CN113872984A - Encryption and decryption method for block chain chip state encryption algorithm - Google Patents

Encryption and decryption method for block chain chip state encryption algorithm Download PDF

Info

Publication number
CN113872984A
CN113872984A CN202111193876.9A CN202111193876A CN113872984A CN 113872984 A CN113872984 A CN 113872984A CN 202111193876 A CN202111193876 A CN 202111193876A CN 113872984 A CN113872984 A CN 113872984A
Authority
CN
China
Prior art keywords
encryption
information
user side
encryption unit
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111193876.9A
Other languages
Chinese (zh)
Inventor
曹源
陈洁
汪大明
邓罡
曹宇
曲波
来飞
曹恒
陈澄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Zhaojing Intelligent Technology Co ltd
Original Assignee
Suzhou Zhaojing Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Zhaojing Intelligent Technology Co ltd filed Critical Suzhou Zhaojing Intelligent Technology Co ltd
Priority to CN202111193876.9A priority Critical patent/CN113872984A/en
Publication of CN113872984A publication Critical patent/CN113872984A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a block chain chip cryptographic algorithm encryption and decryption method, and relates to the field of encryption and decryption methods. The encryption and decryption method for the block chain chip cryptographic algorithm comprises a user side, a terminal and an encryption unit, and is characterized in that: the method comprises the following steps: s1, the user selects encrypted transmission or ordinary transmission: if encryption transmission is selected, data transmitted by the user side is sent through the first selection channel and encrypted through the encryption unit; if normal transmission is selected, the data transmitted by the user side is sent through the second selection channel, and the terminal receives the data. Information is through dual encryption, is difficult for being cracked, when looking up information, accessible terminal or other user side look up, and it is more convenient that information is looked up, and when information was looked up, the user that needs pass through upload data permitted for the user that uploads data can discover at the very first time that information is looked up, and the ability of keeping secret is strong, and encryption unit places alone, and it is more reliable to crack encryption unit from the unable physics of terminal.

Description

Encryption and decryption method for block chain chip state encryption algorithm
Technical Field
The invention relates to the technical field of encryption and decryption methods, in particular to a block chain chip encryption and decryption method based on a cryptographic algorithm.
Background
The internet of things is a term used in the field of information technology, and is used for acquiring any object or process needing monitoring, connection and interaction in real time and acquiring various required information of sound, light, heat, electricity, mechanics, chemistry, biology, position and the like through various devices and technologies such as various information sensors, radio frequency identification technologies, global positioning systems, infrared sensors, laser scanners and the like. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, the blockchain technology lays a solid trust foundation, creates a reliable cooperation mechanism, and has a wide application prospect.
In the prior art, a block chain chip cryptographic algorithm encryption and decryption method is generally implemented by one-time encryption, encrypted information is easy to crack, and the confidentiality is not strong enough when the information is consulted.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a block chain chip cryptographic algorithm encryption and decryption method, which solves the problems that the encrypted information is easy to crack and the confidentiality is not strong enough when the information is consulted through one-time encryption.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme: the encryption and decryption method for the national encryption algorithm of the block chain chip comprises a user side, a terminal and an encryption unit, and is characterized in that: the method comprises the following steps:
s1, the user selects encrypted transmission or ordinary transmission:
if encryption transmission is selected, data transmitted by the user side is sent through the first selection channel and encrypted through the encryption unit;
if normal transmission is selected, the data transmitted by the user side is sent through the second selection channel, and the terminal receives the data;
the information is sent by the first channel and the second channel, so that the information state is easier to identify;
s2, when the user side transmits data through the first channel:
the method comprises the following steps that a user side exchanges information with an encryption unit and establishes connection, and the user side information is sent to the encryption unit after being primarily encrypted;
s3, the encryption unit performs secondary encryption:
after receiving the data, the encryption unit encrypts the information;
s4, the encryption unit sends the information to the terminal:
and the encryption unit sends the secondarily encrypted information to the terminal and stores the information.
Preferably, the specific step of the user side firstly performing information communication with the encryption unit is that the user side sends a password instruction to the encryption unit, the encryption unit receives the password instruction and sends feedback information and a connection request, the user side identifies the feedback information, if the feedback information is correct, the user side establishes connection with the encryption unit and sends the information to the encryption unit after preliminary encryption.
Preferably, the encryption unit comprises a signal transceiver and a mainboard, information encryption software I is arranged on the mainboard, and the encryption unit and the terminal are separately arranged.
Preferably, the encryption unit is in electrical signal connection with the terminal through a signal transceiver, and the encryption unit is in electrical signal connection with the user terminal through the signal transceiver.
Preferably, the user side is internally provided with a second encryption soft connection, and the encryption modes of the second encryption soft connection and the first encryption soft connection are different.
Preferably, when the terminal refers to the encrypted information, the terminal sends request information to the user side, if the user side agrees, the user side sends the decryption code to the terminal and sends an instruction to the encryption unit, the encryption unit receives the instruction and sends the decryption code to the terminal, and the terminal decrypts the information through the two decryption codes and refers to the information.
Preferably, when the user side consults the encrypted information in the terminal, the user side sends request information to the terminal, the terminal identifies whether the user side is consistent with the user side uploading the information, if so, the information is sent to the encryption unit for decryption, the information decrypted by the encryption unit is sent to the user side again, the user side decrypts the information again and consults the information, if not, a request instruction is sent to the user side uploading the information, after the user side uploading the information agrees, the encryption unit and the user side send decryption codes to the user side requesting to consult the information for decryption and consultation, and if not, the terminal does not respond.
(III) advantageous effects
The invention provides a block chain chip encryption and decryption method based on a cryptographic algorithm. The method has the following beneficial effects:
1. according to the encryption and decryption method for the block chain chip cryptographic algorithm, information is encrypted doubly and is not easy to crack, and when the information is looked up, the information can be looked up through a terminal or other user sides, so that the information is more convenient to look up.
2. According to the encryption and decryption method for the block chain chip cryptographic algorithm, when information is consulted, user permission of uploading data needs to be passed, so that the user uploading data can find the information to be consulted at the first time, and the confidentiality is strong.
3. According to the encryption and decryption method for the block chain chip cryptographic algorithm, the encryption units are independently arranged, and the encryption units cannot be physically cracked from the terminal, so that the method is more reliable.
Drawings
FIG. 1 is a system diagram of a block chain chip encryption/decryption method according to the present invention;
FIG. 2 is a system diagram of an encryption unit of the encryption and decryption method for the chip encryption algorithm of the blockchain according to the present invention;
fig. 3 is a diagram of a user side of the encryption and decryption method for the blockchain chip cryptographic algorithm according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example (b):
as shown in fig. 1-3, an embodiment of the present invention provides a block chain chip encryption and decryption method, including a user side, a terminal, and an encryption unit, where the method includes the following steps:
s1, the user selects encrypted transmission or ordinary transmission:
if encryption transmission is selected, data transmitted by the user side is sent through the first selection channel and encrypted through the encryption unit;
if ordinary transmission is selected, data transmitted by a user side is sent through the second selection channel, the terminal receives the data, two information transmission modes are set, the user can independently select the data according to requirements, and the use experience of the user is improved;
s2, when the user side transmits data through the first channel:
the user side exchanges information with the encryption unit and establishes connection, the user side information is sent to the encryption unit after being primarily encrypted, and the user side exchanges information with the encryption unit so as to reduce the possibility of intercepting the information;
the specific steps that the user side firstly carries out information communication with the encryption unit are that the user side sends a password instruction to the encryption unit, the encryption unit receives the password instruction and sends feedback information and a connection request, the user side identifies the feedback information, if the feedback information is correct, the user side establishes connection with the encryption unit and sends the information to the encryption unit after preliminary encryption;
s3, the encryption unit performs secondary encryption:
after the encryption unit receives the data, the information is encrypted, and the information is subjected to double encryption and is not easy to crack;
s4, the encryption unit sends the information to the terminal:
the encryption unit sends the secondarily encrypted information to the terminal and stores the information;
when the terminal refers to the encrypted information, the terminal sends request information to the user side, if the user side agrees, the user side sends decryption codes to the terminal and sends instructions to the encryption unit, the encryption unit receives the instructions and sends the decryption codes to the terminal, and the terminal decrypts the information through the two decryption codes and refers to the information;
when a user side consults encrypted information in a terminal, the user side sends request information to the terminal, the terminal identifies whether the user side is consistent with the user side uploading the information, if so, the information is sent to an encryption unit for decryption, the information decrypted by the encryption unit is sent to the user side, the user side decrypts the information again and consults the information, if not, a request instruction is sent to the user side uploading the information, after the user side uploading the information agrees, the encryption unit and the user side send decryption codes to the user side requesting to consult the information for decryption and consultation, and if not, the terminal does not respond;
the encryption unit comprises a signal transceiver and a mainboard, information encryption software I is arranged on the mainboard, the encryption unit and the terminal are separately arranged, the encryption unit is separately arranged, and the terminal cannot physically crack the encryption unit, so that the encryption unit is more reliable;
the encryption unit is connected with the terminal electric signal through the signal transceiver and is connected with the user side electric signal through the signal transceiver;
the user side is internally provided with an encryption soft connection II, and the encryption mode of the encryption soft connection II is different from that of the encryption soft connection I.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (7)

1. The encryption and decryption method for the national encryption algorithm of the block chain chip comprises a user side, a terminal and an encryption unit, and is characterized in that: the method comprises the following steps:
s1, the user selects encrypted transmission or ordinary transmission:
if encryption transmission is selected, data transmitted by the user side is sent through the first selection channel and encrypted through the encryption unit;
if normal transmission is selected, the data transmitted by the user side is sent through the second selection channel, and the terminal receives the data;
s2, when the user side transmits data through the first channel:
the method comprises the following steps that a user side exchanges information with an encryption unit and establishes connection, and the user side information is sent to the encryption unit after being primarily encrypted;
s3, the encryption unit performs secondary encryption:
after receiving the data, the encryption unit encrypts the information;
s4, the encryption unit sends the information to the terminal:
and the encryption unit sends the secondarily encrypted information to the terminal and stores the information.
2. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 1, wherein: the specific steps of the user side firstly exchanging information with the encryption unit are that the user side sends a password instruction to the encryption unit, the encryption unit receives the password instruction and sends feedback information and a connection request, the user side identifies the feedback information, if the feedback information is correct, the user side establishes connection with the encryption unit and sends the information to the encryption unit after primary encryption.
3. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 1, wherein: the encryption unit comprises a signal transceiver and a mainboard, information encryption software I is arranged on the mainboard, and the encryption unit and the terminal are separately arranged.
4. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 3, wherein: the encryption unit is connected with the terminal electric signal through the signal transceiver, and the encryption unit is connected with the user side electric signal through the signal transceiver.
5. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 3, wherein: and an encryption soft connection II is arranged in the user side, and the encryption mode of the encryption soft connection II is different from that of the encryption soft connection I.
6. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 1, wherein: when the terminal refers to the encrypted information, the terminal sends request information to the user side, if the user side agrees, the user side sends the decryption code to the terminal and sends an instruction to the encryption unit, the encryption unit receives the instruction and sends the decryption code to the terminal, and the terminal decrypts the information through the two decryption codes and refers to the information.
7. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 1, wherein: when the user side consults the encrypted information in the terminal, the user side sends request information to the terminal, the terminal identifies whether the user side is consistent with the user side uploading the information, if so, the information is sent to the encryption unit for decryption, the information decrypted by the encryption unit is sent to the user side again, the user side decrypts the information again and consults the information, if not, a request instruction is sent to the user side uploading the information, after the user side uploading the information agrees, the encryption unit and the user side send decryption codes to the user side requesting to consult the information for decryption and consultation, and if not, the terminal does not respond.
CN202111193876.9A 2021-10-13 2021-10-13 Encryption and decryption method for block chain chip state encryption algorithm Withdrawn CN113872984A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111193876.9A CN113872984A (en) 2021-10-13 2021-10-13 Encryption and decryption method for block chain chip state encryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111193876.9A CN113872984A (en) 2021-10-13 2021-10-13 Encryption and decryption method for block chain chip state encryption algorithm

Publications (1)

Publication Number Publication Date
CN113872984A true CN113872984A (en) 2021-12-31

Family

ID=78999255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111193876.9A Withdrawn CN113872984A (en) 2021-10-13 2021-10-13 Encryption and decryption method for block chain chip state encryption algorithm

Country Status (1)

Country Link
CN (1) CN113872984A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491648A (en) * 2013-09-18 2014-01-01 宇龙计算机通信科技(深圳)有限公司 Communication method and system based on WIFI
CN107359986A (en) * 2017-07-03 2017-11-17 暨南大学 The outsourcing encryption and decryption CP ABE methods of user revocation
US20190121989A1 (en) * 2017-10-19 2019-04-25 3D Bridge Solutions Inc. Systems, devices and methods for protecting and exchanging electronic computer files
US20190379533A1 (en) * 2018-06-07 2019-12-12 GBR14 Limited Methods and systems for secure data transmission
CN111224958A (en) * 2019-12-28 2020-06-02 合肥长远知识产权管理有限公司 Data transmission method and system
CN111988281A (en) * 2020-07-27 2020-11-24 安徽科技学院 Block chain encryption method based on quantum communication
US20210167955A1 (en) * 2017-10-24 2021-06-03 Bitcache Limited Data transmission

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491648A (en) * 2013-09-18 2014-01-01 宇龙计算机通信科技(深圳)有限公司 Communication method and system based on WIFI
CN107359986A (en) * 2017-07-03 2017-11-17 暨南大学 The outsourcing encryption and decryption CP ABE methods of user revocation
US20190121989A1 (en) * 2017-10-19 2019-04-25 3D Bridge Solutions Inc. Systems, devices and methods for protecting and exchanging electronic computer files
US20210167955A1 (en) * 2017-10-24 2021-06-03 Bitcache Limited Data transmission
US20190379533A1 (en) * 2018-06-07 2019-12-12 GBR14 Limited Methods and systems for secure data transmission
CN111224958A (en) * 2019-12-28 2020-06-02 合肥长远知识产权管理有限公司 Data transmission method and system
CN111988281A (en) * 2020-07-27 2020-11-24 安徽科技学院 Block chain encryption method based on quantum communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
方雪锋;王晓明;: "可撤销用户的外包加解密CP-ABE方案", 计算机工程, no. 12 *

Similar Documents

Publication Publication Date Title
CN102685093B (en) A kind of identity authorization system based on mobile terminal and method
CN105050081A (en) Method, device and system for connecting network access device to wireless network access point
CN103973736A (en) Data sharing method and device
CN109905474B (en) Data security sharing method and device based on block chain
CN106162537B (en) A kind of method, wireless telecom equipment and the terminal of safety certification connection
US20190342083A1 (en) Data encryption control using multiple controlling authorities
US10133861B2 (en) Method for controlling access to a production system of a computer system not connected to an information system of said computer system
US11356442B2 (en) Wearable device-based identity authentication method and system
CN110708291B (en) Data authorization access method, device, medium and electronic equipment in distributed network
CN104244237A (en) Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
US10990692B2 (en) Managing data handling policies
KR101835640B1 (en) Method for authentication of communication connecting, gateway apparatus thereof, and communication system thereof
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN113411187B (en) Identity authentication method and system, storage medium and processor
US20210211293A1 (en) Systems and methods for out-of-band authenticity verification of mobile applications
CN102404337A (en) Data encryption method and device
CN111614670A (en) Method and device for sending encrypted file and storage medium
US20120166801A1 (en) Mutual authentication system and method for mobile terminals
CN103152326A (en) Distributed authentication method and authentication system
US10671717B2 (en) Communication device, communication method and computer program
KR20040050456A (en) System and Method for Intermediate of Authentication Tool Between Mobile Communication Terminal
KR101745482B1 (en) Communication method and apparatus in smart-home system
KR102053993B1 (en) Method for Authenticating by using Certificate
CN113872984A (en) Encryption and decryption method for block chain chip state encryption algorithm
CN105072136A (en) Method and system for security authentication between devices based on virtual drive

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20211231