CN112685786B - Financial data encryption and decryption method, system, equipment and storage medium - Google Patents
Financial data encryption and decryption method, system, equipment and storage medium Download PDFInfo
- Publication number
- CN112685786B CN112685786B CN202110113238.5A CN202110113238A CN112685786B CN 112685786 B CN112685786 B CN 112685786B CN 202110113238 A CN202110113238 A CN 202110113238A CN 112685786 B CN112685786 B CN 112685786B
- Authority
- CN
- China
- Prior art keywords
- data
- key
- client
- information
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 20
- 238000012795 verification Methods 0.000 claims abstract description 11
- 238000011084 recovery Methods 0.000 claims description 15
- 230000008676 import Effects 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 10
- 238000010586 diagram Methods 0.000 description 5
- 238000000926 separation method Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a method, a system, a device and a storage medium for encrypting and decrypting financial data, wherein the method for encrypting the financial data comprises the following steps: the server receives data information sent by the client, wherein the data information comprises plaintext data and tag information; setting a first key according to the tag information, encrypting the plaintext data, obtaining first data, and storing the first key into a cipher machine; encrypting and calculating the plaintext data according to a message digest algorithm, obtaining second data, generating a second secret key, and storing the second secret key in a cipher machine; the first data and the second data are stored in a database. The invention separates the authority of data information management and key management, and when the data information is acquired, the double verification of the server side and the cipher machine is required to be carried out on the client side, thereby improving the security of the data information.
Description
Technical Field
The present invention relates to the field of information technologies, and in particular, to a method, a system, an apparatus, and a storage medium for encrypting and decrypting financial data.
Background
With the continuous development of network technology, the mobile internet is an indispensable part of people's daily life. People need to perform many daily activities such as shopping, financing, booking, etc. through the internet, thus leaving a lot of financial data information on the internet. In order to secure the financial data information, encryption and decryption processes are generally required for the data.
However, in the existing financial service system, when a third party is docked, the security check of the embedded data coupled in the service system forms centralized and unified data acquisition authority and key management authority, so that the security of the financial data information is compromised, the financial data information is easy to crack, and the problem of data security is likely to be brought to users.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, a system, a device and a storage medium for encrypting and decrypting financial data.
A method of encrypting financial data, comprising the steps of: the server receives data information sent by the client, wherein the data information comprises plaintext data and tag information; setting a first key according to the tag information, encrypting the plaintext data, obtaining first data, and storing the first key into a cipher machine; encrypting and calculating the plaintext data according to a message digest algorithm, obtaining second data, generating a second secret key, and storing the second secret key in a cipher machine; the first data and the second data are stored in a database.
In one embodiment, after the obtaining the second data, before storing the second data in a database, further comprising: backing up the first data, the second data, the first key and the second key, and storing the backed up first data, the backed up second data, the backed up first key and the backed up second key into a key backup file; and importing the key backup file into at least three storage devices.
In one embodiment, after the key backup file is imported into at least three storage devices, the method further comprises: and when the key is restored, restoring according to the key backup files imported in at least two storage devices.
In one embodiment, when the first key and the second key are both asymmetric keys, the method further includes: and acquiring a client public key according to the client ID, and verifying the tag information according to the client public key.
A financial data decryption method comprising the steps of: the client sends a data request to the server; the server side verifies whether the client side is legal or not according to a message digest algorithm; if the client is legal, acquiring corresponding encrypted data according to the data request, and sending the encrypted data to the client; the client calls a private key, and obtains a first secret key and a second secret key stored in a cipher machine according to the private key; and decrypting the encrypted data according to the first key and the second key to obtain decrypted data information.
In one embodiment, the verifying whether the client is legal according to the message digest algorithm specifically includes: the server side returns a random key to the client side according to the data request, and records the random key in a session file; the client performs message authentication code operation on the random key, generates a third key and submits the third key to the server; the server side reads a client key in a database and compares the client key with the third key; if the client key is consistent with the third key, verifying that the client is legal; and if the client key is inconsistent with the third key, verifying that the client is illegal.
A financial data encryption system comprising: the device comprises a cipher machine, an information receiving module and a storage module; the cipher machine comprises a key management module and a backup recovery module, wherein the key management module is used for generating, storing, importing, exporting and managing a key; the backup recovery module is used for backing up the export key and recovering the import key; the information receiving module is used for receiving data information sent by the client; the storage module is used for storing the first data and the second data; the key management module comprises a symmetric key management unit and an asymmetric key management unit; the symmetric key management unit is used for providing generation, storage, import, export and management of symmetric keys; the symmetric key management unit is used for providing generation, storage, import, export and management of asymmetric keys; the backup recovery module comprises a backup export unit and a recovery import unit; the backup export unit is used for backing up and exporting all symmetric or asymmetric keys stored by the cipher machine; the recovery import unit is used for recovering all the derived symmetric or asymmetric keys and importing the keys into another cipher machine.
A financial data decryption system comprising: the system comprises a request sending module, a legal verification module, a data acquisition module, a key acquisition module and a data decryption module; the request sending module is used for sending a data request to the server by the client; the legal verification module is used for verifying whether the client is legal or not by the server side according to a message digest algorithm; the data acquisition module is used for acquiring corresponding encrypted data according to the data request when the client is legal, and sending the encrypted data to the client; the key acquisition module is used for calling a private key by the client and acquiring a first key and a second key stored in the cipher machine according to the private key; the data decryption module is used for decrypting the encrypted data according to the first key and the second key to obtain decrypted data information.
An apparatus comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of a method for encrypting financial data and a method for decrypting financial data as described in the respective embodiments above when the program is executed.
A storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of a financial data encryption method and a financial data decryption method described in the respective embodiments described above.
Compared with the prior art, the invention has the advantages that: the invention stores the data information in the database and stores the secret key in the cipher machine, thereby realizing the authority separation of the data information management and the secret key management, realizing the double verification of the client and improving the security of the data information.
Drawings
FIG. 1 is a flow chart of a method for encrypting financial data according to one embodiment;
FIG. 2 is a flowchart of a method for decrypting financial data according to one embodiment;
FIG. 3 is a schematic diagram of a financial data encryption system according to one embodiment;
FIG. 4 is a schematic diagram of the cryptographic engine of FIG. 3;
FIG. 5 is a schematic diagram illustrating a configuration of a financial data decryption system according to one embodiment;
fig. 6 is a schematic diagram of the internal structure of the apparatus in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail by the following detailed description with reference to the accompanying drawings. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In one embodiment, as shown in fig. 1, there is provided a financial data encryption method, including the steps of:
In step S101, the server receives data information sent by the client, where the data information includes plaintext data, a client ID, and tag information.
Specifically, when the server side is an internal system, the client side may be a corresponding external system; naturally, the server may be an external system, and the client may be a corresponding internal system.
Specifically, the server side firstly receives data information sent by the client side, wherein the information comprises plaintext data, client ID and tag information, and the plaintext data can be related information of clients, financial data information and the like.
Step S102, a first key is set according to the tag information, plaintext data is encrypted, the first data is obtained, and the first key is stored in a cipher machine.
Specifically, when data transmission is required, in order to ensure security, the received data information needs to be encrypted, a first key can be set according to the tag information, plaintext data is encrypted, the encrypted plaintext data is the first data, the first key is stored in a hardware cipher machine, separation of device management and key management authority is realized, and the security of the encrypted data is further improved.
Step S103, encryption calculation is carried out on the plaintext data according to a message digest algorithm, second data are obtained, a second secret key is generated, and the second secret key is stored in a cipher machine.
Specifically, the plaintext data is encrypted by a message digest algorithm to obtain second data, a second key is generated, the second key is stored in a cryptographic machine and can be stored in the same storage unit as the first key, and the first key and the second key can be conveniently called when needed.
Step S104, storing the first data and the second data in a database.
Specifically, the first data and the second data obtained after encryption are stored in a database at a server side.
In this embodiment, the server receives data information sent by the client, where the data information includes plaintext data and tag information, a first key is set according to the tag information, the plaintext data is encrypted to obtain first data, the first key is stored in the crypto-engine, encryption calculation is performed on the plaintext data according to a message digest algorithm to obtain second data, a second key is generated, the second key is stored in the crypto-engine, the first data and the second data are stored in the database, and rights separation of data information management and key information management is achieved by storing the data information and the key information in the database and the crypto-engine respectively, and when the client needs to obtain the data information, double verification of the server and the crypto-engine is needed, so that security of the data information is improved.
Wherein, after step S103, before step S104, further includes: backing up the first data, the second data, the first key and the second key, and storing the backed up first data, the backed up second data, the backed up first key and the backed up second key into a key backup file; the key backup file is imported into at least three storage devices.
Specifically, the first data, the second data, the first key and the second key are backed up, the backed-up data information is stored in a key backup file, and the key backup file is imported into at least three storage devices, so that the loss of the data is avoided.
Wherein after importing the key backup file into the at least three storage devices, further comprising: and when the key is restored, restoring according to the key backup files imported in at least two storage devices.
Specifically, when the key needs to be restored, the key backup files imported in at least two storage devices are restored, so that the data security is improved.
When the first key and the second key are both asymmetric keys, the method further comprises: and acquiring the client public key according to the client ID, and verifying the tag information according to the client public key.
Specifically, the first key and the second key may be symmetric keys or asymmetric keys, and when the first key and the second key are both asymmetric keys, the tag information may be verified according to the client ID, and it is confirmed that the client ID is consistent with the tag information, thereby confirming the client information. And acquiring the corresponding client public key according to the client ID, and verifying the tag information according to the client public key.
In one embodiment, as shown in fig. 2, there is provided a financial data decryption method, including the steps of:
in step S201, the server receives a data request sent by the client.
Specifically, the server receives request information, which is sent by the client and requests to acquire confidential data. The client needs to be a terminal in the white list of the server side.
Step S202, verifying whether the client is legal or not according to the message digest algorithm.
Specifically, whether the client is legal or not can be verified according to a message digest algorithm.
In one embodiment, the client ID may be obtained according to the data request, and whether the client is in the white list of the server is determined according to the client ID, if the client is in the white list, the client is determined to be legal, otherwise, the client is determined to be illegal.
Step S203, if the client is legal, the corresponding encrypted data is obtained according to the data request, and the encrypted data is sent to the client.
Specifically, after verifying that the client is legal through the message digest algorithm, acquiring corresponding encrypted data according to the data request, and sending the encrypted data to the client.
Step S204, the client calls the private key, and obtains the first key and the second key stored in the cipher machine according to the private key.
Specifically, the client is provided with a private key, the first key and the second key stored in the cipher machine are acquired according to the private key, the encrypted data and the encrypted key are respectively stored, and the encrypted data and the encrypted key also need to be respectively acquired according to the information of the client during acquisition, so that double verification is carried out on the client, and the safety of the encrypted data is improved.
Step S205, the encrypted data is decrypted according to the first key and the second key, and decrypted data information is obtained.
Specifically, after the first key and the second key are acquired, the encrypted data is decrypted according to the first key and the second key, decrypted data information is acquired, and the decrypted data information is correspondingly used.
In this embodiment, the client sends a data request to the server, the server verifies whether the client is legal according to a message digest algorithm, when the client is determined to be legal, the server obtains corresponding encrypted data according to the data request, sends the encrypted data to the client, the client calls a private key, obtains a first key and a second key stored in a cryptographic machine according to the private key, decrypts the encrypted data according to the first key and the second key, obtains decrypted data information, and can perform double verification on the client through the server and the cryptographic machine to obtain the data information and key information respectively, so that management authority separation of the data information and the key information is realized, and the security of the data information is improved.
As shown in conjunction with fig. 3 and 4, there is provided a financial data encryption system 30 comprising: an information receiving module 31, a cryptographic engine 32 and a storage module 33, wherein:
the information receiving module 31 is configured to receive data information sent by a client;
The cryptographic engine 32 comprises a key management module 321 and a backup recovery module 322, wherein the key management module 321 is used for generating, storing, importing, exporting and managing keys, and the backup recovery module 322 is used for backing up the imported keys;
The key management module 321 includes a symmetric key management unit 323 and an asymmetric key management unit 324, where the symmetric key management unit 323 is used to provide generation, storage, import, export and management of symmetric keys, and the asymmetric key management unit 324 is used to provide generation, storage, import, export and management of asymmetric keys;
The backup recovery module 322 includes a backup export unit 325 and a recovery import unit 326, the backup export unit 325 is used for backing up all symmetric or asymmetric keys stored in the export crypto machine, and the recovery import unit 326 is used for restoring all exported symmetric or asymmetric keys and importing the keys into another crypto machine;
the storage module 33 is used for storing the first data and the second data.
In one embodiment, further comprising: the monitoring module is used for recording data information sent to the encryption system in an operation log, wherein the data information comprises an IP address of a client, a request time stamp, version information, an encryption mode, encrypted data and signature information; and carrying out statistical analysis on the operation log, and judging the current state of the system according to an analysis result.
As shown in fig. 5, there is provided a financial data decryption system 40 including: a request sending module 41, a legal verification module 42, a data acquisition module 43, a key acquisition module 44 and a data decryption module 45, wherein:
the request sending module 41 is configured to send a data request from a client to a server;
the legal verification module 42 is used for the server to verify whether the client is legal or not according to the message digest algorithm;
the data obtaining module 43 is configured to obtain corresponding encrypted data according to the data request when the client is legal, and send the encrypted data to the client;
The key obtaining module 44 is configured to invoke a private key by the client, and obtain a first key and a second key stored in the cryptographic engine according to the private key;
the data decryption module 45 is configured to decrypt the encrypted data according to the first key and the second key, and obtain decrypted data information.
In one embodiment, further comprising: the early warning module is used for sending early warning information to the information queue when the query rate per second of the request exceeds a configured threshold value, the IP address of the requesting party is not in the white list and the request time stamp exceeds a configured time threshold value.
In one embodiment, an apparatus is provided, which may be a server, the internal structure of which may be as shown in fig. 6. The device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the device is configured to provide computing and control capabilities. The memory of the device includes a non-volatile storage medium, an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the device is used for storing configuration templates and can also be used for storing target webpage data. The network interface of the device is used for communicating with an external terminal through a network connection. The computer program, when executed by the processor, implements a method of encrypting financial data and a method of decrypting financial data.
It will be appreciated by persons skilled in the art that the structure shown in fig. 6 is merely a block diagram of a portion of the structure associated with the present inventive arrangements and does not constitute a limitation of the apparatus to which the present inventive arrangements are applied, and that a particular apparatus may include more or less components than those shown in the drawings, or may combine certain components, or have a different arrangement of components.
In one embodiment, a storage medium may also be provided, the storage medium storing a computer program comprising program instructions that, when executed by a computer, cause the computer to perform a method as described in the previous embodiments, the computer being part of a financial data encryption system and a financial data decryption system as mentioned above.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random-access Memory (Random Access Memory, RAM), or the like.
It will be appreciated by those skilled in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be centralized on a single computing device, or distributed across a network of computing devices, or they may alternatively be implemented in program code executable by computing devices, such that they may be stored on a computer storage medium (ROM/RAM, magnetic or optical disk) for execution by computing devices, and in some cases, the steps shown or described may be performed in a different order than what is shown or described herein, or they may be individually manufactured as individual integrated circuit modules, or a plurality of modules or steps in them may be manufactured as a single integrated circuit module. Therefore, the present invention is not limited to any specific combination of hardware and software.
The foregoing is a further detailed description of the invention in connection with specific embodiments, and is not intended to limit the practice of the invention to such descriptions. It will be apparent to those skilled in the art that several simple deductions or substitutions may be made without departing from the spirit of the invention, and these should be considered to be within the scope of the invention.
Claims (10)
1.A method of encrypting financial data, comprising the steps of:
The server receives data information sent by the client, wherein the data information comprises plaintext data, a client ID and tag information;
setting a first key according to the tag information, encrypting the plaintext data, obtaining first data, and storing the first key into a cipher machine;
Encrypting and calculating the plaintext data according to a message digest algorithm, obtaining second data, generating a second secret key, and storing the second secret key in a cipher machine;
storing the first data and the second data in a database;
And verifying the tag information according to the client ID, and determining the client information when the client ID is consistent with the tag information.
2. The method of claim 1, further comprising, after said obtaining the second data, prior to storing the second data in a database:
Backing up the first data, the second data, the first key and the second key, and storing the backed up first data, the backed up second data, the backed up first key and the backed up second key into a key backup file; and importing the key backup file into at least three storage devices.
3. The method of claim 2, further comprising, after said importing said key backup file into at least three storage devices:
and when the key is restored, restoring according to the key backup files imported in at least two storage devices.
4. The method of claim 1, wherein when the first key and the second key are asymmetric keys, further comprising:
and acquiring a client public key according to the client ID, and verifying the tag information according to the client public key.
5. A method of decrypting financial data, comprising the steps of:
The method comprises the steps that a server receives data information sent by a client, wherein the data information comprises plaintext data, a client ID and tag information, a first key is set according to the tag information, the plaintext data is encrypted, the first data is obtained, and the first key is stored in a cipher machine; encrypting and calculating the plaintext data according to a message digest algorithm, obtaining second data, generating a second secret key, and storing the second secret key in a cipher machine; storing the first data and the second data in a database; verifying the tag information according to the client ID, and determining client information when the client ID is consistent with the tag information;
The client sends a data request to the server;
The server side verifies whether the client side is legal or not according to a message digest algorithm;
If the client is legal, acquiring corresponding encrypted data according to the data request, and sending the encrypted data to the client;
The client calls a private key, and obtains a first secret key and a second secret key stored in a cipher machine according to the private key;
and decrypting the encrypted data according to the first key and the second key to obtain decrypted data information.
6. The method for decrypting financial data according to claim 5, wherein said verifying whether the client is legal according to the message digest algorithm comprises:
the server side returns a random key to the client side according to the data request, and records the random key in a session file;
the client performs message authentication code operation on the random key, generates a third key and submits the third key to the server;
The server side reads a client key in a database and compares the client key with the third key;
if the client key is consistent with the third key, verifying that the client is legal;
and if the client key is inconsistent with the third key, verifying that the client is illegal.
7. A financial data encryption system, comprising: the device comprises a cipher machine, an information receiving module and a storage module;
The server receives data information sent by the client, wherein the data information comprises plaintext data, a client ID and tag information; setting a first key according to the tag information, encrypting the plaintext data, obtaining first data, and storing the first key into a cipher machine; encrypting and calculating the plaintext data according to a message digest algorithm, obtaining second data, generating a second secret key, and storing the second secret key in a cipher machine; storing the first data and the second data in a database; verifying the tag information according to the client ID, and determining client information when the client ID is consistent with the tag information;
The cipher machine comprises a key management module and a backup recovery module, wherein the key management module is used for generating, storing, importing, exporting and managing a key; the backup recovery module is used for backing up the export key and recovering the import key; the information receiving module is used for receiving data information sent by the client; the storage module is used for storing the first data and the second data;
The key management module comprises a symmetric key management unit and an asymmetric key management unit; the symmetric key management unit is used for providing generation, storage, import, export and management of symmetric keys; the asymmetric key management unit is used for providing generation, storage, import, export and management of an asymmetric key;
the backup recovery module comprises a backup export unit and a recovery import unit; the backup export unit is used for backing up and exporting all symmetric or asymmetric keys stored by the cipher machine; the recovery import unit is used for recovering all the derived symmetric or asymmetric keys and importing the keys into another cipher machine.
8. A financial data decryption system, comprising: the system comprises a request sending module, a legal verification module, a data acquisition module, a key acquisition module and a data decryption module;
The server receives data information sent by the client, wherein the data information comprises plaintext data, a client ID and tag information; setting a first key according to the tag information, encrypting the plaintext data, obtaining first data, and storing the first key into a cipher machine; encrypting and calculating the plaintext data according to a message digest algorithm, obtaining second data, generating a second secret key, and storing the second secret key in a cipher machine; storing the first data and the second data in a database; verifying the tag information according to the client ID, and determining client information when the client ID is consistent with the tag information;
the request sending module is used for sending a data request to the server by the client;
the legal verification module is used for verifying whether the client is legal or not by the server side according to a message digest algorithm;
the data acquisition module is used for acquiring corresponding encrypted data according to the data request when the client is legal, and sending the encrypted data to the client;
The key acquisition module is used for calling a private key by the client and acquiring a first key and a second key stored in the cipher machine according to the private key;
The data decryption module is used for decrypting the encrypted data according to the first key and the second key to obtain decrypted data information.
9. An apparatus comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method of any one of claims 1 to 4 or 5 to 6 when the computer program is executed.
10. A storage medium having stored thereon a computer program, which when executed by a processor, implements the steps of the method of any of claims 1 to 4 or 5 to 6.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110113238.5A CN112685786B (en) | 2021-01-27 | 2021-01-27 | Financial data encryption and decryption method, system, equipment and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110113238.5A CN112685786B (en) | 2021-01-27 | 2021-01-27 | Financial data encryption and decryption method, system, equipment and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN112685786A CN112685786A (en) | 2021-04-20 |
| CN112685786B true CN112685786B (en) | 2024-07-05 |
Family
ID=75459358
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202110113238.5A Active CN112685786B (en) | 2021-01-27 | 2021-01-27 | Financial data encryption and decryption method, system, equipment and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN112685786B (en) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113242538A (en) * | 2021-05-11 | 2021-08-10 | 深圳市创意者科技有限公司 | Communication voice information encryption system of Bluetooth conference sound box |
| CN114499836B (en) * | 2021-12-29 | 2024-07-16 | 北京像素软件科技股份有限公司 | Key management method, device, computer equipment and readable storage medium |
| CN115225272A (en) * | 2022-09-20 | 2022-10-21 | 北方健康医疗大数据科技有限公司 | Big data disaster recovery system, method and device based on domestic commercial cryptographic algorithm |
| CN116466872A (en) * | 2022-10-17 | 2023-07-21 | 浙江智臾科技有限公司 | A time series data storage system and method |
| CN117097528B (en) * | 2023-08-22 | 2024-07-16 | 广州市番禺融合小额贷款股份有限公司 | Financial data safe storage system and method based on big data |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101204036A (en) * | 2005-04-25 | 2008-06-18 | 泰克塞科公司 | Cryptographic processing and operational control of tagged data units |
| CN109360008A (en) * | 2018-11-20 | 2019-02-19 | 吴祥富 | Product anti-counterfeiting electronic label and product anti-counterfeiting certification update method and system |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2501847A (en) * | 2011-01-18 | 2013-11-06 | Fortress Gb Ltd | System and method for computerized negotiations based on coded integrity |
| US8488779B2 (en) * | 2011-07-25 | 2013-07-16 | Grey Heron Technologies, Llc | Method and system for conducting high speed, symmetric stream cipher encryption |
| CN109684129B (en) * | 2018-11-20 | 2020-05-05 | 北京深思数盾科技股份有限公司 | Data backup recovery method, storage medium, encryption machine, client and server |
| CN109635610B (en) * | 2018-12-11 | 2021-08-24 | 北京智芯微电子科技有限公司 | RFID tag data reading and writing system and method |
| CN110995447B (en) * | 2019-12-18 | 2022-12-13 | 杭州云萃流图网络科技有限公司 | Data storage method, device, equipment and medium |
| CN111245812B (en) * | 2020-01-07 | 2022-10-21 | 南京航空航天大学 | Integrated airport security check verification system and data verification encryption transmission method thereof |
| CN111565107B (en) * | 2020-07-14 | 2020-11-27 | 腾讯科技(深圳)有限公司 | Key processing method and device based on cloud service platform and computer equipment |
-
2021
- 2021-01-27 CN CN202110113238.5A patent/CN112685786B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101204036A (en) * | 2005-04-25 | 2008-06-18 | 泰克塞科公司 | Cryptographic processing and operational control of tagged data units |
| CN109360008A (en) * | 2018-11-20 | 2019-02-19 | 吴祥富 | Product anti-counterfeiting electronic label and product anti-counterfeiting certification update method and system |
Also Published As
| Publication number | Publication date |
|---|---|
| CN112685786A (en) | 2021-04-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN112685786B (en) | Financial data encryption and decryption method, system, equipment and storage medium | |
| US9852300B2 (en) | Secure audit logging | |
| CN110868301B (en) | Identity authentication system and method based on state cryptographic algorithm | |
| US8806200B2 (en) | Method and system for securing electronic data | |
| CN112182609A (en) | Block chain-based data uplink storage method and tracing method, device and equipment | |
| CN109981255B (en) | Method and system for updating key pool | |
| CN109347625B (en) | Password operation method, work key creation method, password service platform and equipment | |
| CN105915338B (en) | Generate the method and system of key | |
| CN111104691A (en) | Sensitive information processing method and device, storage medium and equipment | |
| CN113472793A (en) | Personal data protection system based on hardware password equipment | |
| CN106790045B (en) | distributed virtual machine agent device based on cloud environment and data integrity guarantee method | |
| US20060095769A1 (en) | System and method for initializing operation for an information security operation | |
| CN114499875B (en) | Service data processing method, device, computer equipment and storage medium | |
| CN112865965B (en) | Train service data processing method and system based on quantum key | |
| CN117499160B (en) | Network security protection method and system based on electronic file | |
| CN117240625B (en) | Tamper-resistant data processing method and device and electronic equipment | |
| CN114553557A (en) | Key calling method, key calling device, computer equipment and storage medium | |
| US11522691B2 (en) | Techniques for virtual cryptographic key ceremonies | |
| CN112673591B (en) | System and method for providing authorized third parties with secure key escrow access to a secret public ledger | |
| CN108900595B (en) | Method, apparatus, device and computing medium for accessing cloud storage server data | |
| CN110445757A (en) | Personnel information encryption method, device, computer equipment and storage medium | |
| CN118250079B (en) | A method, device and system for secure transmission of multi-terminal application data | |
| CN118395508A (en) | Log file tamper-proof detection method, device, system and medium | |
| US20240048532A1 (en) | Data exchange protection and governance system | |
| CN114826644A (en) | Data protection encryption management system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |