CN107332660A - A kind of Novel movable data encryption security system - Google Patents

A kind of Novel movable data encryption security system Download PDF

Info

Publication number
CN107332660A
CN107332660A CN201710509739.9A CN201710509739A CN107332660A CN 107332660 A CN107332660 A CN 107332660A CN 201710509739 A CN201710509739 A CN 201710509739A CN 107332660 A CN107332660 A CN 107332660A
Authority
CN
China
Prior art keywords
module
key
data
submodule
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710509739.9A
Other languages
Chinese (zh)
Inventor
张丰祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Docking Platform Technology Development Co Ltd
Original Assignee
Shenzhen Docking Platform Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Docking Platform Technology Development Co Ltd filed Critical Shenzhen Docking Platform Technology Development Co Ltd
Priority to CN201710509739.9A priority Critical patent/CN107332660A/en
Publication of CN107332660A publication Critical patent/CN107332660A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of Novel movable data encryption security system, including processing module, Key Acquisition Module, encrypting module, memory module and deciphering module and the display module for display.The present invention is obtained from intelligent terminal unique mark by Key Acquisition Module and is generated as encryption key, encrypting module is pre-processed to clear data to be encrypted according to the encryption key and is encrypted to form ciphertext data by default cryptographic algorithm, it is stored in encryption key in memory module, when needing to be checked, recovery clear data is decrypted by cryptographic algorithm to ciphertext data using encryption key by deciphering module, and then display can be carried out by display module and is checked.And then ensure that being perfectly safe in intelligent terminal data, it is to avoid important information leakage causes heavy losses.

Description

A kind of Novel movable data encryption security system
Technical field
The present invention relates to data encryption technology field, more particularly to a kind of Novel movable data encryption security system.
Background technology
With the progress of science and technology, intelligent terminal(Such as smart mobile phone, tablet personal computer, intelligent glasses, Intelligent bracelet, intelligence Energy wearable device etc.)Using more and more extensively, function is also stronger and stronger, and being developed from a kind of simple means of communication turns into one The intelligent terminal of kind of integrated multifunction, such as can by Alipay, wechat the finance data that is paid of the means of payment, with And contact person, communication information etc., therefore, the data safety sex chromosome mosaicism in intelligent terminal also increasingly cause the concern of people, it is necessary to Safety is ensured by encrypting, to avoid the data for storing, transmitting from being illegally accessed reading.
The encryption and decryption of data, refer to the conversion Jing Guo cryptographic means by clear data, become insignificant ciphertext number According to, and this ciphertext data is then reverted to clear data by recipient by decryption means.Encryption technology is network security technology Foundation stone, the today developed rapidly in information technology, data ciphering and deciphering technology is increasingly taken seriously.
《People's Republic of China's network security method》Formal on 06 01st, 2017 to implement, data information security is put on One unusual high height, data encryption is still a kind of most reliable method that computer system is protected to information at present. Information is encrypted using cryptographic technique for it, realizes information hiding, so as to play the safe effect of protection information.
The content of the invention
The technical problem to be solved in the present invention is, for the drawbacks described above of prior art, there is provided a kind of Novel movable number According to encryption safe system.
The technical solution adopted for the present invention to solve the technical problems is:There is provided a kind of new according to an aspect of the present invention Type mobile data encryption safe system, including:Processing module, be connected with processing module obtains for generating the key of encryption key Module, for being pre-processed and being encrypted by cryptographic algorithm to clear data to be encrypted to form the encryptions of ciphertext data Module, the memory module for storing encryption key and ciphertext data, for being carried out to ciphertext data by the cryptographic algorithm The deciphering module of decryption restoration clear data, the display module for showing encryption key and clear data.
Preferably, the Key Acquisition Module includes being used to obtain the acquisition of information submodule of the unique mark of intelligent terminal Block, being connected with acquisition of information submodule generates the key of encryption key for unique mark to be changed and generates submodule.
Preferably, the unique mark is the MAC Address of intelligent terminal and the terminal key or intelligent terminal of system distribution IMEI code and the terminal key of system distribution.
Preferably, the Key Acquisition Module also includes being connected close for encryption key to be generated with key generation submodule Key Quick Response Code and the Quick Response Code generation submodule for being stored in memory module.
Preferably, the deciphering module includes the verification submodule and verification submodule for being used to verify the unique mark The decryption submodule being connected for decryption.
Preferably, the deciphering module includes also including being connected for the two dimension for recognizing key Quick Response Code with verification submodule Code identification module.
Preferably, the encrypting module includes the pretreatment submodule for being pre-processed to clear data and pre- place Reason submodule is connected for the encryption submodule that pretreated clear data is encrypted.
Preferably, the pretreatment is that the clear data is divided into multiple data blocks.
Preferably, the cryptographic algorithm is SM9 algorithms.
Preferably, the cryptographic algorithm is MD5 algorithms, RSA Algorithm or DES algorithms.
Implement a technical scheme in the above-mentioned technical proposal of Novel movable data encryption security system of the present invention, have Following advantage or beneficial effect:The present invention obtains unique mark from intelligent terminal by Key Acquisition Module and is generated as encrypting Key, encrypting module is pre-processed to clear data to be encrypted according to the encryption key and entered by default cryptographic algorithm Row encryption forms ciphertext data, and encryption key is stored in memory module, when needing to be checked, passes through deciphering module profit Recovery clear data is decrypted by cryptographic algorithm to ciphertext data with encryption key, and then can be shown by display module Show and check.And then ensure that being perfectly safe for data in intelligent terminal, it is to avoid important information leakage causes heavy losses.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, being used required in being described below to embodiment Accompanying drawing be briefly described, it is therefore apparent that drawings in the following description are only some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached In figure, accompanying drawing:
Fig. 1 is the principle schematic of Novel movable data encryption security system first embodiment of the present invention;
Fig. 2 is the principle schematic of Novel movable data encryption security system second embodiment of the present invention;
Fig. 3 is the principle schematic of Novel movable data encryption security system second embodiment of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, the various implementations that will be described below Example will refer to corresponding accompanying drawing, and these accompanying drawings constitute a part for embodiment, which describe and realize that the present invention may be adopted Various embodiments.It should be appreciated that it is also possible to use other embodiments, or structure and work(are carried out to embodiment enumerated herein Modification on energy, without departing from the scope of the present invention and essence.
As shown in figure 1, the present invention provides a kind of Novel movable data encryption security system embodiment, specifically include:Processing Module 10, it is connected for generating the Key Acquisition Module 11 of encryption key, for plaintext number to be encrypted with processing module 10 According to pre-processed and be encrypted by cryptographic algorithm to be formed ciphertext data encrypting module 12, for store encryption key and The memory module 13 of ciphertext data, the deciphering module for ciphertext data to be decrypted with recovery clear data by cryptographic algorithm 14th, for showing the display module 15 of encryption key and clear data.It should be strongly noted that the above-mentioned module of the present embodiment Completion can be realized by hardware such as processors.
In the present embodiment, the information of unique mark of the Key Acquisition Module 11 including being used to obtain intelligent terminal is obtained Take submodule 111, being connected with acquisition of information submodule 111 generates key generation of encryption key for unique mark to be changed Module 112.Wherein, the unique mark can distribute for the MAC Address and system of intelligent terminal terminal key or intelligent terminal IMEI code and system distribution terminal key.It is of course also possible to be the password of user's input etc., with uniqueness.Meanwhile, solution Close module 14 includes being used for the verification submodule 141 for verifying unique mark, the decryption being connected for decryption with verification submodule 141 Submodule 142.
In the present embodiment, Key Acquisition Module 11 obtains unique mark from intelligent terminal and is generated as encryption key, Encrypting module 12 is pre-processed to clear data to be encrypted according to the encryption key and carried out by default cryptographic algorithm Encryption forms ciphertext data, and encryption key is stored in memory module 13, when needing to be checked, passes through deciphering module 14 Recovery clear data is decrypted by cryptographic algorithm to ciphertext data using encryption key, and then can be entered by display module 15 Row display.
More specifically, acquisition of information submodule 111 obtains the information of its unique mark, key generation from intelligent terminal Encryption key is stored in memory module 13 by module 112 by unique mark conversion generation encryption key.Encrypting module 12 Clear data to be encrypted is pre-processed and encrypted to form ciphertext data using cryptographic algorithm according to the encryption key, this is close Literary data can be stored in memory module 13, can also be sent or be copied in other intelligent terminals together with encryption key. When needing to check the ciphertext data, by the accuracy of the test and judge encryption key of verification submodule 141 of deciphering module 14, And then ensure the security of data, and after by inspection, the decryption to ciphertext data is completed by decrypting submodule 142, it is extensive Answer into clear data.Further, the unique mark when unique mark of intelligent terminal during decryption must be encryption, if It is inconsistent, i.e. decryption failure, that is to say, that intelligent terminal when can only be encryption could be decrypted, and otherwise can not be decrypted, this can be true Even if protecting data to be stolen or lose, it will not also be decrypted by other people, cause great loss, security is high, especially level of confidentiality pole High individual privacy data, secret and safe is fabulous.
Specifically, MAC(Media Access Control or Medium Access Control)Address, free translation is Media access control, or be physical address, hardware address, for defining the network equipment(Intelligent terminal)Position.In OSI moulds In type, third layer Internet is responsible for IP address, and second layer data link layer is then responsible for MAC Address.Therefore, an intelligent terminal (The network equipment)A MAC Address is had, MAC Address is that network interface card is determined, is changeless.IMEI(International Mobile Equipment Identity)Be International Mobile Equipment Identity code abbreviation, international mobile equipment identification code, be by " the electronics string number " of 15 bit digitals composition, it and every intelligent terminal(Smart mobile phone)Correspond, and the code is the whole world Uniquely.Each intelligent terminal(Smart mobile phone)A globally unique sets of numbers will be all endowed after finishing assembly, This number will all be recorded from producing to being delivered for use by the manufacturer of manufacture production.
In the present embodiment, the cryptographic algorithm used can be SM9 algorithms or MD5 algorithms, RSA Algorithm or DES The international cryptographic algorithm such as algorithm.Wherein, SM9 cryptographic algorithms, national Password Management office was formally sent out on March 28th, 2016 Cloth《GM/T 0044-2016 Sm9 id password algorithms》, mainly solving the PKI in specific safety applications needs a large amount of hand over The problem of changing digital certificate, makes safety applications more easily dispose and use.IBC cryptographic techniques use asymmetric cryptography body System, encryption is from decryption using two sets of different keys, and everyone public key is exactly his identity, such as email addresses, close Key management is simple, then the Email for sending encryption to others is just very convenient.
As shown in Fig. 2 the present invention also provides a kind of Novel movable data encryption security system second embodiment, specific bag Include:Processing module 10, it is connected for generating the Key Acquisition Module 11 of encryption key, for to be encrypted with processing module 10 Clear data is pre-processed and is encrypted by cryptographic algorithm to form the encrypting module 12 of ciphertext data, for storing encryption The memory module 13 of key and ciphertext data, the solution for ciphertext data to be decrypted with recovery clear data by cryptographic algorithm Close module 14, the display module 15 for showing encryption key and clear data.It should be strongly noted that the present embodiment is upper Completion can be realized by hardware such as processors by stating module or follow-up each module.
In the present embodiment, the information of unique mark of the Key Acquisition Module 11 including being used to obtain intelligent terminal is obtained Take submodule 111, being connected with acquisition of information submodule 111 generates key generation of encryption key for unique mark to be changed Module 112, it is connected for encryption key to be generated into Quick Response Code and the two of memory module 13 is stored in key generation submodule 112 Tie up code generation submodule 113.Wherein, the terminal key that the unique mark can distribute for the MAC Address and system of intelligent terminal Or the terminal key of IMEI code and the system distribution of intelligent terminal.It is of course also possible to be the password of user's input etc., with unique Property.Meanwhile, deciphering module 14 is including the verification submodule 141 for verifying unique mark, being connected with verification submodule 141 is used for The decryption submodule 142 of decryption, with verification submodule 141 be connected for the Quick Response Code identification module 143 for recognizing Quick Response Code.More Specifically, the Quick Response Code identification module 143 can be the camera or software for calling intelligent terminal to have two-dimensional code scanning function (Such as wechat)To scan key Quick Response Code, the acquisition to information in key Quick Response Code is realized.
Specifically, MAC(Media Access Control or Medium Access Control)Address, free translation is Media access control, or be physical address, hardware address, for defining the network equipment(Intelligent terminal)Position.In OSI moulds In type, third layer Internet is responsible for IP address, and second layer data link layer is then responsible for MAC Address.Therefore, an intelligent terminal (The network equipment)A MAC Address is had, MAC Address is that network interface card is determined, is changeless.IMEI(International Mobile Equipment Identity)Be International Mobile Equipment Identity code abbreviation, international mobile equipment identification code, be by " the electronics string number " of 15 bit digitals composition, it and every intelligent terminal(Smart mobile phone)Correspond, and the code is the whole world Uniquely.Each intelligent terminal(Smart mobile phone)A globally unique sets of numbers will be all endowed after finishing assembly, This number will all be recorded from producing to being delivered for use by the manufacturer of manufacture production.
In the present embodiment, the cryptographic algorithm used can be SM9 algorithms or MD5 algorithms, RSA Algorithm or DES Algorithm etc..Wherein, SM9 cryptographic algorithms, national Password Management office formally issued on March 28th, 2016《GM/T 0044- 2016 Sm9 id password algorithms》, mainly solving the PKI in specific safety applications needs asking for a large amount of exchange digital certificates Topic, makes safety applications more easily dispose and use.IBC cryptographic techniques use asymmetric cryptography system, encryption and decryption Using two sets of different keys, everyone public key is exactly his identity, such as email addresses, and key management is simple, that The Email for sending encryption to others is just very convenient.
In the present embodiment, Key Acquisition Module 11 obtains unique mark from intelligent terminal and is generated as encryption key, Encrypting module 12 is pre-processed to clear data to be encrypted according to the encryption key and carried out by default cryptographic algorithm Encryption forms ciphertext data, and encryption key is stored in memory module 13, when needing to be checked, passes through deciphering module 14 Recovery clear data is decrypted by cryptographic algorithm to ciphertext data using encryption key, and then can be entered by display module 15 Row display.
More specifically, acquisition of information submodule 111 obtains unique identification information, key generation submodule from intelligent terminal 112 by unique mark conversion generation encryption key, meanwhile, submodule 113 is generated by Quick Response Code and gives birth to encryption key conversion It is stored in into key Quick Response Code, and by encryption key and Quick Response Code in memory module 13.Encrypting module 12 is according to the encryption key Clear data to be encrypted is pre-processed and encrypted to form ciphertext data by cryptographic algorithm, the ciphertext data can be stored In memory module 13, it can also send or copy in other intelligent terminals together with key Quick Response Code.Needing to check that this is close During literary data, corresponding encryption key is obtained by the scanning of Quick Response Code identification module 143 of deciphering module 14, and then pass through verification Submodule 141 carrys out the accuracy of the test and judge encryption key, and then ensures the security of data, after by inspection, passes through Decrypt submodule 142 to complete decryption, revert to clear data.Further, during decryption, Quick Response Code identification module 143 is obtained Intelligent terminal unique mark must be encryption when unique mark, if it is inconsistent, decryption failure, that is to say, that Intelligent terminal when must be encryption could be decrypted, and otherwise can not be decrypted, even if this can ensure that data are stolen or lose, also will not Decrypted by other people, cause great loss, security is high, especially the high individual privacy data of level of confidentiality, secret and safe It is fabulous.
As shown in figure 3, the present invention also provides a kind of Novel movable data encryption security system 3rd embodiment, specific bag Include:Processing module 10, it is connected for generating the Key Acquisition Module 11 of encryption key, for to be encrypted with processing module 10 Clear data is pre-processed and is encrypted by cryptographic algorithm to form the encrypting module 12 of ciphertext data, for storing encryption The memory module 13 of key and ciphertext data, the solution for ciphertext data to be decrypted with recovery clear data by cryptographic algorithm Close module 14, the display module 15 for showing encryption key and clear data.It should be strongly noted that the present embodiment is upper Completion can be realized by hardware such as processors by stating module or follow-up each module.
In the present embodiment, the information of unique mark of the Key Acquisition Module 11 including being used to obtain intelligent terminal is obtained Take submodule 111, being connected with acquisition of information submodule 111 generates key generation of encryption key for unique mark to be changed Module 112, it is connected for encryption key to be generated into Quick Response Code and the two of memory module 13 is stored in key generation submodule 112 Tie up code generation submodule 113.Wherein, the terminal key that the unique mark can distribute for the MAC Address and system of intelligent terminal Or the terminal key of IMEI code and the system distribution of intelligent terminal.It is of course also possible to be the password of user's input etc., with unique Property.Meanwhile, deciphering module 14 is including the verification submodule 141 for verifying unique mark, being connected with verification submodule 141 is used for The decryption submodule 142 of decryption, with verification submodule 141 be connected for the Quick Response Code identification module 143 for recognizing Quick Response Code.More Specifically, the Quick Response Code identification module 143 can be the camera or software for calling intelligent terminal to have two-dimensional code scanning function (Such as wechat)To scan key Quick Response Code.
In the present embodiment, the encrypting module 12 includes pretreatment for being used to pre-process clear data Module 121, with pretreatment submodule 121 be connected for the encryption submodule 122 that pretreated clear data is encrypted, Wherein, it is that clear data is divided into multiple data blocks that pretreatment, which is specifically, and encryption submodule 122 enters to each data block respectively Row encryption, is combined into a ciphertext data afterwards.
Specifically, MAC(Media Access Control or Medium Access Control)Address, free translation is Media access control, or be physical address, hardware address, for defining the network equipment(Intelligent terminal)Position.In OSI moulds In type, third layer Internet is responsible for IP address, and second layer data link layer is then responsible for MAC Address.Therefore, an intelligent terminal (The network equipment)A MAC Address is had, MAC Address is that network interface card is determined, is changeless.IMEI(International Mobile Equipment Identity)Be International Mobile Equipment Identity code abbreviation, international mobile equipment identification code, be by " the electronics string number " of 15 bit digitals composition, it and every intelligent terminal(Smart mobile phone)Correspond, and the code is the whole world Uniquely.Each intelligent terminal(Smart mobile phone)A globally unique sets of numbers will be all endowed after finishing assembly, This number will all be recorded from producing to being delivered for use by the manufacturer of manufacture production.
In the present embodiment, the cryptographic algorithm used can be SM9 algorithms or MD5 algorithms, RSA Algorithm or DES Algorithm etc..Wherein, SM9 cryptographic algorithms, national Password Management office formally issued on March 28th, 2016《GM/T 0044- 2016 Sm9 id password algorithms》, mainly solving the PKI in specific safety applications needs asking for a large amount of exchange digital certificates Topic, makes safety applications more easily dispose and use.IBC cryptographic techniques use asymmetric cryptography system, encryption and decryption Using two sets of different keys, everyone public key is exactly his identity, such as email addresses, and key management is simple, that The Email for sending encryption to others is just very convenient.
In the present embodiment, Key Acquisition Module 11 obtains unique mark from intelligent terminal and is generated as encryption key, Encrypting module 12 is pre-processed to clear data to be encrypted according to the encryption key and carried out by default cryptographic algorithm Encryption forms ciphertext data, and encryption key is stored in memory module 13, when needing to be checked, passes through deciphering module 14 Recovery clear data is decrypted by cryptographic algorithm to ciphertext data using encryption key, and then can be entered by display module 15 Row display.
More specifically, the acquisition of information submodule 111 of Key Acquisition Module 11 obtains unique mark from intelligent terminal Information, key generates submodule 112 by unique mark conversion generation encryption key, meanwhile, submodule is generated by Quick Response Code 113 by encryption key conversion generation key Quick Response Code, and encryption key and key Quick Response Code are stored in memory module 13.Plus Clear data to be encrypted is divided into multiple data blocks by the pretreatment submodule 121 of close module 12 first, and submodule is encrypted afterwards Block 122 is encrypted and is combined into a ciphertext data respectively according to the encryption key by cryptographic algorithm to multiple data blocks, and this is close Literary data can be stored in memory module 13, can also be sent or be copied in other intelligent terminals together with key Quick Response Code. When needing to check the ciphertext data, corresponding encryption is obtained by the scanning of Quick Response Code identification module 143 of deciphering module 14 close Key, and then by verifying submodule 141 come the accuracy of the test and judge encryption key, and then ensure the security of data, After inspection, decryption is completed by decrypting submodule 142, clear data is reverted to.Further, during decryption barcode scanning intelligence The unique mark when unique mark of energy terminal must be encryption, if inconsistent, i.e. decryption failure, that is to say, that, it is necessary to Intelligent terminal when being encryption could be decrypted, and other functional terminals can not be decrypted, even if this can ensure that data are stolen or lose, Also it will not be decrypted by other people, cause great loss, security is high, especially the high individual privacy data of level of confidentiality, maintained secrecy It is fabulous.
Each functional module in each embodiment of the invention can be integrated in a processing unit or each Module is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated unit both may be used To be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
After content which will be described is read, it should be apparent to a person skilled in the art that described herein each Planting feature can be realized by method, data handling system or computer program.Therefore, these features can portion use hardware side Formula, all showed by the way of the software or by the way of hardware and software combination.In addition, features described above can also be used The form of the computer program product being stored on one or more computer-readable recording mediums is showed, and this is computer-readable Comprising computer readable program code section or instruction in storage medium, it is stored in storage medium, including some instructions are used To cause a computer equipment(Can be personal computer, server or network equipment etc.)Or processor(English: Processor)Perform the part steps of elder brother's embodiment methods described of the present invention.Can use it is any use it is computer-readable Storage medium, including USB flash disk, hard disk, mobile hard disk, read-only storage(English:Read-Only Memory, referred to as:ROM), with Machine accesses memory(English:Random Access Memory, referred to as:RAM), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is merely illustrative of the preferred embodiments of the present invention, and those skilled in the art know, is not departing from the present invention Spirit and scope in the case of, various changes or equivalent substitution can be carried out to these features and embodiment.In addition, in this hair Under bright teaching, these features and embodiment can be modified to adapt to particular situation and material without departing from this hair Bright spirit and scope.Therefore, the present invention is not limited to the particular embodiment disclosed, and falls with the power of the application Embodiment in sharp claimed range belongs to protection scope of the present invention.

Claims (10)

1. a kind of Novel movable data encryption security system, it is characterised in that including:Processing module(10)And the processing mould Block(10)It is connected for the Key Acquisition Module for generating encryption key(11), for being pre-processed to clear data to be encrypted And the encrypting module to form ciphertext data is encrypted by cryptographic algorithm(12), for storing the encryption key and ciphertext number According to memory module(13), for the ciphertext data to be decrypted by the cryptographic algorithm recover the clear data Deciphering module(14), display module for showing the encryption key and clear data(15).
2. Novel movable data encryption security system according to claim 1, it is characterised in that the Key Acquisition Module (11)Include the acquisition of information submodule of the unique mark for obtaining intelligent terminal(111)And described information acquisition submodule (111)It is connected and the key generation submodule of the encryption key is generated for the unique mark to be changed(112).
3. Novel movable data encryption security system according to claim 2, it is characterised in that the unique mark is intelligence The terminal key of IMEI code and the system distribution of the MAC Address of energy terminal and the terminal key of system distribution or intelligent terminal.
4. Novel movable data encryption security system according to claim 2, it is characterised in that the Key Acquisition Module (11)Also include generating submodule with the key(112)It is connected for the encryption key to be generated into key Quick Response Code and stored In the memory module(13)Quick Response Code generation submodule(113).
5. the Novel movable data encryption security system according to claim 2 or 4, it is characterised in that the deciphering module (14)Including the verification submodule for verifying the unique mark(141)And the verification submodule(141)It is connected for solving Close decryption submodule(142).
6. Novel movable data encryption security system according to claim 5, it is characterised in that the deciphering module(14) Including also including and the verification submodule(141)It is connected for the Quick Response Code identification module for recognizing the key Quick Response Code (143).
7. Novel movable data encryption security system according to claim 1, it is characterised in that the encrypting module(12) Including the pretreatment submodule for being pre-processed to the clear data(121)And the pretreatment submodule(121)Phase It is used in conjunction in the encryption submodule that the pretreated clear data is encrypted(122).
8. Novel movable data encryption security system according to claim 7, it is characterised in that the pretreatment is by institute State clear data and be divided into multiple data blocks.
9. the Novel movable data encryption security system according to claim any one of 1-8, it is characterised in that the password Algorithm is SM9 algorithms.
10. the Novel movable data encryption security system according to claim any one of 1-8, it is characterised in that described close Code algorithm is MD5 algorithms, RSA Algorithm or DES algorithms.
CN201710509739.9A 2017-06-28 2017-06-28 A kind of Novel movable data encryption security system Pending CN107332660A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710509739.9A CN107332660A (en) 2017-06-28 2017-06-28 A kind of Novel movable data encryption security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710509739.9A CN107332660A (en) 2017-06-28 2017-06-28 A kind of Novel movable data encryption security system

Publications (1)

Publication Number Publication Date
CN107332660A true CN107332660A (en) 2017-11-07

Family

ID=60198653

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710509739.9A Pending CN107332660A (en) 2017-06-28 2017-06-28 A kind of Novel movable data encryption security system

Country Status (1)

Country Link
CN (1) CN107332660A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109120589A (en) * 2018-06-30 2019-01-01 北京东方英卡数字信息技术有限公司 A kind of end message guard method and device based on Crypted password
CN111356133A (en) * 2018-12-24 2020-06-30 深圳市广和通无线股份有限公司 Security testing method and device for wireless communication module and computer equipment
CN111597075A (en) * 2020-05-11 2020-08-28 成都艾勃科技有限公司 Method for recovering data from data storage device encrypted by hardware
CN113011542A (en) * 2019-12-21 2021-06-22 深圳市帕尔卡科技有限公司 Encryption method, identification method and identification device of two-dimensional code
CN115150134A (en) * 2022-06-20 2022-10-04 国网山东省电力公司东平县供电公司 Intelligent power grid data encryption transmission method and system
CN115242415A (en) * 2021-04-23 2022-10-25 伊姆西Ip控股有限责任公司 Data encryption method implemented at edge switch, electronic device, and program product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030133576A1 (en) * 2000-10-18 2003-07-17 Frederic Grumiaux Generation of a common encryption key
CN104079404A (en) * 2014-07-07 2014-10-01 北京深思数盾科技有限公司 Sensitive data secure exchange method and system
CN105450620A (en) * 2014-09-30 2016-03-30 阿里巴巴集团控股有限公司 Information processing method and device
CN105681039A (en) * 2016-04-15 2016-06-15 上海上讯信息技术股份有限公司 Method and device for secret key generation and corresponding decryption
US9374222B2 (en) * 2014-09-02 2016-06-21 Alcatel Lucent Secure communication of data between devices
CN106375990A (en) * 2016-10-21 2017-02-01 上海统宁科技发展有限公司 Encryption and decryption system and encryption and decryption method for private data of mobile phone

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030133576A1 (en) * 2000-10-18 2003-07-17 Frederic Grumiaux Generation of a common encryption key
CN104079404A (en) * 2014-07-07 2014-10-01 北京深思数盾科技有限公司 Sensitive data secure exchange method and system
US9374222B2 (en) * 2014-09-02 2016-06-21 Alcatel Lucent Secure communication of data between devices
CN105450620A (en) * 2014-09-30 2016-03-30 阿里巴巴集团控股有限公司 Information processing method and device
CN105681039A (en) * 2016-04-15 2016-06-15 上海上讯信息技术股份有限公司 Method and device for secret key generation and corresponding decryption
CN106375990A (en) * 2016-10-21 2017-02-01 上海统宁科技发展有限公司 Encryption and decryption system and encryption and decryption method for private data of mobile phone

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109120589A (en) * 2018-06-30 2019-01-01 北京东方英卡数字信息技术有限公司 A kind of end message guard method and device based on Crypted password
CN109120589B (en) * 2018-06-30 2021-03-23 北京东方英卡数字信息技术有限公司 Terminal information protection method and device based on encryption password
CN111356133A (en) * 2018-12-24 2020-06-30 深圳市广和通无线股份有限公司 Security testing method and device for wireless communication module and computer equipment
CN111356133B (en) * 2018-12-24 2023-09-08 深圳市广和通无线股份有限公司 Security test method and device for wireless communication module and computer equipment
CN113011542A (en) * 2019-12-21 2021-06-22 深圳市帕尔卡科技有限公司 Encryption method, identification method and identification device of two-dimensional code
CN111597075A (en) * 2020-05-11 2020-08-28 成都艾勃科技有限公司 Method for recovering data from data storage device encrypted by hardware
CN111597075B (en) * 2020-05-11 2023-04-07 成都艾勃科技有限公司 Method for recovering data from data storage device encrypted by hardware
CN115242415A (en) * 2021-04-23 2022-10-25 伊姆西Ip控股有限责任公司 Data encryption method implemented at edge switch, electronic device, and program product
US11936635B2 (en) 2021-04-23 2024-03-19 EMC IP Holding Company LLC Method, electronic device, and program product implemented at an edge switch for data encryption
CN115150134A (en) * 2022-06-20 2022-10-04 国网山东省电力公司东平县供电公司 Intelligent power grid data encryption transmission method and system

Similar Documents

Publication Publication Date Title
CN107332660A (en) A kind of Novel movable data encryption security system
WO2017097041A1 (en) Data transmission method and device
CN1689297B (en) Method of preventing unauthorized distribution and use of electronic keys using a key seed
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
KR20140126787A (en) Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof
TW201428529A (en) A fingerprint authentication system and fingerprint authentication method based on the near field communication (NFC)
CN106713508A (en) Data access method and system based on cloud server
CN103281194B (en) A kind of safety and lightweight RFID ownership transfer method based on Bilinear map
CN109766979A (en) Two-dimensional code generation method, verification method and device
TW201201041A (en) Data security method and system
CN108718233B (en) Encryption method, computer equipment and storage medium
CN104463016B (en) Data safety storing method suitable for IC cards and two-dimension codes
CN113541935B (en) Encryption cloud storage method, system, equipment and terminal supporting key escrow
CN104125064B (en) A kind of dynamic cipher authentication method, client and Verification System
WO2010057423A1 (en) Encryption and decryption method and system for ic card and the reader device
CN109903052A (en) A kind of block chain endorsement method and mobile device
CN110138548A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station cryptographic key negotiation method and system
TWI476629B (en) Data security and security systems and methods
CN107911221B (en) Key management method for secure storage of solid-state disk data
CN200993803Y (en) Internet banking system safety terminal
CN112507296A (en) User login verification method and system based on block chain
CN105871866B (en) A kind of password management system and method based on computer hardware information
CN106789977A (en) A kind of method and system that handset token is realized based on Secret splitting
CN102270182B (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN107689867B (en) Key protection method and system under open environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171107