CN109495497A - Based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method - Google Patents
Based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method Download PDFInfo
- Publication number
- CN109495497A CN109495497A CN201811512634.XA CN201811512634A CN109495497A CN 109495497 A CN109495497 A CN 109495497A CN 201811512634 A CN201811512634 A CN 201811512634A CN 109495497 A CN109495497 A CN 109495497A
- Authority
- CN
- China
- Prior art keywords
- key
- encryption
- cryptographic algorithm
- management
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Abstract
The invention belongs to Internet of Things technical field of information processing, disclose a kind of based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method;Based on the patients' privacy protection under the close intelligent medical of state, user's medical treatment privacy information is not stolen in shared procedure by rogue program;SM2, SM4 encryption will be carried out to the information of transmission;The user's medical treatment privacy information stored on the server of healthcare providers will use domestic secret algorithm SM4 encryption storage;Healthcare providers will carry out degrees of comparison evaluation to it by authoritative institution before addition system;Its degrees of comparison will be updated in real time by service quality after online;File protecting system and key management system are using domestic cryptographic algorithm SM4 progress encryption and decryption.The present invention protects the individual privacy information of patient, reduces the risk of privacy leakage, protects the individual interest of patient.
Description
Technical field
The invention belongs to Internet of Things technical field of information processing, more particularly to it is a kind of based on the management of credit worthiness dynamic and domestic
Cryptographic algorithm privacy information encrypted transmission method.
Background technique
Currently, the prior art commonly used in the trade, which is such that Internet of Things refers to, to invest object for various information sensing devices
On part, information sensing device is combined with internet, forms the huge of interconnection between object, computer and people and information sharing
Big network then realizes the intelligence of article.With the development of technology of Internet of things, all trades and professions all make full use of information in society
Technology, medical industry also include that wherein, Internet of Things has pushed the Informatization Development of health and medical service, are continuously improving medical mistake
Journey improves quality of medical care, ensures patient safety, realizes tele-medicine, health care is provided for special population, reinforces medical instrument
Management and prophylactic agent etc. play a significant role.The network architecture of intelligent medical based on Internet of Things, majority design does not have
In view of the risk of patients' privacy leakage, the patient information that hardware device is collected into carries out plaintext transmission in a network.It is shared
Huge privacy leakage risk will be present in medical information.For entire medical industry, the leakage of medical data will be brought
Huge economic cost.This programme solves excessively shared patients' privacy in intelligent medical, patients' privacy information plaintext transmission and trouble
Person's private data is tampered.This programme can be effectively protected patients' privacy and not stolen by undesirable as commercial use, prevent
Only patients' privacy information is tampered inconvenient to patient's medical treatment bring.National Password Management office has issued SM2 in December, 2010
Ellipse curve public key cipher algorithm.The algorithm mainly includes three parts: Digital Signature Algorithm, Key Exchange Protocol, public key encryption
Algorithm.Digital Signature Algorithm includes digital signature generating algorithm and verification algorithm, can satisfy the authentication in cipher application
With the requirement of data integrity, authenticity.If message to be signed is M, in order to obtain the digital signature (r, s) of message M, as
The user of signer should perform the steps of (1) and set(ZAMark, part elliptical are distinguished about user A
The Hash Value of curve system parameter and user's A public key);(2) it calculates(HvIt is v bit for eap-message digest length
Cryptographic Hash function);(3) random number k ∈ [1, n-1] is generated with randomizer;(4) elliptic curve point (x is calculated1, y1)
=[k] G;(5) r=(e+x is calculated1) modn, C is returned if r=0 or r+k=n;(6) s=((1+dA) is calculated-1·(k-r·
dA)) modn, C (d is returned if s=0AFor the private key of user A);(7) signature of message M is (r, s).SM4 algorithm full name is SM4
Block cipher is No. 23 password professional standard number announced in announcing of publication national Password Management office in March, 2012
For (standard No. is GM/T 0002-2012), the publication of in August, 2016 is known as national standard (standard No. GB/T32907-2016).
SM4 algorithm is a grouping symmetric key algorithm, and plaintext, key, ciphertext are all 16 bytes, and encryption and decryption keys are identical.Add
Close algorithm and key schedule all use 32 wheel nonlinear iteration structures.Decrypting process is similar to the structure of ciphering process, only
It is the opposite using sequence of round key.1) enciphering and deciphering algorithm defines antitone mapping R are as follows: R (A0, A1, A2, A3)=(A3, A2, A1,
A0),I=0,1,2,3 set in plain text input asCiphertext exportsRound key isI=0,1,2 ..., 31.Then the encryption of this algorithm becomes
It is changed to:
(Y0, Y1, Y2, Y3)=R (X32, X33, X34, X35)=(X35, X34, X33, X32);The decryption transformation of this algorithm and encryption
Mapped structure is identical, and different is only round key using sequence.Round key uses sequence when encryption are as follows: (rk0, rk1...,
rk31);Round key uses sequence when decryption are as follows: (rk31, rk30..., rk0)。
In conclusion problem of the existing technology is: currently, intelligent medical just rapidly develops, using secure context
Protection there is also larger problem, since the object of intelligent medical connection is mainly patient and doctor, for both sides' privacy
Seem particularly significant, safety problem becomes the most important thing in Internet of Things.
(1) there are huge disclosure risks for privacy information when seeing a doctor on carrying out line by present patient, to patient's
Normal life causes huge negative effect.
(2) patient medical privacy information has huge commercial value, it is thus possible to be stolen as illegal business use
Patient personal interests are caused to encroach on way.
Solve the difficulty and meaning of above-mentioned technical problem:
The system that the present invention designs a message, file Hybrid Encryption transmission and credit worthiness dynamic management, to privacy of user
It encrypts, the privacy of user is enabled to obtain appropriate protection.Meanwhile the present invention uses the state of China's independent research
Produce cryptographic algorithm.
Summary of the invention
In view of the problems of the existing technology, the present invention provides one kind is calculated based on the management of credit worthiness dynamic and domestic password
Method privacy information encrypted transmission method.
The invention is realized in this way a kind of passed based on the management of credit worthiness dynamic and the encryption of domestic cryptographic algorithm privacy information
Transmission method, the intelligence close based on state based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method
Patients' privacy protection under medical treatment, user's medical treatment privacy information are not stolen in shared procedure by rogue program;It will be to transmission
Information carry out SM2, SM4 encryption;The user's medical treatment privacy information stored on the server of healthcare providers will make
It is encrypted and is stored with domestic secret algorithm SM4;Healthcare providers will carry out prestige to it by authoritative institution before addition system
Ranking;Its degrees of comparison will be updated in real time by service quality after online;File protecting system and key
Management system carries out encryption and decryption using domestic cryptographic algorithm SM4.
Further, it is described based on credit worthiness dynamic management and domestic cryptographic algorithm privacy information encrypted transmission method include with
Lower step:
Step 1, message encryption is using domestic cryptographic algorithm SM4 to the message encryption chosen;
Step 2, recipient receive by the ciphertext of the key of key encrypted message ciphertext and encryption message;
Step 3, file encryption use SM4 symmetric cryptographic algorithm;
Step 4, file decryption use SM4 symmetric cryptographic algorithm;
The medical services evaluation of oneself is sent to authoritative institution, Quan Weiji after using medical services by step 5, user
Structure is collected into the whole evaluations for the user for receiving the service provider service.
Further, for data before issuing from sender, sender generates 128 bits at random in the step 1
The random key key of SM4 algorithm encrypts message to be sent with SM4 Encryption Algorithm, then reuses SM2 encryption
Algorithm encrypts the key key of SM4 using the public key of recipient.
Further, recipient carries out the ciphertext of key with the private key of oneself using SM2 decipherment algorithm in the step 2
Decryption obtains key key, then carries out SM4 decryption with this key key message cipher text.
Further, sender chooses file to be sent in the step 3, and system is randomly generated a length and is
The random key key of the SM4 algorithm of 128bit encrypts the file chosen with SM4 Encryption Algorithm, reuses SM2 encryption
Algorithm encrypts the key key of SM4 using the public key of recipient.
Further, recipient receives by the key of key encrypted message ciphertext and encryption file in the step 4
Ciphertext, recipient is decrypted the ciphertext of key to obtain key key using SM2 decipherment algorithm with the private key of oneself, then uses
This key key carries out SM4 decryption to file cipher text;
The medical services that user receives in the step 5 are different, and different according to medical services calculate medical services offer
The score for the service that quotient provides;The score obtained and preset threshold value comparison are determined into reward or punished, and in real time
Update the credit value of healthcare providers.
Another object of the present invention is to provide the management of credit worthiness dynamic and domestic cryptographic algorithm are based on described in a kind of realization
Privacy information encrypted transmission method based on credit worthiness dynamic management and domestic cryptographic algorithm privacy information encryption transmission system, institute
It states and includes: based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encryption transmission system
Message encryption module, for being encrypted using domestic cryptographic algorithm SM4 to the message chosen;
Message deciphering module is received for recipient by the key of key encrypted message ciphertext and encryption message
Ciphertext, recipient is decrypted the ciphertext of key to obtain key key using SM2 decipherment algorithm with the private key of oneself, then uses this
Key key message cipher text carries out SM4 decryption;
File encryption module, for using SM4 symmetric cryptographic algorithm to file encryption;
File decryption module, for realizing use SM4 symmetric cryptographic algorithm to file decryption;
The medical services evaluation of oneself is sent to after using medical services by honesty managemen module for realizing user
Authoritative institution, authoritative institution are collected into the whole evaluations for the user for receiving the service provider service.
Another object of the present invention is to provide the management of credit worthiness dynamic and domestic cryptographic algorithm are based on described in a kind of realization
The computer program of privacy information encrypted transmission method.
Another object of the present invention is to provide the management of credit worthiness dynamic and domestic cryptographic algorithm are based on described in a kind of realization
The information data processing terminal of privacy information encrypted transmission method.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer
When upper operation, so that based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission described in computer execution
Method.
In conclusion advantages of the present invention and good effect are as follows: the intelligent medical based on Internet of Things, the network of majority design
Framework does not account for the risk of patients' privacy leakage, and the patient information that hardware device is collected into carries out plaintext biography in a network
It is defeated.Huge privacy leakage risk will be present in shared medical information.For entire medical industry, the leakage of medical data will
Huge economic cost can be brought.Patients' privacy is excessively shared in this programme solution intelligent medical, patients' privacy information passes in plain text
Defeated and patients' privacy data are tampered.This programme can be effectively protected patients' privacy and not stolen by undesirable as business use
On the way, patients' privacy information is prevented to be tampered inconvenient to patient's medical treatment bring.The present invention is based on the trouble under the close intelligent medical of state
Person's secret protection ensures will not being stolen by rogue program in shared procedure for user's medical treatment privacy information, will be to the letter of transmission
Breath carries out SM2, SM4 encryption;Prevent the server of healthcare providers from causing large area user by rogue program attack
The leakage of medical privacy information, the user's medical treatment privacy information stored on the server of healthcare providers will use domestic secret
Close algorithm SM4 carries out encryption storage;Healthcare providers will carry out degrees of comparison to it by authoritative institution before addition system
Evaluation;Its degrees of comparison will be updated in real time by service quality after online;File protecting system and key management
System will carry out encryption and decryption using the domestic cryptographic algorithm SM4 of China's independent research.
Intelligent medical has the characteristics that information fusion, multiparty collaboration.Multiparty collaboration needs multiple medical service organs shared
Medical information.User's medical information carries out transmission in shared procedure in the form of plaintext on network will be present disclosure risk.
" 2017 annual datas reveal cost study: global overview " display of IBM joint Ponemon Institute publication in 2017, doctor
The leaking data cost highest of industry is treated, the medical information leakage bring cost of average each patient is up to 380 dollars, remote high
In losing and 141 dollars of the global average unit cost of the leaking data of stolen record.In order to protect the privacy information of user, user
Privacy is transmitted again after need to being encrypted.The domestic cryptographic algorithm SM4 realized is used to encrypt privacy information;According to
Encryption Algorithm principle, after encrypting privacy information, privacy information is in ciphertext state and encryption key is in plaintext state, therefore makes
Encryption key is encrypted with the SM2 public key of recipient, all information are in ciphertext state at this time;Effectively allow user's is hidden
Personal letter, which ceases, to be protected, and user privacy information can be protected opponent intercepts user privacy information.
The present invention is in plaintext state according to Cryptography Principles, ordinary file, anyone can be by checking that file obtains
Take the content in file.It is in ciphertext state by encrypted file, it can be with document presentation in the case where no decryption
It is not plaintext state meaning to be expressed;Achieve the purpose that protect patients' privacy by encrypting file;File protection can be helped
The protection patients' privacy file for helping patient safe during medical treatment, reduces the risk of privacy leakage, protects of patient
People's interests.
The block length of inventive algorithm is 128 bits, and key length is 128 bits;Encryption Algorithm and cipher key spreading are calculated
Method all uses 32 wheel nonlinear iteration structures;Decipherment algorithm is identical as the structure of Encryption Algorithm, only the use sequence of round key
On the contrary, decryption round key is the backward of encryption round key;Message, file encryption and credit worthiness dynamic management can help patient to exist
The individual privacy information that patient is protected during seeing a doctor, reduces the risk of privacy leakage, protects the individual interest of patient.
Detailed description of the invention
Fig. 1 is that provided in an embodiment of the present invention encrypted based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information is passed
Transmission method flow chart.
Fig. 2 is that provided in an embodiment of the present invention encrypted based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information is passed
Defeated system structure diagram;
In figure: 1, message encryption module;2, message deciphering module;3, file encryption module;4, file decryption module;5, believe
Reputation degree management module.
Fig. 3 is that provided in an embodiment of the present invention encrypted based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information is passed
Transmission method implementation flow chart.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
Currently, intelligent medical just rapidly develops, using secure context, there is also larger problems.The present invention provides intelligence
Encryption and decryption, signature verification and the credit worthiness dynamic of patients' privacy information in medical treatment manage, to reach the mesh of protection privacy of user
's;A possibility that patients' privacy is revealed is effectively reduced in the protection that patients' privacy information may be implemented.
Application principle of the invention is explained in detail with reference to the accompanying drawing.
As shown in Figure 1, provided in an embodiment of the present invention based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information
Encrypted transmission method the following steps are included:
S101: message encryption encrypts the message chosen using domestic cryptographic algorithm SM4, and data are from sender
Before sending, sender generates the random key key of the SM4 algorithm of 128 bits at random, with SM4 Encryption Algorithm to will
The message of transmission is encrypted, and is then reused SM2 Encryption Algorithm and is added using the public key of recipient to the key key of SM4
It is close;
S102: recipient receives by the ciphertext of the key of key encrypted message ciphertext and encryption message, and recipient makes
The ciphertext of key is decrypted to obtain key key with SM2 decipherment algorithm with the private key of oneself, then with this key key to message
Ciphertext carries out SM4 decryption;
S103: file encryption uses SM4 symmetric cryptographic algorithm;Sender chooses file to be sent, and system is randomly generated
The random key key for the SM4 algorithm that one length is 128bit, encrypts the file chosen with SM4 Encryption Algorithm, then make
The key key of SM4 is encrypted using the public key of recipient with SM2 Encryption Algorithm;
S104: file decryption uses SM4 symmetric cryptographic algorithm, recipient receive by key encrypted message ciphertext with
The ciphertext of the key of file is encrypted, recipient is decrypted the ciphertext of key with the private key of oneself using SM2 decipherment algorithm
SM4 decryption is carried out to file cipher text to key key, then with this key key;
S105: the medical services evaluation of oneself is sent to authoritative institution, authoritative institution after using medical services by user
It is collected into the whole evaluations for the user for receiving the service provider service;Since the medical services that user receives are different, according to
The different scores for calculating the service that healthcare providers provide of medical services;By the score obtained and preset threshold
Value compares decision reward or punishes, and the credit value of real-time update healthcare providers.
As shown in Fig. 2, provided in an embodiment of the present invention based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information
Encryption transmission system includes:
Message encryption module 1, for being encrypted using domestic cryptographic algorithm SM4 to the message chosen;
Message deciphering module 2 is received for recipient by the key of key encrypted message ciphertext and encryption message
Ciphertext, recipient is decrypted the ciphertext of key to obtain key key using SM2 decipherment algorithm with the private key of oneself, then uses this
Key key message cipher text carries out SM4 decryption;
File encryption module 3, for using SM4 symmetric cryptographic algorithm to file encryption;
File decryption module 4, for realizing use SM4 symmetric cryptographic algorithm to file decryption;
The medical services of oneself are evaluated after using medical services for realizing user and are sent by honesty managemen module 5
To authoritative institution, authoritative institution is collected into the whole evaluations for the user for receiving the service provider service.
Application principle of the invention is further described combined with specific embodiments below.
Embodiment 1: message encryption
Message encryption transmission is using the Encryption Algorithm in SM2, SM4 algorithm Hybrid Encryption, and wherein SM4 carries out message symmetrical
Encryption, SM2 encrypt SM4 encryption key.Message consists of two parts, wherein using comma as separator.First part
For the ciphertext of SM4 encryption key;Second part is the ciphertext of message.SM4 decipherment algorithm is decrypted using SM2 decipherment algorithm
Outbound message is decrypted in plain text in SM4 key message cipher text.The Hybrid Encryption of SM2, SM4 can guarantee message in transmission process
Safety.
Embodiment 2: file encryption transmission
For intelligent medical, the safety for the content transmitted especially important, once it reveals, it will be to trouble
The life of person, psychology cause greatly to injure.Wherein the medical data of patient is particularly important.This system is mixed using SM2, SM4
The mode of encryption carries out encrypted transmission to that will carry out shared patient medical private file, and privacy is prevented to be stolen.Recipient
File is ciphertext after receiving patient medical private file.The SM4 encryption key decrypted by SM2 public key decryptions algorithm is logical
SM4 decipherment algorithm is crossed to decrypt in plain text.
Embodiment 3: credit worthiness dynamic manages
Credit worthiness model can prevent the excessive shared of patient medical privacy information.Patient was receiving corresponding medical services
Evaluation can be made after the medical services of mechanism to the service that it is provided, authoritative institution passes through evaluation real-time update medical services machine
The real-time credit worthiness of structure.User after receiving the medical services that corresponding medical service organ provides Android client to
The evaluation score oneself this serviced out, and reason is provided, it then clicks send button and is sent to authoritative institution, Quan Weiji
Structure updates the credit worthiness of corresponding medical service organ by calculating.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.When using entirely or partly realizing in the form of a computer program product, the computer program product include one or
Multiple computer instructions.When loading on computers or executing the computer program instructions, entirely or partly generate according to
Process described in the embodiment of the present invention or function.The computer can be general purpose computer, special purpose computer, computer network
Network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or from one
Computer readable storage medium is transmitted to another computer readable storage medium, for example, the computer instruction can be from one
A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)
Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center
Transmission).The computer-readable storage medium can be any usable medium or include one that computer can access
The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie
Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid
State Disk (SSD)) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. one kind is based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method, which is characterized in that institute
It states based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method based under the close intelligent medical of state
Patients' privacy protection, user's medical treatment privacy information are not stolen in shared procedure by rogue program;By to the information of transmission into
Row SM2, SM4 encryption;The user's medical treatment privacy information stored on the server of healthcare providers will use domestic secret
Close algorithm SM4 encryption storage;Healthcare providers will carry out degrees of comparison evaluation to it by authoritative institution before addition system;
Its degrees of comparison will be updated in real time by service quality after online;File protecting system is adopted with key management system
Encryption and decryption is carried out with domestic cryptographic algorithm SM4.
2. it is based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method as described in claim 1,
It is characterized in that, described, based on credit worthiness, dynamically management and domestic cryptographic algorithm privacy information encrypted transmission method include following step
It is rapid:
Step 1, message encryption is using domestic cryptographic algorithm SM4 to the message encryption chosen;
Step 2, recipient receive by the ciphertext of the key of key encrypted message ciphertext and encryption message;
Step 3, file encryption use SM4 symmetric cryptographic algorithm;
Step 4, file decryption use SM4 symmetric cryptographic algorithm;
The medical services evaluation of oneself is sent to authoritative institution after using medical services by step 5, user, and authoritative institution receives
Collect the whole evaluations for the user for receiving the service provider service.
3. it is based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method as claimed in claim 2,
It is characterized in that, for data before issuing from sender, sender generates the SM4 of 128 bits at random in the step 1
The random key key of algorithm encrypts message to be sent with SM4 Encryption Algorithm, then reuses SM2 Encryption Algorithm
The key key of SM4 is encrypted using the public key of recipient.
4. it is based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method as claimed in claim 2,
It is characterized in that, recipient is decrypted the ciphertext of key with the private key of oneself using SM2 decipherment algorithm in the step 2
Key key is obtained, then carries out SM4 decryption with this key key message cipher text.
5. it is based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method as claimed in claim 2,
It is characterized in that, sender chooses file to be sent in the step 3, it is 128bit's that a length, which is randomly generated, in system
The random key key of SM4 algorithm encrypts the file chosen with SM4 Encryption Algorithm, reuses the utilization of SM2 Encryption Algorithm
The public key of recipient encrypts the key key of SM4.
6. it is based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method as claimed in claim 2,
It is characterized in that, in the step 4 recipient receive by key encrypted message ciphertext with encryption file key it is close
Text, recipient are decrypted the ciphertext of key to obtain key key using SM2 decipherment algorithm with the private key of oneself, then close with this
Key key carries out SM4 decryption to file cipher text;
The medical services that user receives in the step 5 are different, mentioned according to the different healthcare providers that calculate of medical services
The score of the service supplied;The score obtained and preset threshold value comparison are determined into reward or punished, and real-time update
The credit value of healthcare providers.
7. based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission side described in a kind of realization claim 1
Method based on credit worthiness dynamic management and domestic cryptographic algorithm privacy information encryption transmission system, which is characterized in that it is described to be based on
The management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encryption transmission system include:
Message encryption module, for being encrypted using domestic cryptographic algorithm SM4 to the message chosen;
Message deciphering module is received for recipient by the ciphertext of the key of key encrypted message ciphertext and encryption message,
Recipient is decrypted to obtain key key to the ciphertext of key with oneself private key using SM2 decipherment algorithm, then with this key
Key message cipher text carries out SM4 decryption;
File encryption module, for using SM4 symmetric cryptographic algorithm to file encryption;
File decryption module, for realizing use SM4 symmetric cryptographic algorithm to file decryption;
The medical services evaluation of oneself is sent to authority after using medical services for realizing user by honesty managemen module
Mechanism, authoritative institution are collected into the whole evaluations for the user for receiving the service provider service.
8. based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy letter described in a kind of realization claim 1~6 any one
The computer program of encryption for information transmission method.
9. based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy letter described in a kind of realization claim 1~6 any one
The information data processing terminal of encryption for information transmission method.
10. a kind of computer readable storage medium, including instruction, when run on a computer, so that computer executes such as
It is as claimed in any one of claims 1 to 6 to be based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission side
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811512634.XA CN109495497A (en) | 2018-12-11 | 2018-12-11 | Based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811512634.XA CN109495497A (en) | 2018-12-11 | 2018-12-11 | Based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109495497A true CN109495497A (en) | 2019-03-19 |
Family
ID=65698453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811512634.XA Pending CN109495497A (en) | 2018-12-11 | 2018-12-11 | Based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109495497A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110580951A (en) * | 2019-09-10 | 2019-12-17 | 赵志宇 | diagnosis and monitoring comprehensive medical system with encrypted communication and encryption method thereof |
CN111143870A (en) * | 2019-12-30 | 2020-05-12 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
CN111901611A (en) * | 2020-08-27 | 2020-11-06 | 上海熙菱信息技术有限公司 | Method for adding video invisible watermark based on state cryptographic algorithm |
CN112800456A (en) * | 2020-12-31 | 2021-05-14 | 同智伟业软件股份有限公司 | Electronic health card encryption front server |
CN113536333A (en) * | 2021-04-27 | 2021-10-22 | 安徽省立医院(中国科学技术大学附属第一医院) | Medical insurance method capable of improving insurance settlement and claim efficiency |
CN116108024A (en) * | 2023-04-14 | 2023-05-12 | 深圳市安信达存储技术有限公司 | Data storage method and data storage system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030182421A1 (en) * | 2002-03-22 | 2003-09-25 | Yaroslav Faybishenko | Distributed identities |
CN102043811A (en) * | 2009-10-13 | 2011-05-04 | 北京大学 | Method and system for evaluating medical information |
CN106453405A (en) * | 2016-11-24 | 2017-02-22 | 济南浪潮高新科技投资发展有限公司 | Security authentication method for fog node in cloud environment |
CN107026859A (en) * | 2017-03-31 | 2017-08-08 | 西安电子科技大学 | A kind of safe transmission method of privacy cloud medical data |
CN108400867A (en) * | 2017-02-07 | 2018-08-14 | 中国科学院沈阳计算技术研究所有限公司 | A kind of authentication method based on public encryption system |
-
2018
- 2018-12-11 CN CN201811512634.XA patent/CN109495497A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030182421A1 (en) * | 2002-03-22 | 2003-09-25 | Yaroslav Faybishenko | Distributed identities |
CN102043811A (en) * | 2009-10-13 | 2011-05-04 | 北京大学 | Method and system for evaluating medical information |
CN106453405A (en) * | 2016-11-24 | 2017-02-22 | 济南浪潮高新科技投资发展有限公司 | Security authentication method for fog node in cloud environment |
CN108400867A (en) * | 2017-02-07 | 2018-08-14 | 中国科学院沈阳计算技术研究所有限公司 | A kind of authentication method based on public encryption system |
CN107026859A (en) * | 2017-03-31 | 2017-08-08 | 西安电子科技大学 | A kind of safe transmission method of privacy cloud medical data |
Non-Patent Citations (2)
Title |
---|
伍娟: "基于国密SM4和SM2的混合密码算法研究与实现", 《软件导刊》 * |
沈桂军: "电子健康信誉评价系统设计与实现", 《中国优秀硕士论文全文数据库 信息科技辑》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110580951A (en) * | 2019-09-10 | 2019-12-17 | 赵志宇 | diagnosis and monitoring comprehensive medical system with encrypted communication and encryption method thereof |
CN111143870A (en) * | 2019-12-30 | 2020-05-12 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
CN111143870B (en) * | 2019-12-30 | 2022-05-13 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
CN111901611A (en) * | 2020-08-27 | 2020-11-06 | 上海熙菱信息技术有限公司 | Method for adding video invisible watermark based on state cryptographic algorithm |
CN112800456A (en) * | 2020-12-31 | 2021-05-14 | 同智伟业软件股份有限公司 | Electronic health card encryption front server |
CN113536333A (en) * | 2021-04-27 | 2021-10-22 | 安徽省立医院(中国科学技术大学附属第一医院) | Medical insurance method capable of improving insurance settlement and claim efficiency |
CN116108024A (en) * | 2023-04-14 | 2023-05-12 | 深圳市安信达存储技术有限公司 | Data storage method and data storage system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dilawar et al. | Blockchain: securing internet of medical things (IoMT) | |
US10785019B2 (en) | Data transmission method and apparatus | |
CN109495497A (en) | Based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method | |
JP5562687B2 (en) | Securing communications sent by a first user to a second user | |
CN107483212A (en) | A kind of method of both sides' cooperation generation digital signature | |
CN106104562A (en) | Safety of secret data stores and recovery system and method | |
Au et al. | Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat | |
CN105553654B (en) | Key information processing method and device, key information management system | |
CN103179114A (en) | Fine-grained access control method for data in cloud storage | |
CN104253694A (en) | Encrypting method for network data transmission | |
CN108282329A (en) | A kind of Bidirectional identity authentication method and device | |
CN109728906A (en) | Anti- quantum calculation asymmet-ric encryption method and system based on unsymmetrical key pond | |
CN110519046A (en) | Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD | |
CN110535626B (en) | Secret communication method and system for identity-based quantum communication service station | |
CN104270242A (en) | Encryption and decryption device used for network data encryption transmission | |
CN109800588A (en) | Bar code dynamic encrypting method and device, bar code dynamic decryption method and device | |
CN204180095U (en) | A kind of ciphering and deciphering device for network data encryption transmission | |
CN107612680A (en) | A kind of national secret algorithm in mobile network's payment | |
CN109905229A (en) | Anti- quantum calculation Elgamal encryption and decryption method and system based on group's unsymmetrical key pond | |
CN109495244A (en) | Anti- quantum calculation cryptographic key negotiation method based on pool of symmetric keys | |
Almuzaini et al. | Key aggregation cryptosystem and double encryption method for cloud-based intelligent machine learning techniques-based health monitoring systems | |
CN110493124A (en) | Protect the encryption instantaneous communication system and communication means of data safety | |
CN110519222A (en) | Outer net access identity authentication method and system based on disposable asymmetric key pair and key card | |
WO2020042023A1 (en) | Instant messaging data encryption method and apparatus | |
CN109962924A (en) | Group chat construction method, group message sending method, group message receiving method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190319 |
|
RJ01 | Rejection of invention patent application after publication |