A fingerprint authentication system and fingerprint authentication method based on the near field communication (NFC) | |
CN106713508A (en) | Data access method and system based on cloud server | |
CN103281194B (en) | A kind of safety and lightweight RFID ownership transfer method based on Bilinear map | |
CN109766979A (en) | Two-dimensional code generation method, verification method and device | |
TW201201041A (en) | Data security method and system | |
CN108718233B (en) | Encryption method, computer equipment and storage medium | |
CN104463016B (en) | Data safety storing method suitable for IC cards and two-dimension codes | |
CN113541935B (en) | Encryption cloud storage method, system, equipment and terminal supporting key escrow | |
CN104125064B (en) | A kind of dynamic cipher authentication method, client and Verification System | |
WO2010057423A1 (en) | Encryption and decryption method and system for ic card and the reader device | |
CN109903052A (en) | A kind of block chain endorsement method and mobile device | |
CN110138548A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station cryptographic key negotiation method and system | |
TWI476629B (en) | Data security and security systems and methods | |
CN107911221B (en) | Key management method for secure storage of solid-state disk data | |
CN200993803Y (en) | Internet banking system safety terminal | |
CN112507296A (en) | User login verification method and system based on block chain | |
CN105871866B (en) | A kind of password management system and method based on computer hardware information | |
CN106789977A (en) | A kind of method and system that handset token is realized based on Secret splitting | |
CN102270182B (en) | Encrypted mobile storage equipment based on synchronous user and host machine authentication | |
CN107689867B (en) | Key protection method and system under open environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171107 |