CN113872984A - Encryption and decryption method for block chain chip state encryption algorithm - Google Patents
Encryption and decryption method for block chain chip state encryption algorithm Download PDFInfo
- Publication number
- CN113872984A CN113872984A CN202111193876.9A CN202111193876A CN113872984A CN 113872984 A CN113872984 A CN 113872984A CN 202111193876 A CN202111193876 A CN 202111193876A CN 113872984 A CN113872984 A CN 113872984A
- Authority
- CN
- China
- Prior art keywords
- encryption
- information
- user side
- encryption unit
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a block chain chip cryptographic algorithm encryption and decryption method, and relates to the field of encryption and decryption methods. The encryption and decryption method for the block chain chip cryptographic algorithm comprises a user side, a terminal and an encryption unit, and is characterized in that: the method comprises the following steps: s1, the user selects encrypted transmission or ordinary transmission: if encryption transmission is selected, data transmitted by the user side is sent through the first selection channel and encrypted through the encryption unit; if normal transmission is selected, the data transmitted by the user side is sent through the second selection channel, and the terminal receives the data. Information is through dual encryption, is difficult for being cracked, when looking up information, accessible terminal or other user side look up, and it is more convenient that information is looked up, and when information was looked up, the user that needs pass through upload data permitted for the user that uploads data can discover at the very first time that information is looked up, and the ability of keeping secret is strong, and encryption unit places alone, and it is more reliable to crack encryption unit from the unable physics of terminal.
Description
Technical Field
The invention relates to the technical field of encryption and decryption methods, in particular to a block chain chip encryption and decryption method based on a cryptographic algorithm.
Background
The internet of things is a term used in the field of information technology, and is used for acquiring any object or process needing monitoring, connection and interaction in real time and acquiring various required information of sound, light, heat, electricity, mechanics, chemistry, biology, position and the like through various devices and technologies such as various information sensors, radio frequency identification technologies, global positioning systems, infrared sensors, laser scanners and the like. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, the blockchain technology lays a solid trust foundation, creates a reliable cooperation mechanism, and has a wide application prospect.
In the prior art, a block chain chip cryptographic algorithm encryption and decryption method is generally implemented by one-time encryption, encrypted information is easy to crack, and the confidentiality is not strong enough when the information is consulted.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a block chain chip cryptographic algorithm encryption and decryption method, which solves the problems that the encrypted information is easy to crack and the confidentiality is not strong enough when the information is consulted through one-time encryption.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme: the encryption and decryption method for the national encryption algorithm of the block chain chip comprises a user side, a terminal and an encryption unit, and is characterized in that: the method comprises the following steps:
s1, the user selects encrypted transmission or ordinary transmission:
if encryption transmission is selected, data transmitted by the user side is sent through the first selection channel and encrypted through the encryption unit;
if normal transmission is selected, the data transmitted by the user side is sent through the second selection channel, and the terminal receives the data;
the information is sent by the first channel and the second channel, so that the information state is easier to identify;
s2, when the user side transmits data through the first channel:
the method comprises the following steps that a user side exchanges information with an encryption unit and establishes connection, and the user side information is sent to the encryption unit after being primarily encrypted;
s3, the encryption unit performs secondary encryption:
after receiving the data, the encryption unit encrypts the information;
s4, the encryption unit sends the information to the terminal:
and the encryption unit sends the secondarily encrypted information to the terminal and stores the information.
Preferably, the specific step of the user side firstly performing information communication with the encryption unit is that the user side sends a password instruction to the encryption unit, the encryption unit receives the password instruction and sends feedback information and a connection request, the user side identifies the feedback information, if the feedback information is correct, the user side establishes connection with the encryption unit and sends the information to the encryption unit after preliminary encryption.
Preferably, the encryption unit comprises a signal transceiver and a mainboard, information encryption software I is arranged on the mainboard, and the encryption unit and the terminal are separately arranged.
Preferably, the encryption unit is in electrical signal connection with the terminal through a signal transceiver, and the encryption unit is in electrical signal connection with the user terminal through the signal transceiver.
Preferably, the user side is internally provided with a second encryption soft connection, and the encryption modes of the second encryption soft connection and the first encryption soft connection are different.
Preferably, when the terminal refers to the encrypted information, the terminal sends request information to the user side, if the user side agrees, the user side sends the decryption code to the terminal and sends an instruction to the encryption unit, the encryption unit receives the instruction and sends the decryption code to the terminal, and the terminal decrypts the information through the two decryption codes and refers to the information.
Preferably, when the user side consults the encrypted information in the terminal, the user side sends request information to the terminal, the terminal identifies whether the user side is consistent with the user side uploading the information, if so, the information is sent to the encryption unit for decryption, the information decrypted by the encryption unit is sent to the user side again, the user side decrypts the information again and consults the information, if not, a request instruction is sent to the user side uploading the information, after the user side uploading the information agrees, the encryption unit and the user side send decryption codes to the user side requesting to consult the information for decryption and consultation, and if not, the terminal does not respond.
(III) advantageous effects
The invention provides a block chain chip encryption and decryption method based on a cryptographic algorithm. The method has the following beneficial effects:
1. according to the encryption and decryption method for the block chain chip cryptographic algorithm, information is encrypted doubly and is not easy to crack, and when the information is looked up, the information can be looked up through a terminal or other user sides, so that the information is more convenient to look up.
2. According to the encryption and decryption method for the block chain chip cryptographic algorithm, when information is consulted, user permission of uploading data needs to be passed, so that the user uploading data can find the information to be consulted at the first time, and the confidentiality is strong.
3. According to the encryption and decryption method for the block chain chip cryptographic algorithm, the encryption units are independently arranged, and the encryption units cannot be physically cracked from the terminal, so that the method is more reliable.
Drawings
FIG. 1 is a system diagram of a block chain chip encryption/decryption method according to the present invention;
FIG. 2 is a system diagram of an encryption unit of the encryption and decryption method for the chip encryption algorithm of the blockchain according to the present invention;
fig. 3 is a diagram of a user side of the encryption and decryption method for the blockchain chip cryptographic algorithm according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example (b):
as shown in fig. 1-3, an embodiment of the present invention provides a block chain chip encryption and decryption method, including a user side, a terminal, and an encryption unit, where the method includes the following steps:
s1, the user selects encrypted transmission or ordinary transmission:
if encryption transmission is selected, data transmitted by the user side is sent through the first selection channel and encrypted through the encryption unit;
if ordinary transmission is selected, data transmitted by a user side is sent through the second selection channel, the terminal receives the data, two information transmission modes are set, the user can independently select the data according to requirements, and the use experience of the user is improved;
s2, when the user side transmits data through the first channel:
the user side exchanges information with the encryption unit and establishes connection, the user side information is sent to the encryption unit after being primarily encrypted, and the user side exchanges information with the encryption unit so as to reduce the possibility of intercepting the information;
the specific steps that the user side firstly carries out information communication with the encryption unit are that the user side sends a password instruction to the encryption unit, the encryption unit receives the password instruction and sends feedback information and a connection request, the user side identifies the feedback information, if the feedback information is correct, the user side establishes connection with the encryption unit and sends the information to the encryption unit after preliminary encryption;
s3, the encryption unit performs secondary encryption:
after the encryption unit receives the data, the information is encrypted, and the information is subjected to double encryption and is not easy to crack;
s4, the encryption unit sends the information to the terminal:
the encryption unit sends the secondarily encrypted information to the terminal and stores the information;
when the terminal refers to the encrypted information, the terminal sends request information to the user side, if the user side agrees, the user side sends decryption codes to the terminal and sends instructions to the encryption unit, the encryption unit receives the instructions and sends the decryption codes to the terminal, and the terminal decrypts the information through the two decryption codes and refers to the information;
when a user side consults encrypted information in a terminal, the user side sends request information to the terminal, the terminal identifies whether the user side is consistent with the user side uploading the information, if so, the information is sent to an encryption unit for decryption, the information decrypted by the encryption unit is sent to the user side, the user side decrypts the information again and consults the information, if not, a request instruction is sent to the user side uploading the information, after the user side uploading the information agrees, the encryption unit and the user side send decryption codes to the user side requesting to consult the information for decryption and consultation, and if not, the terminal does not respond;
the encryption unit comprises a signal transceiver and a mainboard, information encryption software I is arranged on the mainboard, the encryption unit and the terminal are separately arranged, the encryption unit is separately arranged, and the terminal cannot physically crack the encryption unit, so that the encryption unit is more reliable;
the encryption unit is connected with the terminal electric signal through the signal transceiver and is connected with the user side electric signal through the signal transceiver;
the user side is internally provided with an encryption soft connection II, and the encryption mode of the encryption soft connection II is different from that of the encryption soft connection I.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (7)
1. The encryption and decryption method for the national encryption algorithm of the block chain chip comprises a user side, a terminal and an encryption unit, and is characterized in that: the method comprises the following steps:
s1, the user selects encrypted transmission or ordinary transmission:
if encryption transmission is selected, data transmitted by the user side is sent through the first selection channel and encrypted through the encryption unit;
if normal transmission is selected, the data transmitted by the user side is sent through the second selection channel, and the terminal receives the data;
s2, when the user side transmits data through the first channel:
the method comprises the following steps that a user side exchanges information with an encryption unit and establishes connection, and the user side information is sent to the encryption unit after being primarily encrypted;
s3, the encryption unit performs secondary encryption:
after receiving the data, the encryption unit encrypts the information;
s4, the encryption unit sends the information to the terminal:
and the encryption unit sends the secondarily encrypted information to the terminal and stores the information.
2. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 1, wherein: the specific steps of the user side firstly exchanging information with the encryption unit are that the user side sends a password instruction to the encryption unit, the encryption unit receives the password instruction and sends feedback information and a connection request, the user side identifies the feedback information, if the feedback information is correct, the user side establishes connection with the encryption unit and sends the information to the encryption unit after primary encryption.
3. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 1, wherein: the encryption unit comprises a signal transceiver and a mainboard, information encryption software I is arranged on the mainboard, and the encryption unit and the terminal are separately arranged.
4. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 3, wherein: the encryption unit is connected with the terminal electric signal through the signal transceiver, and the encryption unit is connected with the user side electric signal through the signal transceiver.
5. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 3, wherein: and an encryption soft connection II is arranged in the user side, and the encryption mode of the encryption soft connection II is different from that of the encryption soft connection I.
6. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 1, wherein: when the terminal refers to the encrypted information, the terminal sends request information to the user side, if the user side agrees, the user side sends the decryption code to the terminal and sends an instruction to the encryption unit, the encryption unit receives the instruction and sends the decryption code to the terminal, and the terminal decrypts the information through the two decryption codes and refers to the information.
7. The encryption and decryption method for blockchain chip cryptographic algorithm according to claim 1, wherein: when the user side consults the encrypted information in the terminal, the user side sends request information to the terminal, the terminal identifies whether the user side is consistent with the user side uploading the information, if so, the information is sent to the encryption unit for decryption, the information decrypted by the encryption unit is sent to the user side again, the user side decrypts the information again and consults the information, if not, a request instruction is sent to the user side uploading the information, after the user side uploading the information agrees, the encryption unit and the user side send decryption codes to the user side requesting to consult the information for decryption and consultation, and if not, the terminal does not respond.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111193876.9A CN113872984A (en) | 2021-10-13 | 2021-10-13 | Encryption and decryption method for block chain chip state encryption algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111193876.9A CN113872984A (en) | 2021-10-13 | 2021-10-13 | Encryption and decryption method for block chain chip state encryption algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113872984A true CN113872984A (en) | 2021-12-31 |
Family
ID=78999255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111193876.9A Withdrawn CN113872984A (en) | 2021-10-13 | 2021-10-13 | Encryption and decryption method for block chain chip state encryption algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113872984A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103491648A (en) * | 2013-09-18 | 2014-01-01 | 宇龙计算机通信科技(深圳)有限公司 | Communication method and system based on WIFI |
CN107359986A (en) * | 2017-07-03 | 2017-11-17 | 暨南大学 | The outsourcing encryption and decryption CP ABE methods of user revocation |
US20190121989A1 (en) * | 2017-10-19 | 2019-04-25 | 3D Bridge Solutions Inc. | Systems, devices and methods for protecting and exchanging electronic computer files |
US20190379533A1 (en) * | 2018-06-07 | 2019-12-12 | GBR14 Limited | Methods and systems for secure data transmission |
CN111224958A (en) * | 2019-12-28 | 2020-06-02 | 合肥长远知识产权管理有限公司 | Data transmission method and system |
CN111988281A (en) * | 2020-07-27 | 2020-11-24 | 安徽科技学院 | Block chain encryption method based on quantum communication |
US20210167955A1 (en) * | 2017-10-24 | 2021-06-03 | Bitcache Limited | Data transmission |
-
2021
- 2021-10-13 CN CN202111193876.9A patent/CN113872984A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103491648A (en) * | 2013-09-18 | 2014-01-01 | 宇龙计算机通信科技(深圳)有限公司 | Communication method and system based on WIFI |
CN107359986A (en) * | 2017-07-03 | 2017-11-17 | 暨南大学 | The outsourcing encryption and decryption CP ABE methods of user revocation |
US20190121989A1 (en) * | 2017-10-19 | 2019-04-25 | 3D Bridge Solutions Inc. | Systems, devices and methods for protecting and exchanging electronic computer files |
US20210167955A1 (en) * | 2017-10-24 | 2021-06-03 | Bitcache Limited | Data transmission |
US20190379533A1 (en) * | 2018-06-07 | 2019-12-12 | GBR14 Limited | Methods and systems for secure data transmission |
CN111224958A (en) * | 2019-12-28 | 2020-06-02 | 合肥长远知识产权管理有限公司 | Data transmission method and system |
CN111988281A (en) * | 2020-07-27 | 2020-11-24 | 安徽科技学院 | Block chain encryption method based on quantum communication |
Non-Patent Citations (1)
Title |
---|
方雪锋;王晓明;: "可撤销用户的外包加解密CP-ABE方案", 计算机工程, no. 12 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102685093B (en) | A kind of identity authorization system based on mobile terminal and method | |
CN105050081A (en) | Method, device and system for connecting network access device to wireless network access point | |
CN103973736A (en) | Data sharing method and device | |
CN109905474B (en) | Data security sharing method and device based on block chain | |
CN106162537B (en) | A kind of method, wireless telecom equipment and the terminal of safety certification connection | |
US20190342083A1 (en) | Data encryption control using multiple controlling authorities | |
US10133861B2 (en) | Method for controlling access to a production system of a computer system not connected to an information system of said computer system | |
US11356442B2 (en) | Wearable device-based identity authentication method and system | |
CN110708291B (en) | Data authorization access method, device, medium and electronic equipment in distributed network | |
CN104244237A (en) | Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set | |
US10990692B2 (en) | Managing data handling policies | |
KR101835640B1 (en) | Method for authentication of communication connecting, gateway apparatus thereof, and communication system thereof | |
CN108809936B (en) | Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof | |
CN113411187B (en) | Identity authentication method and system, storage medium and processor | |
US20210211293A1 (en) | Systems and methods for out-of-band authenticity verification of mobile applications | |
CN102404337A (en) | Data encryption method and device | |
CN111614670A (en) | Method and device for sending encrypted file and storage medium | |
US20120166801A1 (en) | Mutual authentication system and method for mobile terminals | |
CN103152326A (en) | Distributed authentication method and authentication system | |
US10671717B2 (en) | Communication device, communication method and computer program | |
KR20040050456A (en) | System and Method for Intermediate of Authentication Tool Between Mobile Communication Terminal | |
KR101745482B1 (en) | Communication method and apparatus in smart-home system | |
KR102053993B1 (en) | Method for Authenticating by using Certificate | |
CN113872984A (en) | Encryption and decryption method for block chain chip state encryption algorithm | |
CN105072136A (en) | Method and system for security authentication between devices based on virtual drive |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20211231 |