CN111027087A - Enterprise information management system and method for encrypting mnemonics by applying block chain - Google Patents
Enterprise information management system and method for encrypting mnemonics by applying block chain Download PDFInfo
- Publication number
- CN111027087A CN111027087A CN201911297193.0A CN201911297193A CN111027087A CN 111027087 A CN111027087 A CN 111027087A CN 201911297193 A CN201911297193 A CN 201911297193A CN 111027087 A CN111027087 A CN 111027087A
- Authority
- CN
- China
- Prior art keywords
- information
- encryption
- data
- enterprise
- layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Power Engineering (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Economics (AREA)
- Data Mining & Analysis (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
An enterprise information management system and method for encrypting a block chaining mnemonic word, the system comprising: an information encryption layer: the system is used for encrypting the enterprise information management database, so that enterprise information data are in a safe state in the transmission process, and the data are prevented from being lost in the transmission process; information transfer layer: the information transmission layer is used for transmitting the enterprise information management data encrypted by the information encryption layer, so that the enterprise information management data is transmitted from an enterprise information database to an information upper layer management center, and the information transmission layer comprises a blockchain system and a blockchain network in the blockchain system; a data sharing layer: the enterprise information management data is shared or transmitted among different users or different servers; an information application layer: the method is used for inquiring, tracing, researching or managing the enterprise information management data. The invention introduces the encryption method of the block chain mnemonic words, thereby greatly increasing the security of the enterprise information management data.
Description
Technical Field
The invention relates to the technical field of enterprise management, in particular to a system and a method for realizing enterprise information management by encrypting a block chain mnemonic word.
Background
An enterprise information management system (EMS) is a management system which uses modern management ideas and methods, takes a computer as a medium, utilizes computer software and network communication technology, and helps enterprises to process daily matters in the processes of production, management, enterprise decision, information collection, storage, processing and analysis until a decision scheme is developed and the work is optimized, and simultaneously tracks, monitors, controls and adjusts. Generally, an enterprise information management system comprises two parts, namely an office level and a business system, has five entities, comprises the characteristics of industrial experts and the characteristics of practical application, has systematicness and integrity, can collect and share historical information, and has the characteristics of decision support and dynamic change according to information change. A complete enterprise information management system plays a role in supporting and protecting enterprise production and business activities well, particularly plays a role in defining responsibility and division of labor in multiple departments of an enterprise, achieving paperless office work, adjusting and optimizing internal departments, and shows the paperless office work, adjusting and optimizing internal departments and making accurate prediction for market development.
In enterprise management, scientific and effective management is an important basis for development of survival and struggle of modern enterprises. With the continuous development of information technology and the continuous deepening of enterprise innovation in China, the enterprise management mode is changing to innovation management and knowledge management. In order to adapt to the change of enterprise management modes in the new period, enterprises need to strengthen informatization construction. The enterprise informatization construction is a revolution, and has practical and profound significance in the aspects of improving the enterprise management level, promoting the management modernization, converting the operation mechanism, establishing the modern enterprise management system, effectively reducing the cost, accelerating the technical progress, enhancing the market competitiveness, improving the economic benefit and the like.
The private key is a key created by a user who performs a transaction and used only by the private key, and the security of the private key is mainly considered from the aspects of storage, creation and use of the private key. The general private key creation method is that a user inputs a password through an application client, and then the password input by the user is encrypted through an encryption chip to generate a private key. If the user forgets the password or the password of the user is stolen, the private key corresponding to the password can be easily cracked according to the encryption algorithm. In addition, if a bug exists in the storage process or the storage medium of the private key or an unsafe factor exists in the use process of the private key, the private key is easy to steal. Therefore, in the existing enterprise information management system (EMS), because of the dispersed management of enterprise information, the monotonous layout and the poor confidentiality of enterprise information, the coordination and the coordination among all departments are poor, data and information among all the departments are difficult to exchange and share, the operation and maintenance of the system are unreliable and convenient, which brings great inconvenience to enterprise management and can not effectively mobilize the working enthusiasm of employees.
Disclosure of Invention
Aiming at the defects of the prior art, the invention discloses a system and a method for realizing enterprise information management by encrypting a block chain mnemonic word.
The invention adopts the following technical scheme:
an enterprise information management system employing blockchain mnemonic encryption, the system comprising:
an information encryption layer: the enterprise information management system comprises an information confidentiality layer, an information management layer and a digital encryptor, wherein the information confidentiality layer is used for encrypting an enterprise information management database to ensure that enterprise information data are in a safe state in a transmission process and avoid data loss in the transmission process, the information confidentiality layer is used for encrypting the enterprise information management data by arranging the data encryptor in the information confidentiality layer, and the digital encryptor is provided with a mnemonic word storage unit for storing enterprise information management data encryption information;
information transfer layer: the information transmission layer is used for transmitting the enterprise information management data encrypted by the information encryption layer, so that the enterprise information management data is transmitted from an enterprise information database to an information upper layer management center, and the information transmission layer comprises a blockchain system and a blockchain network in the blockchain system;
a data sharing layer: the enterprise information management data is shared or transmitted among different users or different servers;
an information application layer: the enterprise information management system is used for inquiring, tracing, researching or managing enterprise information management data and realizing information interaction with an upper management center or a cloud server; wherein:
as a further technical solution of the present invention, an output end of the information encryption layer is connected to an input end of the information transfer layer, an output end of the information transfer layer is connected to an input end of the information sharing layer, an output end of the information sharing layer is connected to an input end of the information application layer, and an output end of the information application layer is connected to an input end of the information upper management center or the cloud server.
As a further technical scheme of the invention, the mnemonic words are character strings of Pin codes or letter and number combinations generated by UTF-8 coding.
As a further technical scheme of the invention, the information sharing layer realizes the transfer or transmission of enterprise information data by setting the node server.
As a further technical scheme of the invention, the data encryptor is provided with an encryption medium which is compatible with more than two format addresses.
The invention also adopts the following technical scheme:
an enterprise information management method for encrypting a block chaining mnemonic word, comprising the following steps of:
(S0) starting, in the data encryptor, an initialization operation is performed on the encrypted data information so that, when the data is encrypted, no history encryption trace is contained so that the encrypted information is the latest input information;
(S1) the business manager inputting a mnemonic in the encryption medium in the data encryptor;
(S2) generating a mnemonic address in the digital encryptor, at which a mnemonic sequence type and a number of digits of the mnemonic sequence in the instruction in the encryptor are acquired;
(S3) generating a password distortion function of the local user according to the mnemonic word information of the local block chain account;
(S4) generating a warped transaction password for the local user based on the transaction password for the local user and the password warping function;
(S5) the authorized manager signs the generated secret key to generate a two-dimensional code, the enterprise manager encrypts the generated two-dimensional code data protection through an encryption method, then the enterprise manager exchanges data information with other management users through the two-dimensional code, and decrypts the encrypted data through a decryption technology to obtain the authorized enterprise information manager to further obtain or share the encrypted data information.
As a further technical solution of the present invention, the encryption medium is an end-to-end encryption medium based on a digital envelope, and the encryption medium includes a data certificate repository, a key backup unit, a digital management certificate, and an output/input interface.
As a further technical solution of the present invention, in the step (S3), wherein:
the process of generating the mnemonic words comprises the following steps:
generating a random number in a digital encryptor, wherein the length of the random number is 64-256 bits, then calculating any number of the 64-256 bits by using a random number hash algorithm, and taking the first n bits as a checksum, wherein the value of n is the quotient of the length of the random number and the number 32, and at the moment, creating the checksum of the random number;
then adding the checksum at the end of the random number, taking 12-bit data as a unit, splitting the recombined random number into different parts respectively containing 12 bits, and comparing the numerical value of each part containing 12 bits with a predefined mnemonic word library so as to convert the random number into mnemonic words consisting of words in an arrangement order;
in the step (S3), wherein:
the password distortion function is a Hash type algorithm function, a random type algorithm function or an SM9 identification password algorithm function, and the generation process of the password distortion function is as follows:
extracting mnemonic characteristic values according to mnemonic word information in a digital encryptor in a local block chain, generating a digital information function through a Hash algorithm function, a random algorithm function or an SM9 identification cryptographic algorithm function, and then determining a local warping algorithm according to a candidate warping algorithm provided by the generated digital information function, so that an enterprise manager calculates the local warping algorithm according to the characteristic values of the mnemonic words and then generates a cryptographic warping function of a local block chain account.
As a further technical solution of the present invention, in the step (S4), the transaction password is a password confirmed during a user transaction, and the transaction password is a character string of a combination of a number of words and a number input into the encryption medium by the user.
As a further technical solution of the present invention, in the step (S5), the encryption method is completed by encapsulation of a digital envelope, and the encryption method may employ any one of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, symmetric encryption algorithm, IDEA, RC6, or CAST5, wherein the encryption method is completed by encapsulation using a digital envelope, wherein the steps of the encryption method are:
(1) the enterprise management user encrypts the data information in the data encryptor through any one algorithm of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, symmetric encryption algorithm, IDEA, RC6 or CAST 5;
(2) during encryption, acquiring a digital certificate and a public key from a data certificate library;
(3) the user can then obtain the generated digital certificate and public key through a mobile phone or a smart device.
As a further technical solution of the present invention, the decryption algorithm is implemented by using a private key to disassemble a digital envelope, wherein the decryption method comprises the steps of:
(1) selecting a file to be decrypted through encryption software;
(2) the enterprise management user acquires a private KEY corresponding to the public KEY of the digital certificate from the USB-KEY;
(3) the enterprise management user adopts a private key and uses an RSA algorithm for decryption;
(4) a plaintext file is obtained.
Has the positive and beneficial effects that:
the block chain technology is introduced into enterprise information management, and an enterprise information management system consisting of an information encryption layer, an information transmission layer, an information sharing layer and an information application layer is constructed to realize encryption processing of enterprise information management; the invention also introduces a block chain encryption method, and realizes enterprise information management by mnemonic word encryption, and the mnemonic word algorithm of the invention is randomly used by enterprise management users, thereby greatly increasing the security performance of data.
Drawings
FIG. 1 is a block diagram of an enterprise information management system using block chaining mnemonic encryption according to the present invention;
FIG. 2 is a flowchart of an enterprise information management method using block chain mnemonic encryption according to the present invention;
FIG. 3 is a schematic diagram illustrating a data sharing process of an enterprise information management method using block chain mnemonic encryption according to the present invention;
FIG. 4 is a block chain architecture diagram illustrating an enterprise information management method using encryption of mnemonic words in a block chain according to the present invention;
FIG. 5 is a block head diagram of a block chain structure of an enterprise information management method using encryption of block chain mnemonic words according to the present invention;
FIG. 6 is a block chain data structure diagram of an enterprise information management method using encryption of mnemonic words in a block chain according to the present invention;
FIG. 7 is a block chain Fabric platform architecture diagram of an enterprise information management method using block chain mnemonic encryption according to the present invention;
FIG. 8 is a block chain node architecture diagram of an enterprise information management method using block chain mnemonic encryption according to the present invention;
fig. 9 is a schematic diagram illustrating an encryption method in an enterprise information management method using block chain mnemonic encryption according to the present invention;
fig. 10 is a schematic diagram illustrating a decryption method in an enterprise information management method using block chain mnemonic encryption according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, and it should be understood that the embodiments described herein are merely for the purpose of illustrating and explaining the present invention and are not intended to limit the present invention.
As shown in fig. 1, an enterprise information management system applying block chain mnemonic encryption, the system includes:
an information encryption layer: the enterprise information management system comprises an information confidentiality layer, an information management layer and a digital encryptor, wherein the information confidentiality layer is used for encrypting an enterprise information management database to ensure that enterprise information data are in a safe state in a transmission process and avoid data loss in the transmission process, the information confidentiality layer is used for encrypting the enterprise information management data by arranging the data encryptor in the information confidentiality layer, and the digital encryptor is provided with a mnemonic word storage unit for storing enterprise information management data encryption information;
information transfer layer: the information transmission layer is used for transmitting the enterprise information management data encrypted by the information encryption layer, so that the enterprise information management data is transmitted from an enterprise information database to an information upper layer management center, and the information transmission layer comprises a blockchain system and a blockchain network in the blockchain system;
a data sharing layer: the enterprise information management data is shared or transmitted among different users or different servers;
an information application layer: the enterprise information management system is used for inquiring, tracing, researching or managing enterprise information management data and realizing information interaction with an upper management center or a cloud server; wherein:
the output end of the information encryption layer is connected with the input end of the information transmission layer, the output end of the information transmission layer is connected with the input end of the information sharing layer, the output end of the information sharing layer is connected with the input end of the information application layer, and the output end of the information application layer is connected with the input end of the information upper management center or the cloud server.
In this way, encryption processing and remote information management of enterprise information management are realized.
In the above embodiment, the mnemonic word is a character string that generates Pin code or a combination of letters and numbers by UTF-8 encoding.
In the above embodiment, the information sharing layer implements transfer or transmission of the enterprise information data by setting the node server.
In the above embodiment, the data encryptor is provided with an encryption medium compatible with two or more format addresses.
As shown in fig. 2, an enterprise information management method applying block chain mnemonic encryption includes the following steps:
(S0) starting, in the data encryptor, an initialization operation is performed on the encrypted data information so that, when the data is encrypted, no history encryption trace is contained so that the encrypted information is the latest input information;
(S1) the business manager inputting a mnemonic in the encryption medium in the data encryptor;
(S2) generating a mnemonic address in the digital encryptor, at which a mnemonic sequence type and a number of digits of the mnemonic sequence in the instruction in the encryptor are acquired;
(S3) generating a password distortion function of the local user according to the mnemonic word information of the local block chain account;
(S4) generating a warped transaction password for the local user based on the transaction password for the local user and the password warping function;
(S5) the authorized manager signs the generated secret key to generate a two-dimensional code, the enterprise manager encrypts the generated two-dimensional code data protection through an encryption method, then the enterprise manager exchanges data information with other management users through the two-dimensional code, and decrypts the encrypted data through a decryption technology to obtain the authorized enterprise information manager to further obtain or share the encrypted data information.
Through the embodiment, the enterprise information management adopting the encryption of the block chain mnemonic words is realized.
Before the above embodiments are described, the following description of the block chain technique applied herein is made.
As shown in fig. 3, fig. 3 is a schematic diagram of a data sharing process of an enterprise information management method for encrypting mnemonic words by using a blockchain, in the structure, a blockchain is a supporting platform based on a Hyperhedger Fabric modular blockchain solution by using a software platform, an enterprise information management system used by the blockchain generally comprises a management application layer, a blockchain network, an access layer and a department service system, and the data are transmitted and shared after being processed by the blockchain management system.
As shown in fig. 4, fig. 4 is a block chain architecture diagram of an enterprise information management method using encryption of block chain mnemonic words according to the present invention; the method for realizing data sharing through fig. 4 is as follows: the method comprises a data sending process and a data receiving process.
In the data transmission flow, the method comprises the following steps:
(1) the department service system packs data according to the service definition standard; the block chain management system is internally provided with intelligent bracelet organization business data, and then the business data are distributed;
(2) calling a data submission method of the SD K, and submitting a data attribution main body and packaged service data;
(3) the SD K inquires a public key of a data attribution main body on the node machine, and if the public key cannot be found, a data decryption center interface is called to obtain the public key;
(4) the SDK encrypts the packed service data by using the public key to generate encrypted packed service data;
(5) the SDK uses a Certification Authority (CA) private key signature of a service department together with the data attribution main body and the encrypted packed service data;
(6) and calling the interface of the node machine to submit data, and executing data saving action after the signature is verified successfully by the node machine.
In the data receiving process, the method comprises the following steps:
(1) the SDK signs the query request using C A private key of the business department;
(2) the SDK calls a node machine query interface, and the node machine executes a query action and returns encrypted service data after successfully verifying the signature;
(3) the SDK submits the encrypted service data to a decryption center through a hypertext transfer protocol over secure socket layer (HTTPS) channel to be decrypted to obtain decrypted service data;
(4) the SDK returns the decrypted service data.
As shown in fig. 5, fig. 5 is a block head diagram of a block chain structure of an enterprise information management method using encryption of block chain mnemonic words according to the present invention; the block chain is called a distributed database which is jointly maintained by multiple parties, decentralized, traceable and not falsifiable, and is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. Request data in a certain period can be packed into a data block (block) through a cryptographic technology, and the data block is connected into a chain structure for storage according to time sequence by using a Hash fingerprint. A data block is typically composed of two parts, a block header and a block body. The block header usually stores data such as the version number of the system, the hash value of the previous block, the merkle root, and the timestamp, and the block body contains detailed request data. Taking a bitcoin as an example, the block head of the bitcoin also stores data such as random numbers for mining and the like in addition to the above information, and the block body stores specific transaction data.
As shown in fig. 6, fig. 6 is a schematic diagram of a data architecture in a blockchain of an enterprise information management method for encrypting mnemonic words by using a blockchain according to the present invention, where the blockchain is called a multi-party commonly maintained, decentralized, traceable, and non-falsifiable distributed database, and is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a common recognition mechanism, and an encryption algorithm. Request data in a certain period can be packed into a data block (block) through a cryptographic technology, and the data block is connected into a chain structure for storage according to time sequence by using a Hash fingerprint. A data block is typically composed of two parts, a block header and a block body. The block header usually stores data such as the version number of the system, the hash value of the previous block, the merkle root, and the timestamp, and the block body contains detailed request data. Taking a bitcoin as an example, the block head of the bitcoin also stores data such as random numbers for mining and the like in addition to the above information, and the block body stores specific transaction data.
Fig. 7 is a block chain Fabric platform architecture diagram of an enterprise information management method using block chain mnemonic encryption according to the present invention, and is shown in fig. 7. The blockchain platform is a support platform of a modularized blockchain solution based on HyperLegendr Fabric. The Fabric platform is an alliance chain structure, supports an intelligent contract technology, does not depend on tokens when the system operates, can support about hundred transactions per second and basically meets the requirement of cross-organization transactions of digital assets between alliances. In addition, Fabric adopts a modular architecture, wherein a consensus algorithm and the like can be used as a pluggable module for a user to choose. Meanwhile, the method can lead a user to redesign and develop a specific module according to the self requirement, so that the Fabric is selected as a block chain foundation platform of the digital asset transaction system. The Fabric mainly comprises member service modules (Membership Services), block chain service modules (Blockchain Services) and chain code service modules (Chaincode Services). The member service module mainly provides functions of member registration, identity management, transaction examination and the like, and performs mechanism registration authentication and transaction authentication through a registration certificate issuing mechanism (ECA) and a transaction authentication center (TCA). The block chain service module is mainly responsible for point-to-point communication between nodes, consensus, and the storage of account book data. The chain code service module provides intelligent contract service, provides a safe contract running environment and the like. Meanwhile, the platform realizes asynchronous communication through an Event Stream (Event Stream) between all the components.
As shown in fig. 8, fig. 8 is a block chain node architecture diagram of an enterprise information management method using block chain mnemonic encryption according to the present invention. The block chain nodes are connected in a chain manner, namely the block chain nodes are connected and communicated with each other through a block chain network, and the nodes are connected in a chain manner, so that information interaction among different nodes can be realized. When data are shared, the data of the intelligent bracelets are alternated and shared through different data nodes.
Therefore, the block chain applied in the method can realize the safety of enterprise information management and timely data transmission. The following description is directed to mnemonic confidentiality techniques using blockchains.
In the above embodiment, the encryption medium is an end-to-end encryption medium based on a digital envelope, and the encryption medium includes a data certificate library, a key backup unit, a digital management certificate, and an input/output interface.
In the step (S3), wherein: the process of generating the mnemonic words comprises the following steps:
generating a random number in a digital encryptor, wherein the length of the random number is 64-256 bits, then calculating any number of the 64-256 bits by using a random number hash algorithm, and taking the first n bits as a checksum, wherein the value of n is the quotient of the length of the random number and the number 32, and at the moment, creating the checksum of the random number;
then adding the checksum at the end of the random number, taking 12-bit data as a unit, splitting the recombined random number into different parts respectively containing 12 bits, and comparing the numerical value of each part containing 12 bits with a predefined mnemonic word library so as to convert the random number into mnemonic words consisting of words in an arrangement order;
in the step (S3), wherein:
the password distortion function is a Hash type algorithm function, a random type algorithm function or an SM9 identification password algorithm function, and the generation process of the password distortion function is as follows:
extracting mnemonic characteristic values according to mnemonic word information in a digital encryptor in a local block chain, generating a digital information function through a Hash algorithm function, a random algorithm function or an SM9 identification cryptographic algorithm function, and then determining a local warping algorithm according to a candidate warping algorithm provided by the generated digital information function, so that an enterprise manager calculates the local warping algorithm according to the characteristic values of the mnemonic words and then generates a cryptographic warping function of a local block chain account.
In the step (S4), the transaction password is a password confirmed during a user transaction, and the transaction password is a character string of a combination of a number of words and a number input into the encryption medium by the user.
In one embodiment, the following strings are encrypted:
iCq94rpu4aUGnTQqhsMwQpxihPe41qRBTXmWIL2Py32lGB3mekesExrpH0BiqaJo4QiO
Y96Ezk589n9El9en5Q09nTDtEC3W3OAb0rittacLmmaRqJcC6al9HOjj7O2AvNhJrTVplu4FzZ3768iFo5ryjrreApQCGdDp7kgGWf05bcR6bm5f7w1eTuwknfwmGTkd
the SM9 identification cryptographic algorithm function encryption is carried out on the characteristic value data, and the obtained encrypted private key is as follows:
018e99eca36057a35506de50cafb9ad9;
mnemonics in the SM9 wallet are: siege violin trap power rod closed loop
The priority swift help town, totally 12 English words, and then use the above-mentioned private key to carry on DES encryption to the mnemonic word, get the mnemonic word character string after encrypting:
dSTzm8fljnSN3PTd2PC8E8qpKgXQ9XwbgobMs4uJwMBeZopozMb2V0WE+
ZXd5o1asAX2iB+ruIhexcJRMtpNV2Lz9ISDWLho2Lhs3QXf8zU=;
and converting the mnemonic word character string into 16-system data, wherein the converted data is as follows:
6453547a6d38666c6a6e534e3350546432504338453871704b67585139587762676f624d7334754a774d42655a6f706f7a4d6232563057452b5a5864356f31617341583269422b727549686578634a524d74704e56324c7a39495344574c686f324c687333515866387a553d;
finally, the 16-system data is transmitted and stored to the Ether house block chain through the Ether house intelligent contract, and finally, the data is stored
In the form of:
0x6453547a6d38666c6a6e534e3350546432504338453871704b67585139587762676f624d7334754a774d42655a6f706f7a4d6232563057452b5a5864356f31617341583269422b727549686578634a524d74704e56324c7a39495344574c686f324c687333515866387a553d。
as shown in fig. 9, in the step (S5), the encryption method is completed by encapsulation of a digital envelope, and the encryption method may employ any one of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, symmetric encryption algorithm, IDEA, RC6, or CAST5, wherein the encryption method is completed by encapsulation using a digital envelope, wherein the steps of the encryption method are:
(1) the enterprise management user encrypts the data information in the data encryptor through any one algorithm of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, symmetric encryption algorithm, IDEA, RC6 or CAST 5;
(2) during encryption, acquiring a digital certificate and a public key from a data certificate library;
(3) the user can then obtain the generated digital certificate and public key through a mobile phone or a smart device.
As shown in fig. 10, in the step (S5), the decryption algorithm is implemented by using a private key to tear down a digital envelope, wherein the steps of the decryption method are as follows:
(1) selecting a file to be decrypted through encryption software; in this step, the encryption software automatically encrypts data written to the storage medium at the operating system level as required, and in other implementations, the present invention is implemented by loading mnemonics.
(2) The enterprise management user acquires a private KEY corresponding to the public KEY of the digital certificate from the USB-KEY;
(3) the enterprise management user adopts a private key and uses an RSA algorithm for decryption;
(4) a plaintext file is obtained.
Although specific embodiments of the present invention have been described above, it will be understood by those skilled in the art that these specific embodiments are merely illustrative and that various omissions, substitutions and changes in the form of the detail of the methods and systems described above may be made by those skilled in the art without departing from the spirit and scope of the invention. For example, it is within the scope of the present invention to combine the steps of the above-described methods to perform substantially the same function in substantially the same way to achieve substantially the same result. Accordingly, the scope of the invention is to be limited only by the following claims.
Claims (10)
1. An enterprise information management system for encrypting an application block chain mnemonic word is characterized in that: the system comprises:
an information encryption layer: the enterprise information management system comprises an information confidentiality layer, an information management layer and a digital encryptor, wherein the information confidentiality layer is used for encrypting an enterprise information management database to ensure that enterprise information data are in a safe state in a transmission process and avoid data loss in the transmission process, the information confidentiality layer is used for encrypting the enterprise information management data by arranging the data encryptor in the information confidentiality layer, and the digital encryptor is provided with a mnemonic word storage unit for storing enterprise information management data encryption information;
information transfer layer: the information transmission layer is used for transmitting the enterprise information management data encrypted by the information encryption layer, so that the enterprise information management data is transmitted from an enterprise information database to an information upper layer management center, and the information transmission layer comprises a blockchain system and a blockchain network in the blockchain system;
a data sharing layer: the enterprise information management data is shared or transmitted among different users or different servers;
an information application layer: the enterprise information management system is used for inquiring, tracing, researching or managing enterprise information management data and realizing information interaction with an upper management center or a cloud server; wherein:
the output end of the information encryption layer is connected with the input end of the information transmission layer, the output end of the information transmission layer is connected with the input end of the information sharing layer, the output end of the information sharing layer is connected with the input end of the information application layer, and the output end of the information application layer is connected with the input end of the information upper management center or the cloud server.
2. The system according to claim 1, wherein the system comprises: the mnemonic words are character strings which are coded through UTF-8 to generate Pin codes or letter and number combinations.
3. The system according to claim 1, wherein the system comprises: the information sharing layer realizes the transfer or transmission of enterprise information data by setting a node server.
4. The system according to claim 1, wherein the system comprises: the data encryptor is provided with an encryption medium, and the encryption medium is compatible with more than two format addresses.
5. An enterprise information management method applying block chain mnemonic encryption, the method being performed by an enterprise information management system applying block chain mnemonic encryption according to any one of claims 1 to 3, characterized in that: the method comprises the following steps:
(S0) starting, in the data encryptor, an initialization operation is performed on the encrypted data information so that, when the data is encrypted, no history encryption trace is contained so that the encrypted information is the latest input information;
(S1) the business manager inputting a mnemonic in the encryption medium in the data encryptor;
(S2) generating a mnemonic address in the digital encryptor, at which a mnemonic sequence type and a number of digits of the mnemonic sequence in the instruction in the encryptor are acquired;
(S3) generating a password distortion function of the local user according to the mnemonic word information of the local block chain account;
(S4) generating a warped transaction password for the local user based on the transaction password for the local user and the password warping function;
(S5) the authorized manager signs the generated secret key to generate a two-dimensional code, the enterprise manager encrypts the generated two-dimensional code data protection through an encryption method, then the enterprise manager exchanges data information with other management users through the two-dimensional code, and decrypts the encrypted data through a decryption technology to obtain the authorized enterprise information manager to further obtain or share the encrypted data information.
6. The method according to claim 5, wherein the encryption medium is an end-to-end encryption medium based on digital envelopes, and the encryption medium comprises a data certificate repository, a key backup unit, a digital management certificate, and an input/output interface.
7. The method for managing business information using encryption of block chaining mnemonics as claimed in claim 5, wherein in said step (S3), wherein:
the process of generating the mnemonic words comprises the following steps:
generating a random number in a digital encryptor, wherein the length of the random number is 64-256 bits, then calculating any number of the 64-256 bits by using a random number hash algorithm, and taking the first n bits as a checksum, wherein the value of n is the quotient of the length of the random number and the number 32, and at the moment, creating the checksum of the random number;
then adding the checksum at the end of the random number, taking 12-bit data as a unit, splitting the recombined random number into different parts respectively containing 12 bits, and comparing the numerical value of each part containing 12 bits with a predefined mnemonic word library so as to convert the random number into mnemonic words consisting of words in an arrangement order;
in the step (S3), wherein:
the password distortion function is a Hash type algorithm function, a random type algorithm function or an SM9 identification password algorithm function, and the generation process of the password distortion function is as follows:
extracting mnemonic characteristic values according to mnemonic word information in a digital encryptor in a local block chain, generating a digital information function through a Hash algorithm function, a random algorithm function or an SM9 identification cryptographic algorithm function, and then determining a local warping algorithm according to a candidate warping algorithm provided by the generated digital information function, so that an enterprise manager calculates the local warping algorithm according to the characteristic values of the mnemonic words and then generates a cryptographic warping function of a local block chain account.
8. The method for managing business information using encryption of block chaining mnemonics as claimed in claim 5, wherein in said step (S4), said transaction password is a password confirmed during user transaction, and said transaction password is a character string of a combination of a word number and a digit number inputted into an encryption medium by a user.
9. The business information management method using block chain mnemonic encryption according to claim 5, wherein in the step (S5), the encryption method is performed by encapsulation of a digital envelope, and the encryption method may employ any one of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, symmetric encryption algorithm, IDEA, RC6 or CAST5, wherein the encryption method is performed by encapsulation using a digital envelope, wherein the steps of the encryption method are as follows:
(1) the enterprise management user encrypts the data information in the data encryptor through any one algorithm of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, symmetric encryption algorithm, IDEA, RC6 or CAST 5;
(2) during encryption, acquiring a digital certificate and a public key from a data certificate library;
(3) the user can then obtain the generated digital certificate and public key through a mobile phone or a smart device.
10. The method for managing enterprise information using encryption of block chaining mnemonics according to claim 5, wherein in said step (S5), said decryption algorithm is implemented by using a private key to disassemble a digital envelope, wherein said step of decryption method is:
(1) selecting a file to be decrypted through encryption software;
(2) the enterprise management user acquires a private KEY corresponding to the public KEY of the digital certificate from the USB-KEY;
(3) the enterprise management user adopts a private key and uses an RSA algorithm for decryption;
(4) a plaintext file is obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911297193.0A CN111027087B (en) | 2019-12-16 | 2019-12-16 | Enterprise information management system and method for encrypting mnemonics by applying block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911297193.0A CN111027087B (en) | 2019-12-16 | 2019-12-16 | Enterprise information management system and method for encrypting mnemonics by applying block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111027087A true CN111027087A (en) | 2020-04-17 |
CN111027087B CN111027087B (en) | 2022-06-21 |
Family
ID=70209207
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911297193.0A Active CN111027087B (en) | 2019-12-16 | 2019-12-16 | Enterprise information management system and method for encrypting mnemonics by applying block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111027087B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111597167A (en) * | 2020-05-18 | 2020-08-28 | 黄会仙 | Big data management system and method applying block chain technology |
CN111654364A (en) * | 2020-07-06 | 2020-09-11 | 重庆知翔科技有限公司 | Method for realizing data safety communication by using block chain encryption technology |
CN111770190A (en) * | 2020-07-06 | 2020-10-13 | 夏正键 | Block chain distributed real-time fire fighting monitoring alarm system based on 5G and Internet of things mode |
CN111831715A (en) * | 2020-05-25 | 2020-10-27 | 闽侯县人民检察院 | Intelligent access and certificate storage system and method based on artificial intelligence big data |
CN111949735A (en) * | 2020-08-26 | 2020-11-17 | 鲁泽军 | System and method for realizing data query by applying account book of block chain |
CN112039986A (en) * | 2020-08-28 | 2020-12-04 | 刘凤 | System and method for realizing information interaction among departments of enterprise |
CN112884474A (en) * | 2021-02-19 | 2021-06-01 | 上海源庐加佳信息科技有限公司 | Block chain wallet mnemonic word generating and importing method, system and terminal |
CN113159766A (en) * | 2021-04-13 | 2021-07-23 | 浙江数链科技有限公司 | Data protection method, device, system, electronic device and storage medium |
CN113364590A (en) * | 2021-06-07 | 2021-09-07 | 重庆高新技术产业研究院有限责任公司 | Block chain encryption method for production process data of multiple types of enterprises |
CN114140082A (en) * | 2021-12-02 | 2022-03-04 | 网娱互动科技(北京)股份有限公司 | Enterprise content management system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101017562A (en) * | 2006-11-28 | 2007-08-15 | 南京大学 | Method for generating electronic invoice and interactively using based on communication network |
CN108764695A (en) * | 2018-05-23 | 2018-11-06 | 江苏涞哲信息科技有限公司 | A kind of food security traceability system and method based on block chain technology |
CN109360009A (en) * | 2018-11-27 | 2019-02-19 | 广州网打尽电子商务有限公司 | A kind of tracing system based on block chain |
CN109560938A (en) * | 2019-01-23 | 2019-04-02 | 广州微盾科技股份有限公司 | Based on the block catenary system for referring to human body biological characteristics identification technology |
CN109698752A (en) * | 2018-11-29 | 2019-04-30 | 南京南瑞信息通信科技有限公司 | A kind of ERP System based on block chain |
CN110084599A (en) * | 2019-04-28 | 2019-08-02 | 百度在线网络技术(北京)有限公司 | Cipher key processing method, device, equipment and storage medium |
CN110189144A (en) * | 2019-05-07 | 2019-08-30 | 上海趣链信息科技有限公司 | A kind of source tracing method and system based on block chain |
-
2019
- 2019-12-16 CN CN201911297193.0A patent/CN111027087B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101017562A (en) * | 2006-11-28 | 2007-08-15 | 南京大学 | Method for generating electronic invoice and interactively using based on communication network |
CN108764695A (en) * | 2018-05-23 | 2018-11-06 | 江苏涞哲信息科技有限公司 | A kind of food security traceability system and method based on block chain technology |
CN109360009A (en) * | 2018-11-27 | 2019-02-19 | 广州网打尽电子商务有限公司 | A kind of tracing system based on block chain |
CN109698752A (en) * | 2018-11-29 | 2019-04-30 | 南京南瑞信息通信科技有限公司 | A kind of ERP System based on block chain |
CN109560938A (en) * | 2019-01-23 | 2019-04-02 | 广州微盾科技股份有限公司 | Based on the block catenary system for referring to human body biological characteristics identification technology |
CN110084599A (en) * | 2019-04-28 | 2019-08-02 | 百度在线网络技术(北京)有限公司 | Cipher key processing method, device, equipment and storage medium |
CN110189144A (en) * | 2019-05-07 | 2019-08-30 | 上海趣链信息科技有限公司 | A kind of source tracing method and system based on block chain |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111597167A (en) * | 2020-05-18 | 2020-08-28 | 黄会仙 | Big data management system and method applying block chain technology |
CN111831715A (en) * | 2020-05-25 | 2020-10-27 | 闽侯县人民检察院 | Intelligent access and certificate storage system and method based on artificial intelligence big data |
CN111654364A (en) * | 2020-07-06 | 2020-09-11 | 重庆知翔科技有限公司 | Method for realizing data safety communication by using block chain encryption technology |
CN111770190A (en) * | 2020-07-06 | 2020-10-13 | 夏正键 | Block chain distributed real-time fire fighting monitoring alarm system based on 5G and Internet of things mode |
CN111949735A (en) * | 2020-08-26 | 2020-11-17 | 鲁泽军 | System and method for realizing data query by applying account book of block chain |
CN112039986A (en) * | 2020-08-28 | 2020-12-04 | 刘凤 | System and method for realizing information interaction among departments of enterprise |
CN112884474A (en) * | 2021-02-19 | 2021-06-01 | 上海源庐加佳信息科技有限公司 | Block chain wallet mnemonic word generating and importing method, system and terminal |
CN113159766A (en) * | 2021-04-13 | 2021-07-23 | 浙江数链科技有限公司 | Data protection method, device, system, electronic device and storage medium |
CN113364590A (en) * | 2021-06-07 | 2021-09-07 | 重庆高新技术产业研究院有限责任公司 | Block chain encryption method for production process data of multiple types of enterprises |
CN114140082A (en) * | 2021-12-02 | 2022-03-04 | 网娱互动科技(北京)股份有限公司 | Enterprise content management system |
CN114140082B (en) * | 2021-12-02 | 2022-08-05 | 网娱互动科技(北京)股份有限公司 | Enterprise content management system |
Also Published As
Publication number | Publication date |
---|---|
CN111027087B (en) | 2022-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111027087B (en) | Enterprise information management system and method for encrypting mnemonics by applying block chain | |
US10419416B2 (en) | Encryption and decryption techniques using shuffle function | |
CN112929172B (en) | System, method and device for dynamically encrypting data based on key bank | |
CN111931250B (en) | Multiparty safe calculation integrated machine | |
CN113067699B (en) | Data sharing method and device based on quantum key and computer equipment | |
US20070189541A1 (en) | Method and system for initialzing a key management system | |
CN111431713B (en) | Private key storage method and device and related equipment | |
KR20230157929A (en) | Transfer cryptocurrency from a remote access restricted wallet | |
CN111654364A (en) | Method for realizing data safety communication by using block chain encryption technology | |
US10630486B2 (en) | Multiparty computation for approving digital transaction by utilizing groups of key shares | |
CN104158827B (en) | Ciphertext data sharing method, device, inquiry server and upload data client | |
CN110419193A (en) | Certification and communication means and its system for safe and intelligent domestic environment based on KSI | |
CN112039986A (en) | System and method for realizing information interaction among departments of enterprise | |
CN108881240B (en) | Member privacy data protection method based on block chain | |
CN106060073A (en) | Channel key negotiation method | |
CN113824551B (en) | Quantum key distribution method applied to secure storage system | |
CN111882410A (en) | Tax information query method and system based on block chain | |
CN116108410A (en) | Identity credential generation method and device | |
CN109274646A (en) | Key management client server side method, system and medium based on KMIP protocol | |
CN111181920A (en) | Encryption and decryption method and device | |
CN114154181A (en) | Privacy calculation method based on distributed storage | |
CN109214921B (en) | File encryption transmission method based on cloud computing | |
Lavanya et al. | Secured two factor authentication, graph based replication and encryption strategy in cloud computing | |
CN106779645B (en) | Information encryption method and device | |
CN105025032A (en) | Customer management server with encrypted authentication function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |