CN111027087B - Enterprise information management system and method for encrypting mnemonics by applying block chain - Google Patents

Enterprise information management system and method for encrypting mnemonics by applying block chain Download PDF

Info

Publication number
CN111027087B
CN111027087B CN201911297193.0A CN201911297193A CN111027087B CN 111027087 B CN111027087 B CN 111027087B CN 201911297193 A CN201911297193 A CN 201911297193A CN 111027087 B CN111027087 B CN 111027087B
Authority
CN
China
Prior art keywords
information
data
encryption
enterprise
layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911297193.0A
Other languages
Chinese (zh)
Other versions
CN111027087A (en
Inventor
林伟
徐建俤
徐日胜
刘浩
吕燕红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wisdom Valley Xiamen Wulian Technology Co ltd
Original Assignee
Wisdom Valley Xiamen Wulian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wisdom Valley Xiamen Wulian Technology Co ltd filed Critical Wisdom Valley Xiamen Wulian Technology Co ltd
Priority to CN201911297193.0A priority Critical patent/CN111027087B/en
Publication of CN111027087A publication Critical patent/CN111027087A/en
Application granted granted Critical
Publication of CN111027087B publication Critical patent/CN111027087B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Power Engineering (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

An enterprise information management system and method for encrypting a block chaining mnemonic word, the system comprising: an information encryption layer: the system is used for encrypting the enterprise information management database, so that enterprise information data are in a safe state in the transmission process, and the data are prevented from being lost in the transmission process; an information transfer layer: the information transmission layer is used for transmitting the enterprise information management data encrypted by the information encryption layer, so that the enterprise information management data is transmitted from an enterprise information database to an information upper layer management center, and the information transmission layer comprises a blockchain system and a blockchain network in the blockchain system; a data sharing layer: the enterprise information management data is shared or transmitted among different users or different servers; an information application layer: the method is used for inquiring, tracing, researching or managing the enterprise information management data. The invention introduces the encryption method of the block chain mnemonic words, thereby greatly increasing the security of the enterprise information management data.

Description

Enterprise information management system and method for encrypting mnemonics by applying block chain
Technical Field
The invention relates to the technical field of enterprise management, in particular to a system and a method for realizing enterprise information management by encrypting a block chain mnemonic word.
Background
An enterprise information management system (EMS) is a management system which uses modern management ideas and methods, takes a computer as a medium, utilizes computer software and network communication technology, and helps enterprises to process daily matters in the processes of production, management, enterprise decision, information collection, storage, processing and analysis until a decision scheme is developed and the work is optimized, and simultaneously tracks, monitors, controls and adjusts. Generally, an enterprise information management system comprises two parts, namely an office level and a business system, has five entities, comprises the characteristics of industrial experts and the characteristics of practical application, has systematicness and integrity, can collect and share historical information, and has the characteristics of decision support and dynamic change according to information change. A complete enterprise information management system plays a role in supporting and protecting enterprise production and business activities well, particularly plays a role in defining responsibility and division of labor in multiple departments of an enterprise, achieving paperless office work, adjusting and optimizing internal departments, and shows the paperless office work, adjusting and optimizing internal departments and making accurate prediction for market development.
In enterprise management, scientific and effective management is an important basis for development of survival and struggle of modern enterprises. With the continuous development of information technology and the continuous deepening of enterprise innovation in China, the enterprise management mode is changing to innovation management and knowledge management. In order to adapt to the change of enterprise management modes in the new period, enterprises need to strengthen informatization construction. The enterprise informatization construction is a revolution, and has practical and profound significance in the aspects of improving the enterprise management level, promoting the management modernization, converting the operation mechanism, establishing the modern enterprise management system, effectively reducing the cost, accelerating the technical progress, enhancing the market competitiveness, improving the economic benefit and the like.
The private key is a key created by a user who performs a transaction and used only by the private key, and the security of the private key is mainly considered from the aspects of storage, creation and use of the private key. The general private key creation method is that a user inputs a password through an application client, and then the password input by the user is encrypted through an encryption chip to generate a private key. If the user forgets the password or the password of the user is stolen, the private key corresponding to the password can be easily cracked according to the encryption algorithm. In addition, if a bug exists in the storage process or the storage medium of the private key or an unsafe factor exists in the use process of the private key, the private key is easy to steal. Therefore, in the existing enterprise information management system (EMS), because of the dispersed management of enterprise information, the monotonous layout and the poor confidentiality of enterprise information, the coordination and the coordination among all departments are poor, data and information among all the departments are difficult to exchange and share, the operation and maintenance of the system are unreliable and convenient, which brings great inconvenience to enterprise management and can not effectively mobilize the working enthusiasm of employees.
Disclosure of Invention
Aiming at the defects of the prior art, the invention discloses a system and a method for realizing enterprise information management by encrypting a block chain mnemonic word.
The invention adopts the following technical scheme:
an enterprise information management system employing blockchain mnemonic encryption, the system comprising:
an information encryption layer: the enterprise information management system comprises an information confidentiality layer, an information management layer and a digital encryptor, wherein the information confidentiality layer is used for encrypting an enterprise information management database to ensure that enterprise information data are in a safe state in a transmission process and avoid data loss in the transmission process, the information confidentiality layer is used for encrypting the enterprise information management data by arranging the data encryptor in the information confidentiality layer, and the digital encryptor is provided with a mnemonic word storage unit for storing enterprise information management data encryption information;
information transfer layer: the information transmission layer is used for transmitting the enterprise information management data encrypted by the information encryption layer, so that the enterprise information management data is transmitted from an enterprise information database to an information upper layer management center, and the information transmission layer comprises a blockchain system and a blockchain network in the blockchain system;
a data sharing layer: the enterprise information management data is shared or transmitted among different users or different servers;
an information application layer: the enterprise information management system is used for inquiring, tracing, researching or managing enterprise information management data and realizing information interaction with an upper management center or a cloud server; wherein:
as a further technical solution of the present invention, an output end of the information encryption layer is connected to an input end of the information transfer layer, an output end of the information transfer layer is connected to an input end of the information sharing layer, an output end of the information sharing layer is connected to an input end of the information application layer, and an output end of the information application layer is connected to an input end of the information upper management center or the cloud server.
As a further technical scheme of the invention, the mnemonic words are character strings of Pin codes or letter and number combinations generated by UTF-8 coding.
As a further technical scheme of the invention, the information sharing layer realizes the transfer or transmission of enterprise information data by setting the node server.
As a further technical scheme of the invention, the data encryptor is provided with an encryption medium which is compatible with more than two format addresses.
The invention also adopts the following technical scheme:
an enterprise information management method for encrypting a block chaining mnemonic word, comprising the following steps of:
(S0) starting, in the data encryptor, an initialization operation is performed on the encrypted data information so that, when the data is encrypted, no history encryption trace is contained so that the encrypted information is the latest input information;
(S1) the business manager inputting a mnemonic in the encryption medium in the data encryptor;
(S2) generating a mnemonic address in the digital encryptor, at which a mnemonic sequence type and a number of digits of the mnemonic sequence in the instruction in the encryptor are acquired;
(S3) generating a password distortion function of the local user according to the mnemonic word information of the local block chain account;
(S4) generating a warped transaction password for the local user based on the transaction password for the local user and the password warping function;
(S5) the authorized manager signs the generated secret key to generate a two-dimensional code, the enterprise manager encrypts the generated two-dimensional code data protection by an encryption method, then the enterprise manager exchanges data information with other management users through the two-dimensional code, and decrypts the encrypted data through a decryption technology to obtain the authorized enterprise information manager to further obtain or share the encrypted data information.
As a further technical solution of the present invention, the encryption medium is an end-to-end encryption medium based on a digital envelope, and the encryption medium includes a data certificate repository, a key backup unit, a digital management certificate, and an output/input interface.
As a further technical solution of the present invention, in the step (S3), wherein:
the process of generating the mnemonic words comprises the following steps:
generating a random number in a digital encryptor, wherein the length of the random number is 64-256 bits, then calculating any number of the 64-256 bits by using a random number hash algorithm, and taking the first n bits as a checksum, wherein the value of n is the quotient of the length of the random number and the number 32, and at the moment, creating the checksum of the random number;
then adding the checksum at the end of the random number, taking 12-bit data as a unit, splitting the recombined random number into different parts respectively containing 12 bits, and comparing the numerical value of each part containing 12 bits with a predefined mnemonic word library so as to convert the random number into mnemonic words consisting of words in an arrangement order;
in the step (S3), wherein:
the password distortion function is a Hash type algorithm function, a random type algorithm function or an SM9 identification password algorithm function, and the generation process of the password distortion function is as follows:
extracting mnemonic characteristic values according to mnemonic word information in a digital encryptor in a local block chain, generating a digital information function through a Hash algorithm function, a random algorithm function or an SM9 identification cryptographic algorithm function, and then determining a local warping algorithm according to a candidate warping algorithm provided by the generated digital information function, so that an enterprise manager calculates the local warping algorithm according to the characteristic values of the mnemonic words and then generates a cryptographic warping function of a local block chain account.
As a further technical solution of the present invention, in the step (S4), the transaction password is a password confirmed during a user transaction, and the transaction password is a character string of a combination of a number of words and a number input into the encryption medium by the user.
As a further technical solution of the present invention, in the step (S5), the encryption method is completed by encapsulation of a digital envelope, and the encryption method may employ any one of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, symmetric encryption algorithm, IDEA, RC6, or CAST5, wherein the encryption method is completed by encapsulation using a digital envelope, wherein the steps of the encryption method are:
(1) the enterprise management user encrypts the data information in the data encryptor through any one algorithm of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, symmetric encryption algorithm, IDEA, RC6 or CAST 5;
(2) during encryption, acquiring a digital certificate and a public key from a data certificate library;
(3) the user can then obtain the generated digital certificate and public key through a mobile phone or a smart device.
As a further technical solution of the present invention, the decryption algorithm is implemented by using a private key to disassemble a digital envelope, wherein the decryption method comprises the steps of:
(1) selecting a file to be decrypted through encryption software;
(2) the enterprise management user acquires a private KEY corresponding to the public KEY of the digital certificate from the USB-KEY;
(3) the enterprise management user adopts a private key and uses an RSA algorithm for decryption;
(4) a plaintext file is obtained.
Has the positive and beneficial effects that:
the block chain technology is introduced into enterprise information management, and an enterprise information management system consisting of an information encryption layer, an information transmission layer, an information sharing layer and an information application layer is constructed to realize encryption processing of enterprise information management; the invention also introduces a block chain encryption method, and realizes enterprise information management by mnemonic word encryption, and the mnemonic word algorithm of the invention is randomly used by enterprise management users, thereby greatly increasing the security performance of data.
Drawings
Fig. 1 is a schematic structural block diagram of an enterprise information management system using block chaining mnemonic encryption according to the present invention;
FIG. 2 is a flowchart of an enterprise information management method using block chain mnemonic encryption according to the present invention;
FIG. 3 is a schematic diagram illustrating a data sharing process of an enterprise information management method using block chain mnemonic encryption according to the present invention;
FIG. 4 is a block chain architecture diagram illustrating an enterprise information management method using encryption of mnemonic words in a block chain according to the present invention;
FIG. 5 is a block head diagram of a block chain structure of an enterprise information management method using encryption of block chain mnemonic words according to the present invention;
FIG. 6 is a block chain data structure diagram of an enterprise information management method using encryption of mnemonic words in a block chain according to the present invention;
FIG. 7 is a block chain Fabric platform architecture diagram of an enterprise information management method using block chain mnemonic encryption according to the present invention;
fig. 8 is a block chain node architecture diagram of an enterprise information management method using block chain mnemonic encryption according to the present invention.
Fig. 9 is a schematic diagram illustrating an encryption method in an enterprise information management method using block chain mnemonic encryption according to the present invention;
FIG. 10 is a diagram illustrating a decryption method in an enterprise information management method using encryption of block chaining mnemonic words according to the present invention;
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, and it should be understood that the embodiments described herein are merely for the purpose of illustrating and explaining the present invention and are not intended to limit the present invention.
As shown in fig. 1, an enterprise information management system applying block chain mnemonic encryption, the system includes:
an information encryption layer: the enterprise information management system comprises an information confidentiality layer, an information management layer and a digital encryptor, wherein the information confidentiality layer is used for encrypting an enterprise information management database to ensure that enterprise information data are in a safe state in a transmission process and avoid data loss in the transmission process, the information confidentiality layer is used for encrypting the enterprise information management data by arranging the data encryptor in the information confidentiality layer, and the digital encryptor is provided with a mnemonic word storage unit for storing enterprise information management data encryption information;
an information transfer layer: the information transmission layer is used for transmitting the enterprise information management data encrypted by the information encryption layer, so that the enterprise information management data is transmitted from an enterprise information database to an information upper layer management center, and the information transmission layer comprises a blockchain system and a blockchain network in the blockchain system;
a data sharing layer: the enterprise information management data is shared or transmitted among different users or different servers;
an information application layer: the enterprise information management system is used for inquiring, tracing, researching or managing enterprise information management data and realizing information interaction with an upper management center or a cloud server; wherein:
the output end of the information encryption layer is connected with the input end of the information transmission layer, the output end of the information transmission layer is connected with the input end of the information sharing layer, the output end of the information sharing layer is connected with the input end of the information application layer, and the output end of the information application layer is connected with the input end of the information upper management center or the cloud server.
In this way, encryption processing and remote information management of enterprise information management are realized.
In the above embodiment, the mnemonic word is a character string that generates Pin code or a combination of letters and numbers by UTF-8 encoding.
In the above embodiment, the information sharing layer implements transfer or transmission of the enterprise information data by setting the node server.
In the above embodiment, the data encryptor is provided with an encryption medium compatible with two or more format addresses.
As shown in fig. 2, an enterprise information management method applying block chain mnemonic encryption includes the following steps:
(S0) starting, in the data encryptor, an initialization operation is performed on the encrypted data information so that, when the data is encrypted, no history encryption trace is contained so that the encrypted information is the latest input information;
(S1) the business manager inputting a mnemonic in the encryption medium in the data encryptor;
(S2) generating a mnemonic address in the digital encryptor, at which a mnemonic sequence type and a number of digits of the mnemonic sequence in the instruction in the encryptor are acquired;
(S3) generating a password distortion function of the local user according to the mnemonic word information of the local block chain account;
(S4) generating a warped transaction password for the local user based on the transaction password for the local user and the password warping function;
(S5) the authorized manager signs the generated secret key to generate a two-dimensional code, the enterprise manager encrypts the generated two-dimensional code data protection through an encryption method, then the enterprise manager exchanges data information with other management users through the two-dimensional code, and decrypts the encrypted data through a decryption technology to obtain the authorized enterprise information manager to further obtain or share the encrypted data information.
Through the embodiment, the enterprise information management adopting the encryption of the block chain mnemonic words is realized.
Before the above embodiments are described, the following description of the block chain technique applied herein is made.
As shown in fig. 3, fig. 3 is a schematic diagram of a data sharing process of an enterprise information management method for encrypting mnemonic words by using a blockchain, in the structure, a blockchain is a supporting platform based on a Hyperhedger Fabric modular blockchain solution by using a software platform, an enterprise information management system used by the blockchain generally comprises a management application layer, a blockchain network, an access layer and a department service system, and the data are transmitted and shared after being processed by the blockchain management system.
As shown in fig. 4, fig. 4 is a block chain architecture diagram of an enterprise information management method using encryption of block chain mnemonic words according to the present invention; the method for realizing data sharing through fig. 4 is as follows: the method comprises a data sending process and a data receiving process.
In the data transmission flow, the method comprises the following steps:
(1) the department service system packs data according to a service definition standard; the block chain management system is internally provided with intelligent bracelet organization business data, and then the business data are distributed;
(2) calling a data submission method of the SD K, and submitting a data attribution main body and packaged service data;
(3) the SD K inquires a public key of a data attribution main body on the node machine, and if the public key cannot be found, a data decryption center interface is called to obtain the public key;
(4) the SDK encrypts the packed service data by using the public key to generate encrypted packed service data;
(5) the SDK uses a Certification Authority (CA) private key signature of a service department together with the data attribution main body and the encrypted packed service data;
(6) and calling the interface of the node machine to submit data, and executing data saving action after the signature is verified successfully by the node machine.
In the data receiving process, the method comprises the following steps:
(1) the SDK signs the query request by using an C A private key of the service department;
(2) the SDK calls a node machine query interface, and the node machine executes a query action and returns encrypted service data after successfully verifying the signature;
(3) the SDK submits the encrypted service data to a decryption center through a hypertext transfer protocol over secure socket layer (HTTPS) channel to be decrypted to obtain decrypted service data;
(4) the SDK returns the decrypted service data.
As shown in fig. 5, fig. 5 is a block head diagram of a block chain structure of an enterprise information management method using encryption of block chain mnemonic words according to the present invention; the block chain is called a distributed database which is jointly maintained by multiple parties, decentralized, traceable and not falsifiable, and is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. The method can pack request data in a certain period into a data block (block) through a cryptography technology, and connect the data block into a chain structure for storage according to time sequence by using Hash fingerprints. A data block is typically composed of two parts, a block header and a block body. The block header usually stores data such as the version number of the system, the hash value of the previous block, the merkle root, and the timestamp, and the block body contains detailed request data.
As shown in fig. 6, fig. 6 is a schematic diagram of a data architecture in a blockchain of an enterprise information management method for encrypting mnemonic words by using a blockchain according to the present invention, where the blockchain is called a multi-party commonly maintained, decentralized, traceable, and non-falsifiable distributed database, and is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a common recognition mechanism, and an encryption algorithm. Request data in a certain period can be packed into a data block (block) through a cryptographic technology, and the data block is connected into a chain structure for storage according to time sequence by using a Hash fingerprint. A data block is typically composed of two parts, a block header and a block body. The block header usually stores data such as a system version number, a hash value of a previous block, a marker root, and a timestamp, and the block body contains detailed request data.
Fig. 7 is a block chain Fabric platform architecture diagram of an enterprise information management method using block chain mnemonic encryption according to the present invention, and is shown in fig. 7. The block chain platform is a support platform of a modularized block chain solution based on Hyperridge Fabric. The Fabric platform is an alliance chain structure, supports an intelligent contract technology, does not depend on tokens when the system operates, can support about hundred transactions per second and basically meets the requirement of cross-organization transactions of digital assets between alliances. In addition, Fabric adopts a modular architecture, wherein a consensus algorithm and the like can be used as a pluggable module for a user to choose. Meanwhile, the method can lead a user to redesign and develop a specific module according to the self requirement, so that the Fabric is selected as a block chain foundation platform of the digital asset transaction system. The Fabric mainly comprises member service modules (Membership Services), block chain service modules (Blockchain Services) and chain code service modules (Chaincode Services). The member service module mainly provides functions of member registration, identity management, transaction examination and the like, and performs mechanism registration authentication and transaction authentication through a registration certificate issuing mechanism (ECA) and a transaction authentication center (TCA). The block chain service module is mainly responsible for point-to-point communication between nodes, consensus, and the storage of account book data. The chain code service module provides intelligent contract service, provides a safe contract running environment and the like. Meanwhile, the platform realizes asynchronous communication through an Event Stream (Event Stream) between all the components.
As shown in fig. 8, fig. 8 is a block chain node architecture diagram of an enterprise information management method using block chain mnemonic encryption according to the present invention. The block chain nodes are connected in a chain manner, namely the block chain nodes are connected and communicated with each other through a block chain network, and the nodes are connected in a chain manner, so that information interaction among different nodes can be realized. When data sharing is carried out, the data of the intelligent bracelets are alternated and shared through different data nodes.
Therefore, the block chain applied in the method can realize the safety of enterprise information management and timely data transmission. The following description is directed to mnemonic confidentiality techniques using blockchains.
In the above embodiment, the encryption medium is an end-to-end encryption medium based on a digital envelope, and the encryption medium includes a data certificate library, a key backup unit, a digital management certificate, and an input/output interface.
In the step (S3), wherein: the process of generating the mnemonic words comprises the following steps:
generating a random number in a digital encryptor, wherein the length of the random number is 64-256 bits, then calculating any number of the 64-256 bits by using a random number hash algorithm, and taking the first n bits as a checksum, wherein the value of n is the quotient of the length of the random number and the number 32, and at the moment, creating the checksum of the random number;
then, adding a checksum at the tail of the random number, taking 12-bit data as a unit, splitting the recombined random number into different parts respectively containing 12 bits, and comparing the numerical value of each part containing 12 bits with a pre-defined mnemonic word library so as to convert the random number into mnemonic words consisting of words in an arrangement order;
in the step (S3), wherein:
the password distortion function is a Hash type algorithm function, a random type algorithm function or an SM9 identification password algorithm function, and the generation process of the password distortion function is as follows:
extracting mnemonic characteristic values according to mnemonic word information in a digital encryptor in a local block chain, generating a digital information function through a Hash algorithm function, a random algorithm function or an SM9 identification cryptographic algorithm function, and then determining a local warping algorithm according to a candidate warping algorithm provided by the generated digital information function, so that an enterprise manager calculates the local warping algorithm according to the characteristic values of the mnemonic words and then generates a cryptographic warping function of a local block chain account.
In the step (S4), the transaction password is a password confirmed during a user transaction, and the transaction password is a character string of a combination of a number of words and a number input into the encryption medium by the user.
In one embodiment, the following strings are encrypted:
iCq94rpu4aUGnTQqhsMwQpxihPe41qRBTXmWIL2Py32lGB3mekesExrpH0BiqaJo4QiO
Y96Ezk589n9El9en5Q09nTDtEC3W3OAb0rittacLmmaRqJcC6al9HOjj7O2AvNhJrTVplu4FzZ3768iFo5ryjrreApQCGdDp7kgGWf05bcR6bm5f7w1eTuwknfwmGTkd
the SM9 identification cryptographic algorithm function encryption is carried out on the characteristic value data, and the obtained encrypted private key is as follows:
018e99eca36057a35506de50cafb9ad9;
mnemonics in the SM9 wallet are: siege violin trap power rod closed loop
The priority swift help town, totally 12 English words, and then use the above-mentioned private key to carry on DES encryption to the mnemonic word, get the mnemonic word character string after encrypting:
dSTzm8fljnSN3PTd2PC8E8qpKgXQ9XwbgobMs4uJwMBeZopozMb2V0WE+
ZXd5o1asAX2iB+ruIhexcJRMtpNV2Lz9ISDWLho2Lhs3QXf8zU=;
and then converting the mnemonic word character string into 16-system data, wherein the converted data is as follows:
6453547a6d38666c6a6e534e3350546432504338453871704b67585139587762676f624d7334754a774d42655a6f706f7a4d6232563057452b5a5864356f31617341583269422b727549686578634a524d74704e56324c7a39495344574c686f324c687333515866387a553d;
finally, the 16-system data is transmitted and stored to the Ether house block chain through the Ether house intelligent contract, and finally, the data is stored
In the form of:
0x6453547a6d38666c6a6e534e3350546432504338453871704b67585139587762676f624d7334754a774d42655a6f706f7a4d6232563057452b5a5864356f31617341583269422b727549686578634a524d74704e56324c7a39495344574c686f324c687333515866387a553d。
as shown in fig. 9, in the step (S5), the encryption method is completed by encapsulation of a digital envelope, and the encryption method may employ any one of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, symmetric encryption algorithm, IDEA, RC6, or CAST5, wherein the encryption method is completed by encapsulation using a digital envelope, wherein the steps of the encryption method are:
(1) the enterprise management user encrypts the data information in the data encryptor through any one algorithm of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, symmetric encryption algorithm, IDEA, RC6 or CAST 5;
(2) during encryption, acquiring a digital certificate and a public key from a data certificate library;
(3) the user can then obtain the generated digital certificate and public key through a mobile phone or a smart device.
As shown in fig. 10, in the step (S5), the decryption algorithm is implemented by using a private key to tear down a digital envelope, wherein the steps of the decryption method are as follows:
(1) selecting a file to be decrypted through encryption software; in this step, the encryption software automatically encrypts data written to the storage medium at the operating system level as required, and in other implementations, the present invention is implemented by loading mnemonics.
(2) The enterprise management user acquires a private KEY corresponding to the public KEY of the digital certificate from the USB-KEY;
(3) the enterprise management user adopts a private key and uses an RSA algorithm for decryption;
(4) a plaintext file is obtained.
Although specific embodiments of the present invention have been described above, it will be understood by those skilled in the art that these specific embodiments are merely illustrative and that various omissions, substitutions and changes in the form of the detail of the methods and systems described above may be made by those skilled in the art without departing from the spirit and scope of the invention. For example, it is within the scope of the present invention to combine the steps of the above-described methods to perform substantially the same function in substantially the same way to achieve substantially the same result. Accordingly, the scope of the invention is to be limited only by the following claims.

Claims (2)

1. An enterprise information management system for encrypting an application block chain mnemonic word is characterized in that: the system comprises:
an information encryption layer: the enterprise information management system comprises an information encryption layer, a data encryption device and a mnemonic word storage unit, wherein the information encryption layer is used for encrypting an enterprise information management database, so that enterprise information data are in a safe state in a transmission process and are prevented from being lost in the transmission process, the information encryption layer is used for encrypting the enterprise information management data by arranging the data encryption device in the information encryption layer, and the data encryption device is provided with the mnemonic word storage unit for storing enterprise information management data encryption information;
information transfer layer: the information transmission layer is used for transmitting the enterprise information management data encrypted by the information encryption layer, so that the enterprise information management data is transmitted from an enterprise information database to an information upper layer management center, and the information transmission layer comprises a blockchain system and a blockchain network in the blockchain system;
a data sharing layer: the enterprise information management data is shared or transmitted among different users or different servers;
an information application layer: the enterprise information management system is used for inquiring, tracing, researching or managing enterprise information management data and realizing information interaction with an upper management center or a cloud server; wherein:
the output end of the information encryption layer is connected with the input end of the information transmission layer, the output end of the information transmission layer is connected with the input end of the information sharing layer, the output end of the information sharing layer is connected with the input end of the information application layer, and the output end of the information application layer is connected with the input end of the information upper layer management center or the cloud server;
the mnemonic words are character strings of Pin codes or letter and number combinations generated by UTF-8 coding; the information sharing layer realizes the transfer or transmission of enterprise information data by setting a node server; the data encryptor is provided with an encryption medium compatible with two or more format addresses.
2. An enterprise information management method for encrypting an application block chain mnemonic word is characterized by comprising the following steps: the method comprises the following steps:
(S0) starting with initializing operation of the encrypted data information in the data encryptor so that the encrypted data information does not contain a history encryption trace when the data is encrypted, so that the encrypted information is newly input information;
(S1) the business manager inputting a mnemonic in the encryption medium in the data encryptor;
(S2) generating a mnemonic word address in the data encryptor, at which a mnemonic word sequence type and a number of digits of the mnemonic word sequence in the instruction in the encryptor are acquired;
(S3) generating a password distortion function of the local user according to the mnemonic word information of the local block chain account;
the password distortion function is a Hash type algorithm function, a random type algorithm function or an SM9 identification password algorithm function, and the generation process of the password distortion function is as follows:
extracting mnemonic characteristic values according to mnemonic word information in a data encryptor in a local block chain, generating a digital information function through a Hash algorithm function, a random algorithm function or an SM9 identification cryptographic algorithm function, and then determining a local warping algorithm according to a candidate warping algorithm provided by the generated digital information function, so that an enterprise manager calculates the local warping algorithm according to the characteristic values of the mnemonic words and then generates a cryptographic warping function of a local block chain account;
the encryption medium is end-to-end based on the digital envelope, and comprises a data certificate library, a key backup unit, a digital management certificate and an output/input interface; in step (S3), wherein:
the process of generating the mnemonic words comprises the following steps:
generating a random number in a data encryptor, wherein the length of the random number is 64-256 bits, then calculating any number of the 64-256 bits by using a random number hash algorithm, and taking the first n bits as a checksum, wherein the value of n is the quotient of the length of the random number and the number 32, and at the moment, creating the checksum of the random number;
then adding the checksum at the end of the random number, taking 12-bit data as a unit, splitting the recombined random number into different parts respectively containing 12 bits, and comparing the numerical value of each part containing 12 bits with a predefined mnemonic word library so as to convert the random number into mnemonic words consisting of words in an arrangement order;
(S4) generating a warped transaction password for the local user based on the transaction password for the local user and the password warping function;
the transaction password is a password confirmed during user transaction, and the transaction password is a character string of the combination of the number of words and the number input into the encryption medium by the user;
the following strings are encrypted:
iCq94rpu4aUGnTQqhsMwQpxihPe41qRBTXmWIL2Py32lGB3mekesExrpH0BiqaJo4QiO
Y96Ezk589n9El9en5Q09nTDtEC3W3OAb0rittacLmmaRqJcC6al9HOjj7O2AvNhJrTVplu4FzZ3768iFo5ryjrreApQCGdDp7kgGWf05bcR6bm5f7w1eTuwknfwmGTkd;
SM9 identifies the private key after cryptographic algorithm function encryption as:
018e99eca36057a35506de50cafb9ad9;
mnemonics in the SM9 wallet are: the siege violin trap power empty priority shift help own is a total of 12 English words, and the secret key is used for DES encryption on the mnemonic word to obtain an encrypted mnemonic word character string:
dSTzm8fljnSN3PTd2PC8E8qpKgXQ9XwbgobMs4uJwMBeZopozMb2V0WE+ZXd5o1asAX2iB+ruIhexcJRMtpNV2Lz9ISDWLho2Lhs3QXf8zU=;
and converting the mnemonic word character string into 16-system data, wherein the converted data is as follows:
6453547a6d38666c6a6e534e3350546432504338453871704b67585139587762676f624d7334754a774d42655a6f706f7a4d6232563057452b5a5864356f31617341583269422b727549686578634a524d74704e56324c7a39495344574c686f324c687333515866387a553d;
and finally, transmitting and storing the 16-system data to an Ethernet bay block chain through an Ethernet bay intelligent contract, wherein the final storage form is as follows:
0x6453547a6d38666c6a6e534e3350546432504338453871704b67585139587762676f624d7334754a774d42655a6f706f7a4d6232563057452b5a5864356f31617341583269422b727549686578634a524d74704e56324c7a39495344574c686f324c687333515866387a553d;
(S5) the authorized manager signs the generated secret key to generate a two-dimensional code, the enterprise manager encrypts the generated two-dimensional code data protection by an encryption method, then the enterprise manager exchanges data information with other management users through the two-dimensional code, decrypts the encrypted data through a decryption technology, and acquires the authorized enterprise information manager to acquire or share the encrypted data information;
in the step (S5), the encryption method is completed by the encapsulation of the digital envelope, and the encryption method may adopt any one of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, IDEA, RC6, or CAST5, wherein the encryption method is completed by the encapsulation using the digital envelope, wherein the steps of the encryption method are:
(1) the enterprise management user encrypts the data information in the data encryptor through any one algorithm of DES, 3DES, Blowfish encryption algorithm, Twofish encryption algorithm, IDEA, RC6 or CAST 5;
(2) during encryption, acquiring a digital certificate and a public key from a data certificate library;
(3) then, the user can obtain the generated digital certificate and the public key through the mobile phone or the intelligent equipment;
in step (S5), the decryption algorithm is implemented by using a private key to tear down the digital envelope, wherein the steps of the decryption method are:
(1) selecting a file to be decrypted through encryption software;
(2) the enterprise management user acquires a private KEY corresponding to the public KEY of the digital certificate from the USB-KEY;
(3) the enterprise management user adopts a private key and uses an RSA algorithm for decryption;
(4) a plaintext file is obtained.
CN201911297193.0A 2019-12-16 2019-12-16 Enterprise information management system and method for encrypting mnemonics by applying block chain Active CN111027087B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911297193.0A CN111027087B (en) 2019-12-16 2019-12-16 Enterprise information management system and method for encrypting mnemonics by applying block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911297193.0A CN111027087B (en) 2019-12-16 2019-12-16 Enterprise information management system and method for encrypting mnemonics by applying block chain

Publications (2)

Publication Number Publication Date
CN111027087A CN111027087A (en) 2020-04-17
CN111027087B true CN111027087B (en) 2022-06-21

Family

ID=70209207

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911297193.0A Active CN111027087B (en) 2019-12-16 2019-12-16 Enterprise information management system and method for encrypting mnemonics by applying block chain

Country Status (1)

Country Link
CN (1) CN111027087B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111597167A (en) * 2020-05-18 2020-08-28 黄会仙 Big data management system and method applying block chain technology
CN111831715A (en) * 2020-05-25 2020-10-27 闽侯县人民检察院 Intelligent access and certificate storage system and method based on artificial intelligence big data
CN111770190A (en) * 2020-07-06 2020-10-13 夏正键 Block chain distributed real-time fire fighting monitoring alarm system based on 5G and Internet of things mode
CN111654364A (en) * 2020-07-06 2020-09-11 重庆知翔科技有限公司 Method for realizing data safety communication by using block chain encryption technology
CN111949735A (en) * 2020-08-26 2020-11-17 鲁泽军 System and method for realizing data query by applying account book of block chain
CN112039986A (en) * 2020-08-28 2020-12-04 刘凤 System and method for realizing information interaction among departments of enterprise
CN113159766A (en) * 2021-04-13 2021-07-23 浙江数链科技有限公司 Data protection method, device, system, electronic device and storage medium
CN113364590A (en) * 2021-06-07 2021-09-07 重庆高新技术产业研究院有限责任公司 Block chain encryption method for production process data of multiple types of enterprises
CN114140082B (en) * 2021-12-02 2022-08-05 网娱互动科技(北京)股份有限公司 Enterprise content management system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101017562A (en) * 2006-11-28 2007-08-15 南京大学 Method for generating electronic invoice and interactively using based on communication network
CN108764695A (en) * 2018-05-23 2018-11-06 江苏涞哲信息科技有限公司 A kind of food security traceability system and method based on block chain technology
CN109360009A (en) * 2018-11-27 2019-02-19 广州网打尽电子商务有限公司 A kind of tracing system based on block chain
CN109560938A (en) * 2019-01-23 2019-04-02 广州微盾科技股份有限公司 Based on the block catenary system for referring to human body biological characteristics identification technology
CN109698752A (en) * 2018-11-29 2019-04-30 南京南瑞信息通信科技有限公司 A kind of ERP System based on block chain
CN110084599A (en) * 2019-04-28 2019-08-02 百度在线网络技术(北京)有限公司 Cipher key processing method, device, equipment and storage medium
CN110189144A (en) * 2019-05-07 2019-08-30 上海趣链信息科技有限公司 A kind of source tracing method and system based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101017562A (en) * 2006-11-28 2007-08-15 南京大学 Method for generating electronic invoice and interactively using based on communication network
CN108764695A (en) * 2018-05-23 2018-11-06 江苏涞哲信息科技有限公司 A kind of food security traceability system and method based on block chain technology
CN109360009A (en) * 2018-11-27 2019-02-19 广州网打尽电子商务有限公司 A kind of tracing system based on block chain
CN109698752A (en) * 2018-11-29 2019-04-30 南京南瑞信息通信科技有限公司 A kind of ERP System based on block chain
CN109560938A (en) * 2019-01-23 2019-04-02 广州微盾科技股份有限公司 Based on the block catenary system for referring to human body biological characteristics identification technology
CN110084599A (en) * 2019-04-28 2019-08-02 百度在线网络技术(北京)有限公司 Cipher key processing method, device, equipment and storage medium
CN110189144A (en) * 2019-05-07 2019-08-30 上海趣链信息科技有限公司 A kind of source tracing method and system based on block chain

Also Published As

Publication number Publication date
CN111027087A (en) 2020-04-17

Similar Documents

Publication Publication Date Title
CN111027087B (en) Enterprise information management system and method for encrypting mnemonics by applying block chain
US7225161B2 (en) Method and system for initializing a key management system
CN111931250B (en) Multiparty safe calculation integrated machine
CN112929172B (en) System, method and device for dynamically encrypting data based on key bank
CN103107995B (en) A kind of cloud computing environment date safety storing system and method
KR20230157929A (en) Transfer cryptocurrency from a remote access restricted wallet
CN111431713B (en) Private key storage method and device and related equipment
CN111654364A (en) Method for realizing data safety communication by using block chain encryption technology
US20210119781A1 (en) Systems and methods for re-using cold storage keys
CN110419193A (en) Certification and communication means and its system for safe and intelligent domestic environment based on KSI
CN104158827B (en) Ciphertext data sharing method, device, inquiry server and upload data client
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN110880972A (en) Block chain key management system based on safe multiparty calculation
CN107948156A (en) The closed key management method and system of a kind of identity-based
CN112039986A (en) System and method for realizing information interaction among departments of enterprise
CN108881240B (en) Member privacy data protection method based on block chain
CN109274646A (en) Key management client server side method, system and medium based on KMIP protocol
CN110555783B (en) Block chain-based electric power marketing data protection method and system
CN111181920A (en) Encryption and decryption method and device
CN114154181A (en) Privacy calculation method based on distributed storage
CN105281901A (en) Encryption method for cloud tenant key information
CN112003690B (en) Password service system, method and device
Feng et al. Transparent ciphertext retrieval system supporting integration of encrypted heterogeneous database in cloud-assisted IoT
CN109214921B (en) File encryption transmission method based on cloud computing
CN112699112B (en) Data mining flow sharing method based on blockchain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant