CN109462608A - Data encryption processing method, apparatus and system - Google Patents

Data encryption processing method, apparatus and system Download PDF

Info

Publication number
CN109462608A
CN109462608A CN201811567130.8A CN201811567130A CN109462608A CN 109462608 A CN109462608 A CN 109462608A CN 201811567130 A CN201811567130 A CN 201811567130A CN 109462608 A CN109462608 A CN 109462608A
Authority
CN
China
Prior art keywords
key
data
cloud
encryption
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811567130.8A
Other languages
Chinese (zh)
Inventor
徐胜兵
范渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN201811567130.8A priority Critical patent/CN109462608A/en
Publication of CN109462608A publication Critical patent/CN109462608A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The present invention provides a kind of data encryption processing methods, apparatus and system;After receiving the data encryption request that user sends, basic key is generated according to preset first algorithm, and encrypt to be-encrypted data using basic key, encrypted data is sent to cloud server, so that cloud server stores encrypted data;According to preset second algorithm and basic key, the sub-key of setting quantity is generated;According to pre-set user password, local key is encrypted, generates and saves local cipher key;According to the user biological characteristic information pre-saved, cloud key is encrypted, generates cloud encryption key, and send it to cloud server, so that cloud server saves cloud encryption key.The present invention is decomposed into two parts in data encryption treatment process, by foundation key, and a part is saved in local cipher, and another part is sent to cloud encrypting storing, improves the safety of key, thus the safety to data encryption.

Description

Data encryption processing method, apparatus and system
Technical field
The present invention relates to technical field of data security, more particularly, to a kind of data encryption processing method, apparatus and system.
Background technique
In cipher system, the safeguard protection of key is the safety issue of most critical, and cryptographic technique is widely used in letter In the numerous areas for ceasing safety, whether symmetry cipher or unsymmetrical key system, safety all rely on key The safety of itself.There are mainly two types of modes for the management of key at present: being taken care of by client and client user;Such as by third party Key Management server trustship.However, both the above mode has drawback, in the first way, no matter key is saved What medium any medium is not stored in perhaps at only remembers that there are still be stolen or by the risk of Brute Force by user.It is right There is large effect to the safety of encryption data when having external attack or internal leakage event occurs in the second way.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of data encryption processing method, apparatus and system, with raising pair The safety of data encryption.
In a first aspect, this method is applied to client, visitor the embodiment of the invention provides a kind of data encryption processing method Family end and cloud server communicate to connect;This method comprises: receiving the data encryption request that user sends;Data encryption request packet Include be-encrypted data;Basic key is generated according to preset first algorithm;Be-encrypted data is encrypted using basic key, is generated Encrypted data is sent to cloud server by encrypted data, so that encrypted data is stored in advance by cloud server The cloud database of foundation;According to preset second algorithm and basic key, the sub-key of setting quantity is generated;Sub-key includes At least one local key and a cloud key;According to pre-set user password, local key is encrypted, is generated local Encryption key, and save local cipher key;According to the biological information of the user pre-saved, cloud key is encrypted, Generate cloud encryption key;Cloud key is sent to cloud server, so that cloud server saves cloud encryption key Database beyond the clouds.
With reference to first aspect, the embodiment of the invention provides the first possible embodiments of first aspect, wherein on State method further include: receive the data download request that user sends;Data download request include user biological information and The storage location of data to be downloaded server beyond the clouds;Believed according to biological information and the biological characteristic of the user pre-saved Breath, judges whether data download request is legal;If legal, the first random number is generated, using the cloud public key pair pre-saved First random number encryption generates the first encrypted random number;First encrypted random number and data download request are sent to cloud clothes Business device, so that cloud server is treated the corresponding cloud encryption key of downloading data and be decrypted, obtain according to data download request To cloud key, the first encrypted random number is decrypted using the corresponding private key of cloud public key pre-saved, it is random to obtain first Number;Cloud key and the corresponding encrypted data of data to be downloaded are encrypted using the first random number, obtain encryption key data, And encryption key data is sent to client;Receive encryption key data;Using the first random number to encryption key data solution It is close, obtain cloud key and encrypted data;After receiving the user password of user's transmission, according to user password and preparatory guarantor The corresponding local cipher key decryption of the encryption data deposited, obtains local key;According to cloud key and local key, to encryption Data deciphering obtains data to be downloaded.
With reference to first aspect or the first possible embodiment of first aspect, the embodiment of the invention provides first party The possible embodiment of second of face, wherein above-mentioned second algorithm includes Shamir privacy sharing algorithm.
The possible embodiment of second with reference to first aspect, the embodiment of the invention provides the third of first aspect Possible embodiment, wherein above-mentioned that data to be downloaded are obtained to encryption data decryption according to cloud key and local key The step of, comprising: according to the second algorithm, cloud key and local key, generate the corresponding basic key of data to be downloaded;Using Basic key decrypts encryption data, obtains data to be downloaded.
Second aspect, the embodiment of the invention provides a kind of data encryption processing method, this method is applied to cloud service Device, cloud server are connect with client communication;This method comprises: the encrypted data that client is sent is received, after encryption Data are stored in the cloud database pre-established;Encrypted data is generated by client according to preset first algorithm substantially close Key is treated the encryption data encryption in data encryption request using basic key and is generated;Data encryption request is sent by user To client;The cloud encryption key that client is sent is received, and cloud encryption key is stored in cloud database;Cloud adds Key encrypts cloud key according to the biological information of the user pre-saved by client and is generated;Cloud key by Client is generated according to preset second algorithm and basic key.
In conjunction with second aspect, the embodiment of the invention provides the first possible embodiments of second aspect, wherein on State method further include: receive the first encrypted random number and data download request that client is sent;First encrypted random number is by visitor After family end judges that data download request is legal, the first random number is generated, and random to first using the cloud public key pre-saved Number is encrypted and is generated;Data download request is sent to client by user;Data download request includes the biological characteristic letter of user The storage location of breath and data to be downloaded server beyond the clouds;According to data download request, the corresponding cloud of downloading data is treated Encryption key is decrypted, and obtains cloud key;It is random to the first encryption using the corresponding private key of cloud public key pre-saved Number decryption, obtains the first random number;Cloud key and the corresponding encrypted data of data to be downloaded are added using the first random number It is close, obtain encryption key data;Encryption key data is sent to client, so that client is using the first random number to encryption Key data decryption, obtains cloud key and encrypted data;After receiving the user password of user's transmission, according to the registered permanent residence The corresponding local cipher key decryption of the encryption data for enabling and pre-saving, obtains local key;According to cloud key and local Key decrypts encryption data, obtains data to be downloaded.
In conjunction with the first possible embodiment of second aspect, the embodiment of the invention provides second of second aspect Possible embodiment, wherein it is above-mentioned according to data download request, it treats the corresponding cloud encryption key of downloading data and is solved It is close, the step of obtaining cloud key, comprising: according to storage location, search the corresponding cloud of data to be downloaded in database beyond the clouds Hold encryption key;Using biometric identification to cloud encryption key decryption, cloud key is obtained.
The third aspect, the embodiment of the invention provides a kind of data encryption processing unit, which is set to client, visitor Family end and cloud server communicate to connect;The device includes: CIPHERING REQUEST receiving module, and the data for receiving user's transmission add Close request;Data encryption request includes be-encrypted data;Basic key generation module, for being generated according to preset first algorithm Basic key;Data encryption module is generated encrypted data, will encrypted for being encrypted using basic key to be-encrypted data Data are sent to cloud server afterwards, so that encrypted data is stored in the cloud database pre-established by cloud server; Sub-key generation module, for generating the sub-key of setting quantity according to preset second algorithm and basic key;Sub-key packet Include at least one local key and a cloud key;Local cipher key encryption block is used for according to pre-set user password, Local key is encrypted, generates local cipher key, and save local cipher key;Cloud cipher key encryption block is used for basis The biological information of the user pre-saved encrypts cloud key, generates cloud encryption key;Cloud key sends mould Block, for cloud key to be sent to cloud server, so that cloud encryption key is saved data beyond the clouds by cloud server Library.
Fourth aspect, the embodiment of the invention provides a kind of data encryption processing unit, which is set to cloud service Device, cloud server are connect with client communication;The device includes: encrypted data memory module, for receiving client hair Encrypted data is stored in the cloud database pre-established by the encrypted data sent;Encrypted data by client according to Preset first algorithm generates basic key, treats the encryption data encryption in data encryption request using basic key and gives birth to At;Data encryption request is sent to client by user;Cloud encryption key preserving module, for saving cloud encryption key Database beyond the clouds;Cloud encryption key adds cloud key according to the biological information of the user pre-saved by client It is close and generate;Cloud key is generated by client according to preset second algorithm and basic key.
5th aspect, the embodiment of the invention provides a kind of data encryption processing systems, including client and cloud service Device;Device described in the above-mentioned third aspect is set to client;Cloud server is set to described in above-mentioned fourth aspect.
The embodiment of the present invention bring it is following the utility model has the advantages that
The embodiment of the invention provides a kind of data encryption processing methods, apparatus and system;Receive the data that user sends After CIPHERING REQUEST, basic key is generated according to preset first algorithm, and encrypt to be-encrypted data using basic key, generated Encrypted data is sent to cloud server by encrypted data, so that encrypted data is stored in advance by cloud server The cloud database of foundation;According to preset second algorithm and basic key, the sub-key of setting quantity is generated;Sub-key includes At least one local key and a cloud key;According to pre-set user password, local key is encrypted, is generated local Encryption key, and save local cipher key;According to the biological information of the user pre-saved, cloud key is encrypted, Cloud encryption key is generated, and cloud key is sent to cloud server, so that cloud server protects cloud encryption key There are cloud databases.Which encrypts be-encrypted data using foundation key, and it is close that foundation key is decomposed into two parts Key, a part are sent to cloud and carry out encrypting storing in locally progress encrypting storing, another part, improve the safety of key Property, thus the safety to data encryption.
Other features and advantages of the present invention will illustrate in the following description, alternatively, Partial Feature and advantage can be with Deduce from specification or unambiguously determine, or by implementing above-mentioned technology of the invention it can be learnt that.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, better embodiment is cited below particularly, and match Appended attached drawing is closed, is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of data encryption processing method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of data downloading process in a kind of data encryption processing method provided in an embodiment of the present invention;
Fig. 3 is the flow chart of another data encryption processing method provided in an embodiment of the present invention;
Fig. 4 is another data encryption processing method provided in an embodiment of the present invention, the flow chart of data downloading process;
Fig. 5 is that a kind of Shamir secret sharing scheme combination biological characteristic that is based on provided in an embodiment of the present invention utilizes multiterminal In the method for managing encrypted key, the flow chart of file upload procedure is encrypted;
Fig. 6 is that a kind of Shamir secret sharing scheme combination biological characteristic that is based on provided in an embodiment of the present invention utilizes multiterminal In the method for managing encrypted key, the flow chart of file download process;
Fig. 7 is a kind of structural schematic diagram of data encryption processing unit provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram of another data encryption processing unit provided in an embodiment of the present invention;
Fig. 9 is a kind of structural schematic diagram of data encryption processing system provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, shall fall within the protection scope of the present invention.
Currently, the safety of existing data encryption processing mode is poor, it is based on this, the embodiment of the invention provides one kind Data encryption processing method, apparatus and system, can be applied to.
For convenient for understanding the present embodiment, first to a kind of data encryption processing side disclosed in the embodiment of the present invention Method describes in detail.
A kind of flow chart of data encryption processing method shown in Figure 1, this method be applied to client, client with Cloud server communication connection;Method includes the following steps:
Step S100 receives the data encryption request that user sends;Data encryption request includes be-encrypted data;Specifically Ground, user can send client for be-encrypted data after logging in client.
Step S102 generates basic key according to preset first algorithm;Specifically, there are many algorithms for generating key; Key is a kind of parameter, it is the parameter inputted in being converted to ciphertext or the algorithm for converting ciphertext into plaintext in plain text.Key It is divided into symmetric key and unsymmetrical key, can be accordingly generated using symmetric encipherment algorithm and rivest, shamir, adelman corresponding Key.
Step S104 encrypts be-encrypted data using basic key, generates encrypted data, encrypted data is sent To cloud server, so that encrypted data is stored in the cloud database pre-established by cloud server.
Specifically, basic key is inputted during encrypting to be-encrypted data as parameter, is obtained by encryption Encrypted data;Client will be sent to cloud server by the encrypted data of encryption;Cloud server is after the encryption Data distribute memory space, and encrypted data is stored in the cloud database pre-established.
Step S106 generates the sub-key of setting quantity according to preset second algorithm and basic key;Sub-key includes At least one local key and a cloud key.
Specifically, above-mentioned second algorithm is for decomposing basic key with certain format, which can be with For Shamir privacy sharing algorithm scheduling algorithm;Above-mentioned setting quantity is at least 2;Sub-key a part of generation is for being stored in this The positions such as ground or U-shield, another part is for being stored in cloud server.
Step S108 encrypts local key according to pre-set user password, generates local cipher key, and protect Deposit local cipher key.
Specifically, above-mentioned user password can be stored in the multidigit letter of client, number for user in registration process Deng, or later period input;Local key is encrypted by the user password, obtains local cipher key, and will It is saved to local server or output file, so that user saves local cipher key into the memories such as U-shield.
Step S110 encrypts cloud key according to the biological information of the user pre-saved, generates cloud encryption Key;Specifically, above-mentioned biological information can be input to client when registration for user;Biological characteristic letter Breath can be fingerprint, vocal print, facial characteristics etc..
Cloud key is sent to cloud server by step S112, so as to which cloud encryption key is saved data beyond the clouds Library.
The embodiment of the invention provides a kind of data encryption processing methods;After receiving the data encryption request that user sends, Basic key is generated according to preset first algorithm, and be-encrypted data is encrypted using basic key, generates encrypted data, Encrypted data is sent to cloud server, so that encrypted data is stored in the cloud number pre-established by cloud server According to library;According to preset second algorithm and basic key, the sub-key of setting quantity is generated;The registered permanent residence is used according to pre-set It enables, local key is encrypted, generate local cipher key, and save local cipher key;According to the life of the user pre-saved Object characteristic information encrypts cloud key, generates cloud encryption key, and cloud key is sent to cloud server, so that Cloud encryption key is stored in cloud database by cloud server.This method encrypts be-encrypted data using foundation key, And foundation key is decomposed into two parts key, for a part in locally progress encrypting storing, another part is sent to cloud progress Encrypting storing improves the safety of key, thus the safety to data encryption.
After carrying out encryption storage to data using the above method, when user needs to be downloaded stored data When, it can specifically be realized by following steps, flow chart is as shown in Figure 2:
Step S200 receives the data download request that user sends;Data download request includes the biological characteristic letter of user The storage location of breath and data to be downloaded server beyond the clouds;Specifically, user can be according to the biological characteristic of Client-Prompt Type inputs corresponding biological information;The biological information and the biological information pair for being pre-stored in client It answers.
Step S202 judges under data according to biological information and the biological information of the user pre-saved Whether legal carry request;Specifically, the biological information of user's input and the biological information pre-saved are compared, if The two is consistent, it is determined that data download request is legal.
Step S204 is generated the first random number, is added using the cloud public key pre-saved to the first random number if legal It is close, generate the first encrypted random number;Specifically, above-mentioned first random number generates at random;The cloud saved corresponding to client Hold public key, the in store private key of cloud server;The file encrypted using cloud public key as key can will encrypt file with private key Decryption.
First encrypted random number and data download request are sent to cloud server, so that cloud service by step S206 Device is treated the corresponding cloud encryption key of downloading data and is decrypted, cloud key is obtained, using pre- according to data download request The corresponding private key of cloud public key first saved decrypts the first encrypted random number, obtains the first random number;Using the first random number To cloud key and data to be downloaded corresponding encrypted data encryption, encryption key data is obtained, and by encryption key data It is sent to client.
Specifically, cloud server can determine number to be downloaded after receiving data download request according to storage location According to stubborn and reluctant encryption file and cloud encryption key, further according to user biological information to cloud encryption key decryption, obtain To cloud key;Next it is decrypted to the first encrypted random number, obtains the first random number;Can will cloud key and encryption after Data merge into a data with certain format, then using the first random number as encryption key to number after cloud key and encryption According to symmetric cryptography is carried out, encryption key data is obtained.
Step S208 receives encryption key data.
Step S210 decrypts encryption key data using the first random number, obtains cloud key and encrypted data;By Symmetric cryptography is used in cloud server, therefore client can be carried out using the first random number as key pair encryption key data Decryption, obtains cloud key and the corresponding encrypted data of file to be downloaded.
Step S212, after receiving the user password of user's transmission, according to user password and the encryption number pre-saved It is decrypted according to corresponding local cipher key, obtains local key;Specifically, the execution sequence of step S210 and step 212 can be with It exchanges;After receiving user password, local cipher key is decrypted using user password, if the user password with it is right The user password of local cipher key encryption is identical, then successful decryption, obtains local key.
Step S214 decrypts encryption data, obtains data to be downloaded according to cloud key and local key;Specifically, The corresponding basic key of data to be downloaded can be generated according to the second algorithm, cloud key and local key;Using basic key Encryption data is decrypted, data to be downloaded are obtained.
This method respectively adds cloud using biological information and user password when user carries out data downloading Key and local cipher key are decrypted, and are finally obtained basic key and are treated downloading data and are decrypted;This method mentions The high safety of data decrypting process, to improve the safety of data storage.
The embodiment of the invention also provides another data encryption processing method, flow chart is as shown in Figure 3;This method is answered For cloud server, cloud server is connect with client communication;Method includes the following steps:
Step S300 receives the encrypted data that client is sent, encrypted data is stored in the cloud pre-established Database;Specifically, encrypted data generates basic key according to preset first algorithm by client, using basic key pair Encryption data in pending data CIPHERING REQUEST is encrypted and is generated;Data encryption request is sent to client by user.
Step S302 receives the cloud encryption key that client is sent, and cloud encryption key is saved data beyond the clouds Library;Cloud encryption key encrypts cloud key according to the biological information of the user pre-saved by client and is generated; Cloud key is generated by client according to preset second algorithm and basic key;Specifically, the second algorithm is for will be basic Key is decomposed with certain format, which can be Shamir privacy sharing algorithm scheduling algorithm;The cloud key It can be a part of basic key.
Another kind data encryption processing method provided in an embodiment of the present invention adds with a kind of data provided by the above embodiment Close processing method technical characteristic having the same,.
After carrying out encryption storage to data using the above method, when user needs to be downloaded stored data When, it can specifically be realized by following steps, flow chart is as shown in Figure 2:
Step S400 receives the first encrypted random number and data download request that client is sent;Specifically, the first encryption After random number judges that data download request is legal by client, the first random number is generated, and using the cloud public key pre-saved First random number encryption is generated;Data download request is sent to client by user;Data download request includes user's The storage location of biological information and data to be downloaded server beyond the clouds.
Step S402 treats the corresponding cloud encryption key of downloading data and is decrypted, obtain according to data download request Cloud key;Specifically, it is close can be searched according to storage location beyond the clouds for the corresponding cloud encryption of data to be downloaded in database Key;Using biometric identification to cloud encryption key decryption, cloud key is obtained.
Step S404 decrypts the first encrypted random number using the corresponding private key of cloud public key pre-saved, obtains One random number.
Step S406 encrypts cloud key and the corresponding encrypted data of data to be downloaded using the first random number, obtains To encryption key data.
Encryption key data is sent to client by step S408, so that client is close to encrypting using the first random number Key data deciphering obtains cloud key and encrypted data;After receiving the user password of user's transmission, according to user password And the corresponding local cipher key decryption of encryption data pre-saved, obtain local key;It is close according to cloud key and local Key decrypts encryption data, obtains data to be downloaded.
This method respectively adds cloud using biological information and user password when user carries out data downloading Key and local cipher key are decrypted, and are finally obtained basic key and are treated downloading data and are decrypted;This method mentions The high safety of data decrypting process, to improve the safety of data storage.
It is managing encrypted using multiterminal based on Shamir secret sharing scheme combination biological characteristic that the present invention also provides one kind The method of key;Wherein, key is a kind of parameter, it is in being converted to ciphertext or the algorithm for converting ciphertext into plaintext in plain text The parameter of input.Key is divided into symmetric key and unsymmetrical key;What this method was applied to that client and server end form is System has provided safely mainly for client under key management scene or the insincere problem of server end for user key The solution of effect.
With the rapid development of the emerging internets technology such as Internet of Things, cloud computing and big data, information security, which has become, to be worked as One pressing issues of modern China's information driving society.Nowadays, user gets used to a large amount of personal data to store to cloud, and Data are obtained by various equipment when needed.But the problems such as safety existing for cloud and secret protection, causes Cloud will be uploaded to again after individual privacy data encryption by generally selecting user, be read before data in terminal deciphering data.This A process needs a suitable key management method.However, traditional key management method has certain limitation, tradition The safety of cryptography places one's entire reliance upon the safety of encryption key, and the not no inevitable connection of encryption key and legitimate user System.Accordingly, upon encryption key is lost or is stolen, encryption system will be unable to guarantee the safety of user identity.And biology is special The fast development of sign authentication techniques is that the key management under mobile cloud scene brings a completely new solution;It utilizes use The biological feature encryption key at family, not only easy to carry, not easy to lose but also user's uniqueness obtains effective guarantee.
The method of existing managing encrypted key faces following technical problem:
(1) after dispersing, cipher key processes complexity is obtained, multiple media is needed to be brought together.
(2) encryption is also possible that and is cracked, and cannot determine user identity by biological characteristic.
(3) client and server-side are all incredible, but legacy system all assumes that and comes on the basis of one end is believable Save key.
For these disadvantages, method provided in an embodiment of the present invention has carried out following improvement:
(1) key has all deposited part of key in client and server-side, realizes fraction, increases safety, increase close The difficulty that key is lost.
(2) certification for combining biological characteristic, by client, the feature binding that server-side and user itself have exists Together, break through wherein any one in addition cannot both obtain decruption key.And realize the uniqueness of certification.
(3) two-way authentication is realized using biological characteristic and certificate when downloading.
Specifically, this method includes the upload of encryption file and two parts of file download;Wherein, file upload procedure is encrypted Flow chart as shown in figure 5, specific as follows:
(1) cloud certificate (information such as cloud public key, Encryption Algorithm) are saved in client;
(2) client generates the encryption key K (being equivalent to above-mentioned foundation key) of file M at random;
(3) carrying out symmetric cryptography to classified papers M by key K is that C is uploaded to cloud;
(4) being divided K using Shamir privacy sharing is that k1 (being equivalent to above-mentioned local key) and k2 (are equivalent to above-mentioned cloud Key);
(5) k1 is encrypted as C1 using user password and is saved in the equipment such as local or U-shield;
(6) k2 is that C2 is uploaded to cloud using biometric templates feature encryption.
The flow chart of file download decrypting process is as shown in fig. 6, specific as follows:
(1) user carries out certification identification (such as recognition of face, fingerprint) by biological characteristic, by that can request text after certification Part is downloaded, otherwise turn-off request;
(2) after by certification, cloud decrypts to obtain k2 using biological characteristic;
(3) client generates random generation number S;
It (4) the use of cloud public key encryption S is that C3 is sent to cloud;
(5) cloud receives and decrypts random number S by private key after C3;
(6) cloud is sent to client using S encryption (C, K2);
(7) client decrypts to obtain k2 and C using random number S;
(8) user goes out k1 using password decryption;
(9) client obtains M using k1 and k2 decryption C.
Method of the invention splits key, uses password and biological feature encryption respectively, is stored in different ends, ties simultaneously It closes biological characteristic and certificate carries out two-way authentication, high degree increases the difficulty for stealing key, greatly reduces key loss Risk.
The embodiment of the invention provides a kind of data encryption processing unit, structural schematic diagram is as shown in Figure 7;The device is set It is placed in client, client and cloud server communicate to connect;The device includes: CIPHERING REQUEST receiving module 700, for receiving The data encryption request that user sends;Data encryption request includes be-encrypted data;Basic key generation module 702 is used for root Basic key is generated according to preset first algorithm;Data encryption module 704, for being added using basic key to be-encrypted data It is close, encrypted data is generated, encrypted data is sent to cloud server, so that cloud server stores encrypted data In the cloud database pre-established;Sub-key generation module 706, for according to preset second algorithm and basic key, life At the sub-key of setting quantity;Sub-key includes at least one local key and a cloud key;Local cipher key encryption block 708, for being encrypted to local key according to pre-set user password, local cipher key is generated, and save local cipher Key;Cloud cipher key encryption block 710 encrypts cloud key for the biological information according to the user pre-saved, Generate cloud encryption key;Cloud key sending module 712, for cloud key to be sent to cloud server, so that cloud Cloud encryption key is stored in cloud database by server.
A kind of data encryption processing unit provided in an embodiment of the present invention, with a kind of data encryption provided by the above embodiment Processing method technical characteristic having the same reaches identical technical effect so also can solve identical technical problem.
The embodiment of the invention also provides another data encryption processing unit, structural schematic diagram is as shown in Figure 8;The dress It installs and is placed in cloud server, cloud server is connect with client communication;The device includes: encrypted data memory module 800, for receiving the encrypted data of client transmission, encrypted data is stored in the cloud database pre-established;Add Data generate basic key according to preset first algorithm by client after close, are treated in data encryption request using basic key Encryption data encryption and generate;Data encryption request is sent to client by user;Cloud encryption key preserving module 802, For cloud encryption key to be stored in cloud database;Cloud encryption key is by client according to the life of the user pre-saved Object characteristic information encrypts cloud key and generates;Cloud key by client according to preset second algorithm and basic key and It generates.
Another kind data encryption processing unit provided in an embodiment of the present invention, with another data provided by the above embodiment Cipher processing method technical characteristic having the same reaches identical technical effect so also can solve identical technical problem.
Corresponding to above-described embodiment, the embodiment of the invention provides a kind of data encryption processing system, structural schematic diagrams As shown in Figure 9;The system includes client 90 and cloud server 91;A kind of above-mentioned data encryption processing unit is set to client End;Above-mentioned another kind data encryption processing unit is set to cloud server.
The computer program product of data encryption processing method, device and system provided by the embodiment of the present invention, packet The computer readable storage medium for storing program code is included, the instruction that said program code includes can be used for executing previous methods Method as described in the examples, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description And/or the specific work process of device, it can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition Concrete meaning in invention.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical", The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation, It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ", " third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
Finally, it should be noted that embodiment described above, only a specific embodiment of the invention, to illustrate the present invention Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, those skilled in the art should understand that: anyone skilled in the art In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection of the invention Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a kind of data encryption processing method, which is characterized in that the method is applied to client, and the client and cloud take Business device communication connection;The described method includes:
Receive the data encryption request that user sends;The data encryption request includes be-encrypted data;
Basic key is generated according to preset first algorithm;
The be-encrypted data is encrypted using the basic key, encrypted data is generated, the encrypted data is sent To the cloud server, so that the encrypted data is stored in the cloud data pre-established by the cloud server Library;
According to preset second algorithm and the basic key, the sub-key of setting quantity is generated;The sub-key includes at least One local key and a cloud key;
According to pre-set user password, the local key is encrypted, generates local cipher key, and save the local Encryption key;
According to the biological information of the user pre-saved, the cloud key is encrypted, generates cloud encryption key;
The cloud key is sent to the cloud server, so that the cloud server protects the cloud encryption key There are the cloud databases.
2. the method according to claim 1, wherein the method also includes:
Receive the data download request that user sends;The data download request include the user biological information and to Storage location of the downloading data in the cloud server;
According to the biological information and the biological information of the user pre-saved, judge that the data downloading is asked Seeking Truth is no legal;
If legal, the first random number is generated, using the cloud public key pre-saved to first random number encryption, generates the One encrypted random number;
First encrypted random number and the data download request are sent to the cloud server, so that the cloud server According to the data download request, the corresponding cloud encryption key of the data to be downloaded is decrypted, the cloud is obtained Key decrypts first encrypted random number using the corresponding private key of the cloud public key pre-saved, obtains described One random number;The cloud key and the corresponding encrypted data of the data to be downloaded are added using first random number It is close, encryption key data is obtained, and the encryption key data is sent to the client;
Receive the encryption key data;
The encryption key data is decrypted using first random number, obtains the cloud key and encrypted data;
It is corresponding according to the user password and the encryption data pre-saved after receiving the user password of user's transmission Local cipher key decryption, obtain the local key;
According to the cloud key and the local key, the encryption data is decrypted, the data to be downloaded are obtained.
3. according to method of any of claims 1 or 2, which is characterized in that second algorithm includes Shamir privacy sharing algorithm.
4. benefit require 3 described in method, which is characterized in that it is described according to the cloud key and the local key, to described The step of encryption data is decrypted, and the data to be downloaded are obtained, comprising:
According to second algorithm, the cloud key and the local key, it is corresponding basic to generate the data to be downloaded Key;
The encryption data is decrypted using the basic key, obtains the data to be downloaded.
5. a kind of data encryption processing method, which is characterized in that the method is applied to cloud server, the cloud server It is connect with client communication;The described method includes:
The encrypted data that the client is sent is received, the encrypted data is stored in the cloud data pre-established Library;The encrypted data generates basic key according to preset first algorithm by the client, using the basic key It treats the encryption data encryption in data encryption request and generates;The data encryption request is sent to the client by user End;
The cloud encryption key that the client is sent is received, and the cloud encryption key is stored in the cloud data Library;The cloud encryption key is by the client according to the biological information of the user pre-saved to the cloud Key is encrypted and is generated;The cloud key is given birth to by the client according to preset second algorithm and the basic key At.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
Receive the first encrypted random number and data download request that the client is sent;First encrypted random number is by client After end judge that the data download request is legal, the first random number is generated, and the cloud public key that pre-saves of use is to described the One random number encryption and generate;The data download request is sent to the client by the user;The data downloading is asked Ask biological information including the user and data to be downloaded in the storage location of the cloud server;
According to the data download request, the corresponding cloud encryption key of the data to be downloaded is decrypted, cloud is obtained Key;
First encrypted random number is decrypted using the corresponding private key of the cloud public key pre-saved, obtains described first Random number;
The cloud key and the corresponding encrypted data of the data to be downloaded are encrypted using first random number, obtained Encryption key data;
The encryption key data is sent to the client, so that the client is using first random number to described Encryption key data decryption, obtains the cloud key and encrypted data;After receiving the user password of user's transmission, root According to the user password and the corresponding local cipher key decryption of the encryption data pre-saved, local key is obtained;Root According to the cloud key and the local key, the encryption data is decrypted, the data to be downloaded are obtained.
7. according to the method described in claim 6, it is characterized in that, described according to the data download request, to described under Carry the step of corresponding cloud encryption key of data is decrypted, obtains the cloud key, comprising:
According to the storage location, the corresponding cloud encryption key of the data to be downloaded is searched in the cloud database;
Using the biometric identification to the cloud encryption key decryption, the cloud key is obtained.
8. a kind of data encryption processing unit, which is characterized in that described device is set to client, and the client and cloud take Business device communication connection;Described device includes:
CIPHERING REQUEST receiving module, for receiving the data encryption request of user's transmission;The data encryption request includes to be added Ciphertext data;
Basic key generation module, for generating basic key according to preset first algorithm;
Data encryption module generates encrypted data, by institute for encrypting using the basic key to the be-encrypted data It states encrypted data and is sent to the cloud server, so that the encrypted data is stored in advance by the cloud server The cloud database of foundation;
Sub-key generation module, for generating the sub-key of setting quantity according to preset second algorithm and the basic key; The sub-key includes at least one local key and a cloud key;
Local cipher key encryption block is used to encrypt the local key according to pre-set user password, generate local add Key, and save the local cipher key;
Cloud cipher key encryption block, for the biological information according to the user pre-saved, to the cloud key Encryption generates cloud encryption key;
Cloud key sending module, for the cloud key to be sent to the cloud server, so that the cloud service The cloud encryption key is stored in the cloud database by device.
9. a kind of data encryption processing unit, which is characterized in that described device is set to cloud server, the cloud server It is connect with client communication;Described device includes:
Encrypted data memory module, the encrypted data sent for receiving the client, the encrypted data is deposited Storage is in the cloud database pre-established;The encrypted data is generated by the client according to preset first algorithm basic Key is treated the encryption data encryption in data encryption request using the basic key and is generated;The data encryption request The client is sent to by user;
Cloud encryption key preserving module, for the cloud encryption key to be stored in the cloud database;The cloud Encryption key the cloud key is encrypted according to the biological information of the user pre-saved by the client and It generates;The cloud key is generated by the client according to preset second algorithm and the basic key.
10. a kind of data encryption processing system, which is characterized in that including client and cloud server;It is according to any one of claims 8 Device is set to the client;Device as claimed in claim 9 is set to the cloud server.
CN201811567130.8A 2018-12-19 2018-12-19 Data encryption processing method, apparatus and system Pending CN109462608A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811567130.8A CN109462608A (en) 2018-12-19 2018-12-19 Data encryption processing method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811567130.8A CN109462608A (en) 2018-12-19 2018-12-19 Data encryption processing method, apparatus and system

Publications (1)

Publication Number Publication Date
CN109462608A true CN109462608A (en) 2019-03-12

Family

ID=65614091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811567130.8A Pending CN109462608A (en) 2018-12-19 2018-12-19 Data encryption processing method, apparatus and system

Country Status (1)

Country Link
CN (1) CN109462608A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110400223A (en) * 2019-07-26 2019-11-01 中国工商银行股份有限公司 Interactive log based on block chain encrypts, transfers, Anti-theft method, apparatus
CN110516460A (en) * 2019-08-29 2019-11-29 重庆市筑智建信息技术有限公司 Encryption security method and system for BIM data
CN111709027A (en) * 2020-06-22 2020-09-25 湖南大学 Data storage safety management method
CN111756741A (en) * 2020-06-24 2020-10-09 安徽听见科技有限公司 Data transmission method, device, equipment and storage medium
CN113517981A (en) * 2021-04-28 2021-10-19 河南中烟工业有限责任公司 Key management method, code version management method and device
CN113765927A (en) * 2021-09-09 2021-12-07 图易(常熟)信息技术有限公司 Method and system for encrypting network copyright of cloud uploaded content
WO2022078073A1 (en) * 2020-10-12 2022-04-21 Kyndryl, Inc. Ultrasound split key transmission for enhanced security

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083556A (en) * 2007-07-02 2007-12-05 蔡水平 Region based layered wireless information publishing, searching and communicating application system
CN101631305A (en) * 2009-07-28 2010-01-20 交通银行股份有限公司 Encryption method and system
CN103780609A (en) * 2014-01-14 2014-05-07 北京淦蓝润和信息技术有限公司 Cloud data processing method and device and cloud data security gateway
CN103812927A (en) * 2012-11-14 2014-05-21 书生云服务公司 Storage method
CN105227566A (en) * 2015-10-16 2016-01-06 中国联合网络通信集团有限公司 Cipher key processing method, key handling device and key handling system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083556A (en) * 2007-07-02 2007-12-05 蔡水平 Region based layered wireless information publishing, searching and communicating application system
CN101631305A (en) * 2009-07-28 2010-01-20 交通银行股份有限公司 Encryption method and system
CN103812927A (en) * 2012-11-14 2014-05-21 书生云服务公司 Storage method
CN103780609A (en) * 2014-01-14 2014-05-07 北京淦蓝润和信息技术有限公司 Cloud data processing method and device and cloud data security gateway
CN105227566A (en) * 2015-10-16 2016-01-06 中国联合网络通信集团有限公司 Cipher key processing method, key handling device and key handling system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110400223A (en) * 2019-07-26 2019-11-01 中国工商银行股份有限公司 Interactive log based on block chain encrypts, transfers, Anti-theft method, apparatus
CN110516460A (en) * 2019-08-29 2019-11-29 重庆市筑智建信息技术有限公司 Encryption security method and system for BIM data
CN110516460B (en) * 2019-08-29 2021-05-14 重庆市筑智建信息技术有限公司 Encryption security method and system for BIM data
CN111709027A (en) * 2020-06-22 2020-09-25 湖南大学 Data storage safety management method
CN111756741A (en) * 2020-06-24 2020-10-09 安徽听见科技有限公司 Data transmission method, device, equipment and storage medium
WO2022078073A1 (en) * 2020-10-12 2022-04-21 Kyndryl, Inc. Ultrasound split key transmission for enhanced security
GB2611694A (en) * 2020-10-12 2023-04-12 Kyndryl Inc Ultrasound split key transmission for enhanced security
CN113517981A (en) * 2021-04-28 2021-10-19 河南中烟工业有限责任公司 Key management method, code version management method and device
CN113517981B (en) * 2021-04-28 2023-05-23 河南中烟工业有限责任公司 Key management method, code version management method and device
CN113765927A (en) * 2021-09-09 2021-12-07 图易(常熟)信息技术有限公司 Method and system for encrypting network copyright of cloud uploaded content

Similar Documents

Publication Publication Date Title
CN109462608A (en) Data encryption processing method, apparatus and system
CN109495274B (en) Decentralized intelligent lock electronic key distribution method and system
CN104486315B (en) A kind of revocable key outsourcing decryption method based on contents attribute
CN1939028B (en) Accessing protected data on network storage from multiple devices
CN109951513B (en) Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card
CN103124269A (en) Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment
CN103957109A (en) Cloud data privacy protection security re-encryption method
CN108989325A (en) Encryption communication method, apparatus and system
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN101640590A (en) Method for obtaining a secret key for identifying cryptographic algorithm and cryptographic center thereof
CN107094138B (en) A kind of smart home safe communication system and communication means
CN109194474A (en) A kind of data transmission method and device
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
CN114036539A (en) Safety auditable Internet of things data sharing system and method based on block chain
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN110224816A (en) Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number
CN108400862A (en) A kind of intelligent power trusted end-user data fusion encryption method
CN103354637B (en) A kind of internet-of-things terminal M2M communication encrypting method
Almuzaini et al. Key aggregation cryptosystem and double encryption method for cloud-based intelligent machine learning techniques-based health monitoring systems
CN114697042A (en) Block chain-based Internet of things security data sharing proxy re-encryption method
CN102752112A (en) Authority control method and device based on signed message 1 (SM1)/SM2 algorithm
CN111245609B (en) Secret sharing and random number based quantum secret communication key distribution and negotiation system and method thereof
CN114079921B (en) Session key generation method, anchor point function network element and system
CN107104792B (en) Portable mobile password management system and management method thereof
CN109949457B (en) Intelligent door lock control method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190312