Nothing Special   »   [go: up one dir, main page]

CN115001813B - Information security method, system, equipment and medium - Google Patents

Information security method, system, equipment and medium Download PDF

Info

Publication number
CN115001813B
CN115001813B CN202210610419.3A CN202210610419A CN115001813B CN 115001813 B CN115001813 B CN 115001813B CN 202210610419 A CN202210610419 A CN 202210610419A CN 115001813 B CN115001813 B CN 115001813B
Authority
CN
China
Prior art keywords
encryption
key
grade
user
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210610419.3A
Other languages
Chinese (zh)
Other versions
CN115001813A (en
Inventor
陈轩毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Xidian Information Technology Research Institute Co ltd
Original Assignee
Shanxi Xidian Information Technology Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Xidian Information Technology Research Institute Co ltd filed Critical Shanxi Xidian Information Technology Research Institute Co ltd
Priority to CN202210610419.3A priority Critical patent/CN115001813B/en
Publication of CN115001813A publication Critical patent/CN115001813A/en
Application granted granted Critical
Publication of CN115001813B publication Critical patent/CN115001813B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses an information security method, equipment, a system and a medium, wherein the method comprises the following steps: acquiring data to be encrypted and an encryption level corresponding to the data to be encrypted, wherein the data to be encrypted are sent by a target user; determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key; and encrypting and storing the data to be encrypted according to the encryption strategy. According to the information security and confidentiality method, different grade keys are provided for users of different grades, different encryption keys and storage keys are provided for the users of the same grade by setting different grade key parameters, encryption of confidential information is achieved through the encryption keys, encryption of confidential information addresses is achieved through the storage keys, and therefore data security is guaranteed.

Description

Information security method, system, equipment and medium
Technical Field
The present application relates to the field of information security technologies, and in particular, to an information security method, system, device, and medium.
Background
At present, the existing data is relatively simple in encryption mode, and the key used for decryption is generally set by a user, so that the security is relatively low; in addition, the storage address is generally fixed, and a user can find the storage position of the secret information through a fixed storage path, so that after the corresponding secret information is found by the cloud, the illegal molecule can still decrypt the secret information through illegal decryption processing, the content of the secret information is obtained, and the secret information is easy to steal.
Disclosure of Invention
Aiming at the defects in the prior art, the application provides an information security method, an information security system, information security equipment and an information security medium.
In a first aspect, a method for securing information, the method comprising:
acquiring data to be encrypted and an encryption level corresponding to the data to be encrypted, wherein the data to be encrypted are sent by a target user;
determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key;
and encrypting and storing the data to be encrypted according to the encryption strategy.
Preferably, before the obtaining the data to be encrypted sent by the target user and the encryption level corresponding to the data to be encrypted, the method further includes:
carrying out identity authentication on a target user;
after the identity authentication of the target user is successful, performing level authentication on the target user;
and after the target user grade authentication is successful, determining a grade key and a grade key sequence corresponding to the target user from a user database according to the user grade, wherein the grade key sequence is used for representing a set of grade keys corresponding to the lowest user grade to the user grade of the target user.
Preferably, the authenticating the user identity includes:
acquiring identity information of a target user, and extracting a user identifier from the identity information;
and searching corresponding identity information in a user database according to the user identification, and if the inquiry is successful, successful user identity authentication is achieved.
Preferably, the step of performing the level authentication on the target user includes:
determining the user grade of the target user from a user database according to the user identification;
sending a level authentication request to other users with at least one user level higher than that of the target user;
and returning confirmation information by other users according to the grade authentication request, and successfully authenticating the grade of the user.
Preferably, said determining an encryption policy according to said encryption level comprises:
determining a grade key parameter according to the encryption grade;
and calculating an encryption key and a storage key according to the grade key parameter, the grade key and the grade key sequence.
Preferably, the formula for calculating the encryption key and the storage key according to the rank key parameter, the rank key and the rank key sequence is as follows:
E s =E m E m+1 …(E K ) 2
E f =E 1 E 2 …E m-1 E K
wherein E is s Representing an encryption key, E f Representing the storage key, E K And representing a grade key corresponding to the grade of the target user, and m represents a grade key parameter.
Preferably, encrypting and storing the data to be encrypted according to the encryption policy includes:
encrypting the data to be encrypted by using the encryption key to obtain secret data, and storing the secret data;
and obtaining a storage address of the secret data, encrypting the storage address by using a storage key to obtain a target access code, and realizing access of the secret information by the target access code.
In a second aspect, an information security system comprises:
the acquisition module is used for acquiring data to be encrypted and sent by a target user and an encryption level corresponding to the data to be encrypted;
the determining module is used for determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key;
and the execution module is used for encrypting and storing the data to be encrypted according to the encryption strategy.
In a third aspect, an information security privacy device includes: at least one memory and at least one processor;
the at least one memory for storing a machine readable program;
the at least one processor being configured to invoke the machine readable program to perform the method of any of claims 1-7.
In a fourth aspect, a computer readable medium has stored thereon computer instructions which, when executed by a processor, cause the processor to perform the method described above.
The beneficial effects of the application are as follows: according to the information security and confidentiality method, different grade keys are provided for users of different grades, different encryption keys and storage keys are provided for the users of the same grade by setting different grade key parameters, encryption of confidential information and encryption of confidential information addresses are achieved through the encryption keys, and therefore data security is guaranteed. Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. Like elements or portions are generally identified by like reference numerals throughout the several figures. In the drawings, elements or portions thereof are not necessarily drawn to scale.
Fig. 1 is a flow chart of an information security method according to embodiment 1 of the present application;
fig. 2 is a schematic structural diagram of an information security system according to embodiment 2 of the present application;
fig. 3 is a schematic structural diagram of an information security device according to embodiment 3 of the present application.
Detailed Description
Embodiments of the technical scheme of the present application will be described in detail below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present application, and thus are merely examples, and are not intended to limit the scope of the present application.
It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs.
Example 1
Referring to fig. 1, fig. 1 is a method for securing information according to an embodiment of the present application, where the method includes the following steps:
step one: acquiring data to be encrypted and an encryption level corresponding to the data to be encrypted, wherein the data to be encrypted are sent by a target user;
it should be noted that before the obtaining the data to be encrypted and the encryption level corresponding to the data to be encrypted, the method further includes: carrying out identity authentication on a target user; after the identity authentication of the target user is successful, performing level authentication on the target user; and after the target user grade authentication is successful, determining a grade key and a grade key sequence corresponding to the target user from a user database according to the user grade, wherein the grade key sequence is used for representing a set of grade keys corresponding to the lowest user grade to the user grade of the target user.
The authentication of the user identity includes: acquiring identity information of a target user, and extracting a user identifier from the identity information; and searching corresponding identity information in a user database according to the user identification, and if the inquiry is successful, successful user identity authentication is achieved.
The step of performing the level authentication on the target user includes: determining the user grade of the target user from a user database according to the user identification; sending a level authentication request to other users with at least one user level higher than that of the target user; and returning confirmation information by other users according to the grade authentication request, and successfully authenticating the grade of the user.
By the method, the grade key of the user is bound with the grade of the user and the identity of the user, so that the uniqueness and the safety of the grade key are ensured.
Step two: determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key;
the determining the encryption policy according to the encryption level includes: determining a grade key parameter according to the encryption grade; and calculating an encryption key and a storage key according to the grade key parameter, the grade key and the grade key sequence.
The formula for calculating the encryption key and the storage key according to the grade key parameter, the grade key and the grade key sequence is as follows:
E s =E m E m+1 …(E K ) 2
E f =E 1 E 2 …E m-1 E K
wherein E is s Representing an encryption key, E f Representing the storage key, E K And representing a grade key corresponding to the grade of the target user, and m represents a grade key parameter.
In the embodiment of the application, the grade key parameter is smaller than or equal to the grade of the user, for example, the user is a five-grade user, and the selectable grade key parameter is 1-5, and the grade key sequence can be changed by changing the grade key parameter, so that the combination mode of the storage key and the encryption key is changed, that is, the encryption key and the storage key of the user are difficult to crack by the user with the same grade, and the security of secret information is further improved.
Step three: and encrypting and storing the data to be encrypted according to the encryption strategy.
It should be noted that encrypting and storing the data to be encrypted according to the encryption policy includes: encrypting the data to be encrypted by using the encryption key to obtain secret data, and storing the secret data; and obtaining a storage address of the secret data, encrypting the storage address by using a storage key to obtain a target access code, and realizing access of the secret information by the target access code.
In some embodiments, the user's identification code may be encrypted by an encryption key and a storage key, the data to be encrypted may be encrypted by the identification code encrypted by the encryption key to obtain secret information, the storage address of the secret information may be encrypted by the identification code encrypted by the storage key to obtain a target access code, and the access of the secret information may be achieved by the target access code. Thus, the identity identification code of the user is bound with the encryption key and the storage key, and the security of secret information is further improved.
It should be understood that when accessing the secret information through the target access code, the user's authorization needs to be obtained, and the target access code is decoded through authorization, so that the secret information can be accessed.
Example 2
Referring to fig. 2, fig. 2 is a schematic diagram of an information security system according to an embodiment of the present application, where the system includes: the acquisition module is used for acquiring data to be encrypted and sent by a target user and an encryption level corresponding to the data to be encrypted; the determining module is used for determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key; and the execution module is used for encrypting and storing the data to be encrypted according to the encryption strategy.
The system provided by the embodiment of the present application and the method provided by the foregoing embodiment are the same in the inventive concept, so reference is made to the foregoing embodiment for more specific working principles of each module in this embodiment, and no further description is given here.
Example 3
Referring to fig. 3, fig. 3 is an information security device provided by an embodiment of the present application, where the electronic device includes: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method described above. Also, the electronic device may be implemented in any one or combination of hardware, software, firmware, or solid state logic circuits, and may be implemented in connection with signal processing, control and/or application specific circuits.
Embodiments of the application may be implemented in any one or combination of hardware, software, firmware, or solid state logic circuits, and may be implemented in connection with signal processing, control and/or application specific circuits. Embodiments of the present application provide a device or apparatus that may include one or more processors (e.g., microprocessors, controllers, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs), etc.) which process various computer executable instructions to control the operation of the device or apparatus. An apparatus or device provided by embodiments of the present application may include a system bus or data transmission system that couples the various components together. A system bus may include any of several different bus structures, such as a memory bus or memory controller, a peripheral bus, a universal serial bus, and/or a processor or local bus using any of a variety of bus architectures. The apparatus or device provided by the embodiments of the present application may be provided separately, may be part of a system, or may be part of other apparatus or device.
Particular embodiments provided by embodiments of the present application may include or be combined with a computer-readable storage medium, such as one or more storage devices capable of providing non-transitory data storage. The computer-readable storage medium/storage device may be configured to hold data, programmers and/or instructions that, when executed by a processor of an apparatus or device provided by a particular embodiment of the present application, cause the apparatus or device to perform the relevant operations. The computer-readable storage medium/storage device may include one or more of the following features: volatile, nonvolatile, dynamic, static, readable/writable, read-only, random access, sequential access, location addressability, file addressability, and content addressability. In one or more exemplary embodiments, the computer readable storage medium/storage device may be integrated into a device or apparatus provided by embodiments of the present application or belong to a common system. Computer-readable storage media/memory devices may include optical storage devices, semiconductor storage devices and/or magnetic storage devices, etc., as well as Random Access Memory (RAM), flash memory, read-only memory (ROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), registers, hard disk, a removable disk, a recordable and/or rewriteable Compact Disc (CD), a Digital Versatile Disc (DVD), a mass storage media device, or any other form of suitable storage media.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application, and are intended to be included within the scope of the appended claims and description.

Claims (9)

1. An information security method, characterized in that the method comprises the following steps:
acquiring data to be encrypted and an encryption level corresponding to the data to be encrypted, wherein the data to be encrypted are sent by a target user;
determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key;
encrypting and storing the data to be encrypted according to the encryption strategy;
the step of obtaining the data to be encrypted sent by the target user and the encryption level corresponding to the data to be encrypted includes:
performing identity authentication on the target user, and performing level authentication on the target user after the target user is successfully authenticated, wherein the performing level authentication on the target user comprises the following steps:
determining the user grade of the target user from a user database according to the user identification;
sending a level authentication request to other users with at least one user level higher than that of the target user;
and returning confirmation information by other users according to the grade authentication request, and successfully authenticating the grade of the target user.
2. The method for securing information according to claim 1, wherein before the obtaining the data to be encrypted sent by the target user and the encryption level corresponding to the data to be encrypted, further comprises:
after the target user grade authentication is successful, determining a grade key and a grade key sequence corresponding to the target user from a user database according to the user grade of the target user, wherein the grade key sequence is used for representing a set from the lowest user grade to the grade key corresponding to the user grade of the target user.
3. The method of claim 1, wherein authenticating the user identity comprises:
acquiring identity information of a target user, and extracting a user identifier from the identity information;
and searching corresponding identity information in a user database according to the user identification, and if the inquiry is successful, successful user identity authentication is achieved.
4. The method of claim 2, wherein said determining an encryption policy based on said encryption level comprises:
determining a grade key parameter according to the encryption grade;
and calculating an encryption key and a storage key according to the grade key parameter, the grade key and the grade key sequence.
5. The method of claim 4, wherein the formula for calculating the encryption key and the storage key based on the rank key parameter, the rank key, and the rank key sequence is:
E s =E m E m+1 …(E K ) 2
E f =E 1 E 2 …E m-1 E K
wherein E is s Representing an encryption key, E f Representing the storage key, E K And representing a grade key corresponding to the grade of the target user, and m represents a grade key parameter.
6. The method of claim 5, wherein encrypting and storing the data to be encrypted according to the encryption policy comprises:
encrypting the data to be encrypted by using the encryption key to obtain secret data, and storing the secret data;
and obtaining a storage address of the secret data, encrypting the storage address by using a storage key to obtain a target access code, and realizing access of the secret information by the target access code.
7. An information security system adapted for use in the method of any one of claims 1-6, comprising:
the acquisition module is used for acquiring data to be encrypted and sent by a target user and an encryption level corresponding to the data to be encrypted;
the determining module is used for determining an encryption strategy according to the encryption level; wherein the encryption policy includes an encryption key and a storage key;
and the execution module is used for encrypting and storing the data to be encrypted according to the encryption strategy.
8. An information security privacy device, comprising: at least one memory and at least one processor;
the at least one memory for storing a machine readable program;
the at least one processor being configured to invoke the machine readable program to perform the method of any of claims 1-6.
9. A computer readable medium having stored thereon computer instructions which, when executed by a processor, cause the processor to perform the method of any of claims 1-6.
CN202210610419.3A 2022-05-31 2022-05-31 Information security method, system, equipment and medium Active CN115001813B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210610419.3A CN115001813B (en) 2022-05-31 2022-05-31 Information security method, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210610419.3A CN115001813B (en) 2022-05-31 2022-05-31 Information security method, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN115001813A CN115001813A (en) 2022-09-02
CN115001813B true CN115001813B (en) 2023-11-10

Family

ID=83032082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210610419.3A Active CN115001813B (en) 2022-05-31 2022-05-31 Information security method, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN115001813B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457377A (en) * 2011-08-08 2012-05-16 中标软件有限公司 Role-Based Web Remote Authentication and Authorization Method and System
CN104065483A (en) * 2014-06-06 2014-09-24 武汉理工大学 A method for using IBC grades of electronic communication identification
CN108133155A (en) * 2017-12-29 2018-06-08 北京联想核芯科技有限公司 Data encryption storage method and device
CN110099048A (en) * 2019-04-19 2019-08-06 中共中央办公厅电子科技学院(北京电子科技学院) A kind of cloud storage method and apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3374952A4 (en) * 2015-11-09 2019-05-01 Roger Hanna A distributed user profile identity verification system for e-commerce transaction security
CN105915520B (en) * 2016-04-18 2019-02-12 深圳大学 File storage, search method and storage system based on public key searchable encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457377A (en) * 2011-08-08 2012-05-16 中标软件有限公司 Role-Based Web Remote Authentication and Authorization Method and System
CN104065483A (en) * 2014-06-06 2014-09-24 武汉理工大学 A method for using IBC grades of electronic communication identification
CN108133155A (en) * 2017-12-29 2018-06-08 北京联想核芯科技有限公司 Data encryption storage method and device
CN110099048A (en) * 2019-04-19 2019-08-06 中共中央办公厅电子科技学院(北京电子科技学院) A kind of cloud storage method and apparatus

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
OpenID身份认证系统的认证等级模型研究;夏晔;钱松荣;;微型电脑应用(04);全文 *
多模多级网络身份认证框架研究;刘贤刚;陈星;刘丽敏;;信息技术与标准化(Z1);全文 *

Also Published As

Publication number Publication date
CN115001813A (en) 2022-09-02

Similar Documents

Publication Publication Date Title
CN111723383B (en) Data storage and verification method and device
US8984645B2 (en) Accessing memory device content using a network
US20060232826A1 (en) Method, device, and system of selectively accessing data
EP2151763A1 (en) Method and apparatus for obfuscating virtual to physical memory mapping
KR20140046476A (en) Authenticator
US11423154B2 (en) Endpoint authentication based on boot-time binding of multiple components
CN110661817A (en) Resource access method and device and service gateway
CN111090616B (en) File management method, corresponding device, equipment and storage medium
JP6711042B2 (en) Decryption program, encryption program, decryption device, encryption device, decryption method, and encryption method
JP6199712B2 (en) Communication terminal device, communication terminal association method, and computer program
CN115001813B (en) Information security method, system, equipment and medium
TW202234273A (en) Server system to control memory devices over computer networks
US20220231858A1 (en) Control of Memory Devices over Computer Networks
US20240146525A1 (en) Batch Transfer of Control of Memory Devices over Computer Networks
CN111783115A (en) Data encryption storage method and device, electronic equipment and storage medium
CN112579998A (en) Webpage access method, management system and electronic equipment in information interaction platform
CN114817957B (en) Encrypted partition access control method, system and computing device based on domain management platform
US11362821B2 (en) Secure selective rules driven token invalidation
CN112367302B (en) Identity authentication method and system suitable for chrome browser
CN114218593A (en) Information security detection method based on office equipment
WO2017020449A1 (en) Fingerprint reading method and user equipment
US10318766B2 (en) Method for the secured recording of data, corresponding device and program
US12088581B2 (en) Track activities of components in endpoints having secure memory devices via identity validation
CN116611034A (en) Firmware starting method and system based on certificate authorization
CN105069377A (en) Security hard disk

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant